CSpace

浏览/检索结果: 共2条,第1-2条 帮助

已选(0)清除 条数/页:   排序方式:
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
Intelligent analysis and off-line debugging of VLSI device test programs 期刊论文
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 1999, 卷号: 14, 期号: 3, 页码: 273-293
作者:  Ma, YH;  Shi, WC
收藏  |  浏览/下载:71/0  |  提交时间:2019/12/16
test program  error type  off-line debugging environment  fuzzy set  FCE (fuzzy comprehensive evaluation)  reference set  evaluation space  evaluation factor  evaluation remark  fuzzy relation  test entity  relevance coefficient