Cited By
View all- Wei XZhang JLuo G(2024)Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00160(3789-3804)Online publication date: 19-May-2024
- Wei XZhang JLuo G(2023)GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247697(1-6)Online publication date: 9-Jul-2023
- Mukherjee RRajendran SChakraborty R(2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
- Show More Cited By