[1] Tehranipoor M, Koushanfar F. A survey of hardware Trojan taxonomy & detection[J]. IEEE Design & Test of Computers, 2010, 27(1):10-25. [2] Rad R, Plusquellic J, Tehranipoor M. Sensitivity analysis to hardware Trojans using power supply transient signals[C]//2018 IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim,CA,USA:IEEE Press, 2008:3-7. [3] Hou B, He C H, Wang L W, et al. Hardware Trojan detection via current measurement:a method immune to process variation effects[C]//201410th International Conference on Reliability,Maintainability and Safely(ICRMS). Guangzhou:IEEE Press, 2015:1039-1042. [4] Aarestad J, Acharyya D, Rad R, et al. Detecting Trojans through leakage current analysis using multiple supply pad IDDQs[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):893-904. [5] He J J, Zhao Y Q, Guo X L, et al. Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017,25(10):2939-2948. [6] Koushanfar F, Potkonjak M. CAD-based security, cryptography, and digital rights management[C]//200744th ACM/IEEE Design Automation Conference. San Diego,CA,USA:IEEE Press, 2007:268-269. [7] Wei S, Potkonjak M. Scalable consistency-based hardware Trojan detection and diagnosis[C]//20115th IEEE International Conference on Network and System Security. Milan,Italy:IEEE Press, 2011:176-183. [8] Liu Y, Jin Y E, Nosratinia A, et al. Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017, 25(4):1506-1519. [9] Karimi N, Kanuparthi A K, Wang X Y, et al. MAGIC:malicious aging in circuits/cores[J]. ACM Transactions on Architecture and Code Optimization, 2015, 12(1):1-25. [10] Wang X X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware:challenges and solutions[C]//2008 IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim,CA,USA:IEEE Press, 2008:15-19. [11] Chakraborty R S, Wolff F, Paul S, et al. MERO:A statistical approach for hardware Trojan detection[C]//11th International Workshop on Cryptographic Hardware and Embedded Systems. Lansanne, Switzerland:Springer, 2009:396-410. [12] Rai D, Lach J. Performance of delay-based Trojan detection techniques under parameter variations[C]//2009 IEEE International Workshop on Hardware-Oriented Security and Trust. San Francisco,CA,USA:IEEE Press, 2009:58-65. [13] Li X, Wang X, Zhang Y, et al. Hardware trojan detection method based on multiple side-channels analysis[J]. Computer Simulation, 2015, 32(3):216-219.(in Chinese). [14] Narasimhan S, Du D D, Chakraborty R S, et al. Hardware trojan detection by multiple-parameter side-channel analysis[J]. IEEE Transactions on Computers, 2013, 62(11):2183-2195. [15] Salmani H, Tehranipoor M, Plusquellic J. A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits[C]//2010 IEEE International Workshop on Information Forensics and Security. Seattle,WA,USA:IEEE Press, 2010:1-6. [16] Forte D, Bao C X, Srivastava A. Temperature tracking:An innovative run-time approach for hardware Trojan detection[C]//2013 IEEEE/ACM International Conference on Computer-Aided Design(ICCAD). San Jose,CA,USA:IEEE Press, 2013:532-539. [17] Zhao H, Kwiat K, Kamhoua C, et al. Applying chaos theory for runtime Hardware Trojan detection[C]//2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications(CISDA). Verona, NY, USA:IEEE Press, 2015:1-6. [18] Jap D, He W, Bhasin S. Supervised and unsupervised machine learning for side-channel based Trojan detection[C]//2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP). London,UK:IEEE Press, 2016:17-24. [19] Bao C X, Forte D, Srivastava A. On reverse engineering-based hardware Trojan detection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(1):49-57. [20] Lodhi F K, Abbasi I, Khalid F, et al. A self-learning framework to detect the intruded integrated circuits[C]//2016 IEEE International Symposium on Circuits and System(ISCAS). Montreal,QC,Canada:IEEE Press, 2016:1702-1705. [21] Xue M F, Wang J, Hux A Q. An enhanced classification-based golden chips-free hardware Trojan detection technique[C]//2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). Yilan,Taiwan,China:IEEE Press, 2016:1-6. [22] Inoue T, Hasegawa K, Yanagisawa M, et al. Designing hardware Trojans and their detection based on a SVM-based approach[C]//2017 IEEE 12th International Conference on ASIC (ASICON). Guiyang,China:IEEE Press, 2017:811-814. [23] Lodhi F K, Hasan S R, Hasan O, et al. Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models[C]//Design, Automation & Test in Europe Conference & Exhibition(DATE),2017. Lausanne,Switzerland:IEEE Press, 2017:294-297. [24] Mazidi M A, Mazidi J G, Mckinlay R D. The 8051 microcontroller and embedded systems using assembly and C[M]. 2nd ed. New Jersey:PearsonEducation, 2007. [25] Tehranipoor M, Salamani H. trust-HUB.[CP/OL]. (2006-03-06)[2019-11-11]. https://www.trust-hub.org/. [26] Chang C C, Lin C J. LIBSVM:A library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(3):1-27. |