期刊文献+

浅谈ICT产品供应链中的安全检测方法 被引量:1

原文传递
导出
摘要 文章对ICT产品供应链中涉及的硬件安全及软件安全检测方法进行了介绍。其中,硬件安全检测方法主要介绍了基于失效分析的测试法、侧信道分析法和逻辑测试法;软件安全检测介绍了安全漏洞检测方法,包括漏洞扫描和漏洞挖掘。
出处 《保密科学技术》 2019年第5期31-36,共6页 Secrecy Science and Technology
  • 相关文献

参考文献5

二级参考文献84

  • 1董火明,高隽,汪荣贵.多分类器融合的人脸识别与身份认证[J].系统仿真学报,2004,16(8):1849-1853. 被引量:17
  • 2Dai Mo,Zhou Mingquan.On Automatic Human Face Recognition[J].Advances Biometrics,2003,(1):41-48.
  • 3Lorenz L. Trends in power integration state-of-the art and future [A]. PCIM [C]. Shanghai, China. 2002. 1-15.
  • 4Baliga B J. Modern Power Device [M]. New York: John Wiley & Sons, 1987. 269-276.
  • 5Brian Hughitt. Counterfeit Electronic Parts[R]. NASA/ ESA/JAXA Trilateral Safety and Mission Assurance Conference, April 2008.
  • 6Defense Industrial Base Assessment: Counterfeit Ele- ctronics [R]. Industry and January 2010 U.S. Department of Commerce Bureau of Security office of Technology Evaluation,.
  • 7Brian Hughitt. Counterfeit Electronic Parts[R]. NEPP Electronics Technology Workshop, June 2010.
  • 8Richard J. Hillman. DOD SUPPLY CHAIN Prelim- inary Observations Indicate That Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms [R]. Testimony Before the Committee on Armed Services, U.S. Senate. GAO-12-213T, November 2011.
  • 9Counterfeit Parts: Increasing Awareness and Develo- ping Countermeasures [R]. Aerospace Industries Assoc-iation of America. March 2011.
  • 10AS5553: Counterfeit Electronic Parts; Avoidance, Det- ection, Mitigation, and Disposition[S]. SAE International. April 2009.

共引文献66

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部