Security and Trust Vulnerabilities in Third-Party IPs
暂无分享,去创建一个
[1] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[2] Prabhat Mishra,et al. Pre-silicon security verification and validation: A formal perspective , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Mingsong Chen,et al. System-Level Validation: High-Level Modeling and Directed Test Generation Techniques , 2012 .
[4] Swarup Bhunia,et al. MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection , 2016, CCS.
[5] Prabhat Mishra,et al. Trojan localization using symbolic algebra , 2019, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[6] Christof Paar,et al. MOLES: Malicious off-chip leakage enabled by side-channels , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[7] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[8] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[9] Swarup Bhunia,et al. Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components , 2013 .
[10] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[11] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[12] Prabhat Mishra,et al. Scalable SoC trust verification using integrated theorem proving and model checking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[13] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.