Practical Split Manufacturing Optimization
暂无分享,去创建一个
Meng Li | David Z. Pan | D. Pan | Meng Li
[1] Qihang Shi,et al. Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication , 2017, ACM Great Lakes Symposium on VLSI.
[2] Jonathan Tse,et al. A split-foundry asynchronous FPGA , 2013, Proceedings of the IEEE 2013 Custom Integrated Circuits Conference.
[3] Andrew V. Goldberg,et al. An efficient implementation of a scaling minimum-cost flow algorithm , 1993, IPCO.
[4] Jeyavijayan Rajendran,et al. Front-end-of-line attacks in split manufacturing , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[5] Franz Franchetti,et al. Efficient and secure intellectual property (IP) design with split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Ankur Srivastava,et al. 3D/2.5D IC-Based Obfuscation , 2017 .
[7] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[8] Ravindra K. Ahuja,et al. Network Flows , 2011 .
[9] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[10] Jeyavijayan Rajendran,et al. Making split fabrication synergistically secure and manufacturable , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[11] Ozgur Sinanoglu,et al. Rethinking split manufacturing: An information-theoretic approach with secure layout techniques , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[12] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[13] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[14] Mark Mohammad Tehranipoor,et al. Efficient and secure split manufacturing via obfuscated built-in self-authentication , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[15] Ryan Kastner,et al. A 3-D Split Manufacturing Approach to Trustworthy System Development , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[16] Muhammet Mustafa Ozdal. Detailed-Routing Algorithms for Dense Pin Clusters in Integrated Circuits , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Jiang Hu,et al. Routing perturbation for enhanced security in split manufacturing , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[18] Azadeh Davoodi,et al. Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits? , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] Jeyavijayan Rajendran,et al. The cat and mouse in split manufacturing , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[20] Lawrence T. Pileggi,et al. Detecting reliability attacks during split fabrication using test-only BEOL stack , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[21] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[22] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).