http://iet.metastore.ingenta.com
1887

access icon openaccess Built-in self-monitor-based finite state machines Trojans detection and self-lock defence

Loading full text...

Full text loading...

/deliver/fulltext/joe/2016/4/JOE.2016.0012.html;jsessionid=2hleglmk31s6g.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fjoe.2016.0012&mimeType=html&fmt=ahah

References

    1. 1)
    2. 2)
      • 2. Carson, D., Qu, G.: ‘Designing trusted embedded systems from finite state machines’, ACM Trans. Embed. Comput. Syst., 2014, 13, (5), pp. 153173, doi: http://www.dx.doi.org/10.1145/2638555.
    3. 3)
      • 3. Wei, S., Miodrag, P.: ‘The undetectable and unprovable hardware Trojan horse’. Design Automation Conf., Austin, TX, USA, 29 May–7 June 2013, pp. 12, doi: 10.1145/2463209.2488912.
    4. 4)
    5. 5)
    6. 6)
      • 6. Karnaugh, M.: ‘The map method for synthesis of combinational logic circuits’, IEEE J. Mag., 1953, 72, (5), pp. 593599, doi: 10.1109/tce.1953.6371932.
    7. 7)
      • 7. Stephen, B., Zvonko, V.: ‘Fundamentals of digital logic with VHDL design’ (Tsinghua University Press, Beijing, China, 2011, 3rd edn.).
http://iet.metastore.ingenta.com/content/journals/10.1049/joe.2016.0012
Loading

Related content

content/journals/10.1049/joe.2016.0012
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address