Hardware trojan design and detection: a practical evaluation
暂无分享,去创建一个
Axel Poschmann | Marc Stöttinger | Sebastian Kutzner | A. Poschmann | Sebastian Kutzner | Marc Stöttinger
[1] Yiorgos Makris,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.
[2] Mark Mohammad Tehranipoor,et al. An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities , 2011, IEEE Transactions on Information Forensics and Security.
[3] J. G. Gander,et al. An introduction to signal detection and estimation , 1990 .
[4] Keinosuke Fukunaga,et al. Introduction to statistical pattern recognition (2nd ed.) , 1990 .
[5] Jim Plusquellic. Abstract 1.0 Introduction 2.0 Taxonomy 2.1 Trojan Physical Characteristics Taxonomy of Trojans for Ic Trust , .
[6] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Farinaz Koushanfar,et al. Post-silicon timing characterization by compressed sensing , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[9] Yiorgos Makris,et al. Experiences in Hardware Trojan design and implementation , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[10] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[11] Miodrag Potkonjak,et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.
[12] Swarup Bhunia,et al. Sequential hardware Trojan: Side-channel aware design and placement , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[13] Stefan Mangard,et al. Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations , 2006, CHES.
[14] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[15] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[16] Jonathon Shlens,et al. A Tutorial on Principal Component Analysis , 2014, ArXiv.
[17] William N. Venables,et al. Modern Applied Statistics with S , 2010 .
[18] Mark Mohammad Tehranipoor,et al. Hardware Trojan Horses , 2010, Towards Hardware-Intrinsic Security.
[19] Mark Mohammad Tehranipoor,et al. Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[20] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[21] Pavel Pudil,et al. Introduction to Statistical Pattern Recognition , 2006 .
[22] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[23] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[24] Miodrag Potkonjak,et al. Gate Characterization Using Singular Value Decomposition: Foundations and Applications , 2012, IEEE Transactions on Information Forensics and Security.
[25] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[26] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.