Journal of Guangxi Normal University(Natural Science Edition) ›› 2020, Vol. 38 ›› Issue (2): 43-50.doi: 10.16088/j.issn.1001-6600.2020.02.005
Previous Articles Next Articles
XIU Guilin1, ZHANG Bowei1, LIU Fan2, LUO Ao1*
CLC Number:
[1] LIPP M, SCHWARZ M, GRUSS D, et al. Meltdown: reading kernel memory from user space[C]//27th USENIX Conference on Security Symposium. Berkeley,CA: USENIX Association, 2018: 973-990. [2] KOCHER P, GENKIN D, GRUSS D, et al. Spectre attacks: exploiting speculative execution[EB/OL]. (2018-01-03)[2019-10-08]. https://arxiv.org/abs/1801.01203. [3] JIN Y. Introduction to hardware security[J].Electronics, 2015,4: 763-784. [4] TEHRANIPOOR M, OUSHANFAR F. A survey of hardware trojan taxonomy and detection[J].IEEE Design & Test of Computers,2010,27: 10-25. [5] BHASIN S, REGAZZONI F. A survey on hardware trojan detection techniques[C]//2015 IEEE International Symposium on Circuits and Systems(ISCAS). Lisbon,Portugal: IEEE, 2015: 2021-2024. [6] BHUNIA S, HSIAO M, BANGA M, et al. Hardware Trojan attacks: threat analysis and countermeasures[J]. Proceedings of the IEEE,2014,102: 1229-1247. [7] KRIEG C, DABROWSKI A, HOBEL H, et al. Hardware malware[J].Synthesis Lectures on Information Security, Privacy, & Trust,2013,4: 1-115. [8] XIAO K, FORTE D, JIN Y, et al. Hardware trojans: lessons learned after one decade of research[J].ACM Transactions on Design Automation of Electronic Systems(TODAES),2016,22: 6. [9] ROSTAMI M, KOUSHANFAR F, RAJENDRAN J, et al. Hardware security: threat models and metrics[C]//Proceedings of the International Conference on Computer-Aided Design. San Jose, CA:IEEE, 2013: 819-823. [10]IMESON F, EMTENAN A, GARG S, et al. Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation[C]//22nd USENIX Conference on Security Symposium. Berkeley,CA: USENIX Association,2013: 495-510. [11]XIAO K, TEHRANIPOOR M. BISA: built-in self-authentication for preventing hardware Trojan insertion[C]//2013 IEEE International Symposium on Hardware-Oriented Security and Trust(HOST). Austin,TX: IEEE,2013: 45-50. [12]NARASIMBAN S, YUEH W, WANG X, et al. Improving IC security against Trojan attacks through integration of security monitors[J].IEEE Design & Test of Computers,2012,29: 37-46. [13]SALMANI H, TEHRANIPOOR M, PLUSQUELLIC J. A novel technique for improving hardware Trojan detection and reducing trojan activation time[J].IEEE Transactions on Very Large Scale Integration (VLSI) Systems,2011, 20: 112-125. [14]KASH J, TSANG J, KNEBEL D. Method and apparatus for reverse engineering integrated circuits by monitoring optical emission: US Patent 6,496,022[P]. 2002-12-07. [15]CHAKRABORTY R, WOLFF F, PAUL S, et al. MERO: a statistical approach for hardware Trojan detection[C]// International Workshop on Cryptographic Hardware and Embedded Systems: LNCS 5747. Cham, Switzerland: Springer, 2009: 396-410. [16]BANGA M, CHANDRASEKAR M, FANG L, et al. Guided test generation for isolation and detection of embedded Trojans in ics[C]//Proceedings of the 18th ACM Great Lakes symposium on VLSI.Orlando, Florida:ACM,2008: 363-366. [17]NARASIMBAN S, DU D, CHAKRABORTY R, et al. Hardware Trojan detection by multiple-parameter side-channel analysis[J].IEEE Transactions on Computers,2012,62: 2183-2195. [18]LAMECH C, RAD R, TEHRANIPOOR M, et al. An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities[J].IEEE Transactions on Information Forensics and Security,2011,6(3): 1170-1179. [19]KOUSHANFAR F, MIRHOSEINI A. A unified framework for multimodal submodular integrated circuits Trojan detection[J].IEEE Transactions on Information Forensics and Security,2010,6(1): 162-174. [20]BHUNIA S, HSIAO M S, BANGA M, et al. Hardware Trojan attacks: threat analysis and countermeasures[J].Proceedings of the IEEE, 2014,102(8): 1229-1247. [21]肖玮,陈性元, 包义保. 可重构信息安全系统研究综述[J].电子学报, 2017,45(5): 1240-1248. [22]WANG Y, LIU L, YIN S, et al. On-chip memory hierarchy in one coarse-grained reconfigurable architecture to compress memory space and to reduce reconfiguration time and data-reference time[J].IEEE Transactions on Very Large Scale Integration(VLSI) Systems,2014,22(5): 983-994. [23]Intel. Management Engine[EB/OL]. [2019-10-08]. https://en.wikipedia.org/wiki/Intel_Management_Engine. [24]澜起科技股份有限公司. 津逮®处理器动态安全监控技术(DSC)白皮书 [R/OL]. (2018-09-13) [2019-08-29]. http://www.montage-tech.com/cn/Jintide_CPU/index.html. |
[1] | TANG Tang,LUO Xiaoshu,Lü Wande,LIU Xin. Sliding Mode Active Disturbance Rejection Control of Quadrotor Unmanned Aerial Vehicle [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(2): 56-62. |
|