[1] |
AGRAWAL D , BAKTIR S , KARAKOYUNLU D ,et al. Trojan detection using IC fingerprinting[C]// 2007 IEEE Symposium on Security and Privacy (SP'07). Berkeley,CA:IEEE, 2007: 296-310.
|
[2] |
LIU C , CRONIN P , YANG C . A mutual auditing framework to protect IoT against hardware Trojans[C]// 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC). 2016.
|
[3] |
CHAKRABORTY R S , WOLFF F , PAUL S ,et al. MERO:a statistical approach for hardware Trojan detection[C]// Cryptographic Hardware and Embedded Systems - CHES 2009. Berlin,Heidelberg:Springer, 2009: 396-410.
|
[4] |
BALASCH J , GIERLICHS B , VERBAUWHEDE I . Electromagnetic circuit fingerprints for hardware trojan detection[C]// 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC). Dresden,Germany:IEEE, 2015: 246-251.
|
[5] |
BANGA M , HSIAO M S . A region based approach for the identification of hardware Trojans[C]// 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. 2018.
|
[6] |
CHEN Z , GUO S , WANG J ,et al. Toward FPGA security in IoT:a new detection technique for hardware Trojans[J]. IEEE Internet of Things Journal, 2019,6(4): 7061-7068.
|
[7] |
HE J , ZHAO Y , GUO X ,et al. Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017,25(10): 2939-2948.
|
[8] |
HE J , LIU Y , YUAN Y ,et al. Golden chip free trojan detection leveraging electromagnetic side channel fingerprinting[J]. IEICE Electronics Express, 2019,16(2): 20181065-20181065.
|
[9] |
NGO X T , EXURVILLE I , BHASIN S ,et al. Hardware Trojan detection by delay and electromagnetic measurements[C]// 2015 Design,Automation Test in Europe Conference Exhibition (DATE). 2015.
|
[10] |
SOLL O , KORAK T , MUEHLBERGHUBER M ,et al. EM-based detection of hardware Trojans on FPGAs[C]// 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Arlington,VA,USA:IEEE, 2014: 84-87.
|
[11] |
TANG Y , FANG L , LI S . Activity factor based hardware Trojan detection and localization[J]. Journal of Electronic Testing, 2019,35(3): 293-302.
|
[12] |
TANG Y , LI S , FANG L ,et al. Golden-chip-free hardware Trojan detection through quiescent thermal maps[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019,27(12): 2872-2883.
|
[13] |
TANG Y , LI S , ZHANG F ,et al. Thermal maps based HT detection using spatial projection transformation[J]. IET Information Security, 2018,12(4): 356-361.
|
[14] |
HAYASHI Y , KAWAMURA S . Survey of hardware trojan threats and detection[C]// 2020 International Symposium on Electromagnetic Compatibility-EMC EUROPE. Rome,Italy:IEEE, 2020: 1-5.
|
[15] |
NOTAROS B M . 电磁学[M]. 北京: 清华大学出版社, 2018.
|
|
NOTAROS B M . Electromagnetics[M]. Beijing: Tsinghua University Press, 2018.
|
[16] |
BOSSUET L , FISCHER V , BAYON P . Contactless transmission of intellectual property data to protect FPGA designs[C]// 2015 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). 2015: 19-24.
|
[17] |
QIU H , LUO C , FANG W ,et al. Noncontact time-domain EMI measurement of two adjacent traces on a PCB[C]// 2018 IEEE Symposium on Electromagnetic Compatibility,Signal Integrity and Power Integrity (EMC,SI & PI). Long Beach,CA:IEEE, 2018: 634-639.
|
[18] |
王品, 赵毅强, 刘燕江 ,等. 基于高斯滤波和K最邻近算法融合的硬件木马电磁信息检测技术研究[J]. 南京大学学报(自然科学), 2020,56(2): 264-269.
|
|
WANG P , ZHAO Y Q , LIU Y J ,et al. Hardware Trojan electromagnetic information detection based on fusion of Gaussian filter and K-nearest neighbour algorithm[J]. Journal of Nanjing University (Natural Science), 2020,56(2): 264-269.
|
[19] |
SUPON T M , RASHIDZADEH R . On-Chip magnetic probes for hardware Trojan prevention and detection[J]. IEEE Transactions on Electromagnetic Compatibility, 2020: 1-12.
|
[20] |
HE J , GUO X , MA H ,et al. Runtime trust evaluation and hardware trojan detection using on-chip EM sensors[C]// 2020 57th ACM/IEEE Design Automation Conference (DAC). San Francisco,CA,USA:IEEE, 2020: 1-6.
|
[21] |
MITTAL S . A Survey of architectural techniques for managing process variation[J]. ACM Computing Surveys, 2016,48(4): 1-29.
|
[22] |
RAI D , LACH J . Performance of delay-based trojan detection techniques under parameter variations[C]// 2009 IEEE International Workshop on Hardware-Oriented Security and Trust. San Francisco,CA,USA:IEEE, 2009: 58-65.
|
[23] |
HOU B , HE C , WANG L ,et al. Hardware Trojan detection via current measurement:a method immune to process variation Effects[C]// 2014 10th International Conference on Reliability,Maintainability and Safety (ICRMS). Guangzhou,China:IEEE, 2014: 1039-1042.
|
[24] |
TUZLUKOV V P . Signal Processing Noise[M]. Boca Raton: CRC Press, 2002.
|
[25] |
LEE E A , MESSERSCHMITT D G . Digital communication[M]. Boston,MA: Springer US, 1993.
|
[26] |
BEENAKKER C W J , BüTTIKER M . Suppression of shot noise in metallic diffusive conductors[J]. Physical Review B,Condensed Matter, 1992,46(3): 1889-1892.
|
[27] |
GRAY R M , NEUHOFF D L . Quantization[J]. IEEE Transactions on Information Theory, 1998,44(6): 2325-2383.
|
[28] |
JARQUE C M , BERA A K . A test for normality of observations and regression residuals[J]. International Statistical Review / Revue Internationale de Statistique, 1987,55(2): 163.
|
[29] |
DAUBECHIES I , BATES B J . Ten lectures on wavelets[J]. The Journal of the Acoustical Society of America, 1993,93(3): 1671.
|
[30] |
DONOHO D L , JOHNSTONE I M . Ideal spatial adaptation by wavelet shrinkage[J]. Biometrika, 1994,81(3): 425-455.
|
[31] |
CHA B , GUPTA S K . Efficient Trojan detection via calibration of process variations[C]// 2012 IEEE 21st Asian Test Symposium. Niigata,Japan:IEEE, 2012: 355-361.
|