Secure FPGA Design by Filling Unused Spaces
暂无分享,去创建一个
[1] Mark Mohammad Tehranipoor,et al. BISA: Built-in self-authentication for preventing hardware Trojan insertion , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[2] Zied Marrakchi,et al. Tree-based Heterogeneous FPGA Architectures: Application Specific Exploration and Optimization , 2012 .
[3] Ali Jahanian,et al. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow , 2016, ISC Int. J. Inf. Secur..
[4] Shahram Etemadi Borujeni,et al. A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement , 2018, J. Circuits Syst. Comput..
[5] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[6] Hyung-Min Lee,et al. Recent Advances in FPGA Reverse Engineering , 2018 .
[7] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[8] Ahmad Patooghy,et al. Hardware enlightening: No where to hide your Hardware Trojans! , 2016, 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS).
[9] Siavash Bayat Sarmadi,et al. FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic , 2015, IEEE Embedded Systems Letters.
[10] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[11] Bruno Rouzeyre,et al. On the limitations of logic testing for detecting Hardware Trojans Horses , 2015, 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS).
[12] Giorgio Di Natale,et al. Hardware Trojan prevention using layout-level design approach , 2015, 2015 European Conference on Circuit Theory and Design (ECCTD).
[13] Mark Mohammad Tehranipoor,et al. MUTARCH: Architectural diversity for FPGA device and IP security , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[14] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[15] Jean-Baptiste Note,et al. From the bitstream to the netlist , 2008, FPGA '08.
[16] Christof Paar,et al. The First Thorough Side-Channel Hardware Trojan , 2017, ASIACRYPT.
[17] Sharareh Zamanzadeh,et al. Security Path: An Emerging Design Methodology to Protect the FPGA IPs Against Passive/Active Design Tampering , 2016, J. Electron. Test..
[18] Philippe Maurine,et al. An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[20] Stephen M. Trimberger,et al. FPGA Security: Motivations, Features, and Applications , 2014, Proceedings of the IEEE.
[21] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[22] Rajat Subhra Chakraborty,et al. Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream , 2013, IEEE Design & Test.
[23] Assia Tria,et al. A high efficiency Hardware Trojan detection technique based on fast SEM imaging , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[24] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[25] Swarup Bhunia,et al. Design and Validation for FPGA Trust under Hardware Trojan Attacks , 2016, IEEE Transactions on Multi-Scale Computing Systems.
[26] Paris Kitsos,et al. FPGA Trojan Detection Using Length-Optimized Ring Oscillators , 2014, 2014 17th Euromicro Conference on Digital System Design.
[27] Swarup Bhunia,et al. Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures , 2014, GLSVLSI '14.