Citation: | Yingjian Yan, Xin Chuan. Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2018, 27(2): 230-236.doi:10.15918/j.jbit1004-0579.201827.0210 |
[1] |
George R. Why we should worry about the supply chain[J]. International Journal of Critical Infrastructure Protection, 2015, 11: 22-23.
|
[2] |
Liu Huafeng, Luo Hongwei, Wang Liwei. Survey on hardware Trojan horse[J]. Microelectronics, 2011, 41(5):709-713. (in Chinese)
|
[3] |
Niu Xiaopeng, Li Qingbao, Wang Wei, et al. Survey on the hardware Trojan technologies[J]. Journal of Information Engineering University, 2012, 13(6):740-748. (in Chinese)
|
[4] |
Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: Challenges and solutions[C]//IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2008.
|
[5] |
Li H, Liu Q, Zhang J, et al. A survey of hardware Trojan detection, diagnosis and prevention[C]//International Conference on Computer-Aided Design and Computer Graphics, Xi'an, China, 2016.
|
[6] |
Francq J, Frick F. Introduction to hardware Trojan detection methods[C]//Design, Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2015.
|
[7] |
Kitsos P, Simos D E, Torres-jimenez J, et al. Exciting FPGA cryptographic Trojans using combinatorial testing[C]//International Symposium on Software Reliability Engineering, Gaithersbury, MD, USA, 2016.
|
[8] |
Pei Gen, Shi Chaoyang, Zou Xuecheng, et al. A hardware Trojan detection method based on rapid activation[J]. Application of Electronic Technique, 2016, 42(8):63-66. (in Chinese)
|
[9] |
Voyiatzis A G, Stefanidis K G, Kitsos P. Efficient triggering of Trojan hardware logic[C]//IEEE International Symposium on Design & Diagnostics of Electronic Circuits & Systems, Kosice, Slovakia, 2016.
|
[10] |
Kitsos P, Voyiatzis A G. Towards a hardware Trojan detection methodology[C]//Embedded Computing, Budva, Montenegro, 2014.
|
[11] |
Li Ling. Research on SAT-based test generation algorithm for integrated circuits[D]. Harbin: Harbin Engineering University, 2012. (in Chinese)
|
[12] |
Tang D T, Woo L S. Exhaustive test pattern generation with constant weight vectors[J]. IEEE Transactions on Computers, 1984, 32(12):1145-1150.
|
[13] |
Kumar K S, Chanamala R, Sahoo S R, et al. An improved AES hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow[C]//International Symposium on VLSI Design and Test, Ahmedabad, India, 2015.
|