CSpace

浏览/检索结果: 共2条,第1-2条 帮助

已选(0)清除 条数/页:   排序方式:
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
Parallel Software-Based Self-Testing with Bounded Model Checking for Kilo-Core Networks-on-Chip 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 卷号: 38, 期号: 2, 页码: 405-421
作者:  Zhang, Ying;  Ji, Peng-Fei;  Zhu, Pan-Wei;  Peng, Zebo;  Li, Hua-Wei;  Jiang, Jian-Hui
收藏  |  浏览/下载:22/0  |  提交时间:2023/12/04
software-based self-testing (SBST)  parallel test  kilo-core networks-on-chip (NoCs)  online testing