[1] |
MISHRA P, BHUNIA S, TEHRANIPOOR M . Hardware IP Security and Trust[M]. Heidelberg: Springer, 2017: 1-353.
|
[2] |
GUIN U, HUANG K, DIMASE D , et al. Counterfeit Integrated Circuits: a Rising Threat in the Global Semiconductor Supply Chain[J]. Proceedings of the IEEE, 2014,102(8):1207-1228.
|
[3] |
ROSTAMI M, KOUSHANFAR F, KARRI R . A Primer on Hardware Security: Models, Methods, and Metrics[J]. Proceedings of the IEEE, 2014,102(8):1283-1295.
|
[4] |
GOERTZEL K M, HAMILTON B A . Integrated Circuit Security Threats and Hardware Assurance Countermeasures[J]. CrossTalk, 2013,26(6):33-38.
|
[5] |
杨亚君, 陈章 . 分块制造下硬件木马攻击方法及安全性分析[J]. 西安电子科技大学学报, 2019,46(4):167-175.
|
|
YANG Yajun, CHEN Zhang . Hardware Trojan Attack Methods and Security Analysis under Split Manufacturing[J]. Journal of Xidian University, 2019,46(4):167-175.
|
[6] |
秦茂源, 慕德俊, 胡伟 , 等. 硬件安全门级细粒度形式化验证方法[J]. 西安电子科技大学学报, 2018,45(5):143-148.
|
|
QIN Maoyuan, MU Dejun, HU Wei , et al. Fine-granularity Gate Level Formal Verification Method for Hardware Security[J]. Journal of Xidian University, 2018,45(5):143-148.
|
[7] |
ZHANG J L . Practical Logic Obfuscation Technique for Hardware Security[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2016,24(3):1193-1197.
|
[8] |
毛保磊, 慕德俊, 胡伟 , 等. RSA时间信道滑动窗口攻击方法及量化分析[J]. 西安电子科技大学学报, 2017,44(5):114-120.
|
|
MAO Baolei, Mu Dejun, HU Wei , et al. Quantitative Analysis of Sliding Window Attack for the RSA Timing Channel[J]. Journal of Xidian University, 2017,44(5):114-120.
|
[9] |
DE A, GHOSH S . Preventing Reverse Engineering Using Threshold Voltage Defined Multi-input Camouflaged Gates[C] // Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security. Piscataway: IEEE, 2017: 7943443.
|
[10] |
SHILIMKAR V S, GASKILL S G, WEISSHAAR A . Closed-form Expressions for Modeling Metal Fill Effects in Interconnects[C]// Proceedings of the 2011 IEEE 15th Workshop on Signal Propagation on Interconnects. Washington: IEEE Computer Society, 2011: 97-100.
|
[11] |
RAJENDRAN J, SAM M, SINANOGLU O , et al. Security Analysis of Integrated Circuit Camouflaging[C]// Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM, 2013: 709-720.
|
[12] |
ROY J A, KOUSHANFAR F, MARKOV I L . Ending Piracy of Integrated Circuits[J] Computer, 2010,43(10):30-38.
|
[13] |
GOMEZ H, DURAN C, ROA E . Defeating Silicon Reverse Engineering Using a Layout-Level Standard Cell Camouflage[J]. IEEE Transactions on Consumer Electronics, 2019,65(1):109-118.
|
[14] |
ERBAGCI B, ERBAGCI C, AKKAYA N E C , et al. A Secure Camouflaged Threshold Voltage Defined Logic Family[C] // Proceeding of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust. Piscataway: IEEE, 2016: 229-235.
|
[15] |
CHAKRABORTY P, CRUZ J, BHUNIA S . SURF: Joint Structural Functional Attack on Logic Locking[C] // Proceeding of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust. Piscataway: IEEE, 2019: 181-190.
|
[16] |
XIE Y, SRIVASTAVA A . Anti-SAT: Mitigating SAT Attack on Logic Locking[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019,38(2):199-207.
|
[17] |
LI M, SHAMSI K, MEADE T , et al. Provably Secure Camouflaging Strategy for IC Protection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019,38(8):1399-1412.
|
[18] |
LI L W, WANG P J, ZHANG Y J . Design of Anti-key Leakage Camouflage Gate Circuit for Reverse Engineering Based on Dummy Vias[J]. Microelectronics Journal, 2019,90:163-168.
|
[19] |
DOFE J, YU Q Y . Novel Dynamic State-deflection Method for Gate-level Design Obfuscation[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits Systems, 2018,37(2):273-285.
|