Detecting Hardware Trojans using backside optical imaging of embedded watermarks
暂无分享,去创建一个
Ajay Joshi | Boyou Zhou | M. Selim Ünlü | Bennett B. Goldberg | Tianyu Yang | Mahmoud Zangeneh | Ronen Adato | Aydan Uyar
[1] Bennett B. Goldberg,et al. Theoretical analysis of numerical aperture increasing lens microscopy , 2005 .
[2] Franco Stellari,et al. MARVEL — Malicious alteration recognition and verification by emission of light , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[3] Ahmad-Reza Sadeghi,et al. PUFatt: Embedded platform attestation based on novel processor-based PUFs , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[4] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[5] Miodrag Potkonjak,et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.
[6] Mark Mohammad Tehranipoor,et al. BISA: Built-in self-authentication for preventing hardware Trojan insertion , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[7] Yusuf Leblebici,et al. High spatial resolution subsurface thermal emission microscopy , 2004 .
[8] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[9] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[10] M Selim Unlü,et al. Subsurface microscopy of interconnect layers of an integrated circuit. , 2010, Optics letters.
[11] Farinaz Koushanfar,et al. Consistency-based characterization for IC Trojan detection , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[12] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[13] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[14] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[15] Kostas Daniilidis,et al. Normalized Cross-Correlation for Spherical Images , 2004, ECCV.
[16] M. Selim Ünlü,et al. Subsurface microscopy of interconnect layers of an integrated circuit , 2010 .
[17] C. Boit,et al. Quantitative Investigation of Laser Beam Modulation in Electrically Active Devices as Used in Laser Voltage Probing , 2007, IEEE Transactions on Device and Materials Reliability.
[18] Miodrag Potkonjak,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 1 Scalable Hardware Trojan Diagnosis , 2022 .
[19] Farinaz Koushanfar,et al. Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[20] P. Wolf,et al. AN IMPROVED METHOD OF DIGITAL IMAGE CORRELATION , 1975 .
[21] Ankur Srivastava,et al. Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[22] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[23] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[24] Franco Stellari,et al. Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements , 2014, 2014 IEEE 32nd VLSI Test Symposium (VTS).
[25] B. Hecht,et al. Principles of nano-optics , 2006 .
[26] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[27] Tim Güneysu,et al. Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering , 2009, CHES.
[28] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[29] Nektarios Georgios Tsoutsos,et al. Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation , 2014, IEEE Transactions on Emerging Topics in Computing.
[30] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[31] Lukas Novotny,et al. Principles of Nano-Optics by Lukas Novotny , 2006 .