Malicious hardware detection and design for trust: An analysis
暂无分享,去创建一个
[1] Mark Mohammad Tehranipoor,et al. Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.
[2] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[3] Bhagirath Narahari,et al. OS support for detecting Trojan circuit attacks , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[4] Farinaz Koushanfar,et al. Consistency-based characterization for IC Trojan detection , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[5] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[6] Jeyavijayan Rajendran,et al. Reconciling the IC test and security dichotomy , 2013, 2013 18th IEEE European Test Symposium (ETS).
[7] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[8] Marco Platzner,et al. Proof-Carrying Hardware: Towards Runtime Verification of Reconfigurable Modules , 2009, 2009 International Conference on Reconfigurable Computing and FPGAs.
[9] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[10] Ankur Srivastava,et al. On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[11] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[13] Swarup Bhunia,et al. Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[14] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[15] Yiorgos Makris,et al. DFTT: Design for Trojan Test , 2010, 2010 17th IEEE International Conference on Electronics, Circuits and Systems.
[16] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[17] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[18] Lawrence L. Harada. Semiconductor Technology and U.S. National Security , 2010 .
[19] Debdeep Mukhopadhyay,et al. Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability , 2015, CHES.
[20] Yiorgos Makris,et al. A proof-carrying based framework for trusted microprocessor IP , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[21] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[22] Mark Mohammad Tehranipoor,et al. New design strategy for improving hardware Trojan detection and reducing Trojan activation time , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[23] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[24] Jeyavijayan Rajendran,et al. Design and analysis of ring oscillator based Design-for-Trust technique , 2011, 29th VLSI Test Symposium.
[25] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[26] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[27] Michael S. Hsiao,et al. Trusted RTL: Trojan detection methodology in pre-silicon designs , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[28] M. Nirmala Devi,et al. Power based Self-Referencing Scheme for Hardware Trojan Detection and Diagnosis , 2015 .
[29] John D. Villasenor,et al. Dynamic Function Verification for System on Chip Security Against Hardware-Based Attacks , 2015, IEEE Transactions on Reliability.
[30] Farinaz Koushanfar,et al. Designer's Hardware Trojan Horse. , 2008, HOST 2008.
[31] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[32] Ankur Srivastava,et al. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[33] Yiorgos Makris,et al. Proof carrying-based information flow tracking for data secrecy protection and hardware trust , 2012, 2012 IEEE 30th VLSI Test Symposium (VTS).
[34] Susmit Jha,et al. Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[35] Swarup Bhunia,et al. Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection , 2010, CHES.
[36] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[37] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[38] Yiorgos Makris,et al. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.
[39] Kaushik Roy,et al. Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[40] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[41] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[42] Giorgio Di Natale,et al. A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans , 2014, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS).
[43] N. Mohankumar,et al. Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).