DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements
暂无分享,去创建一个
[1] John P. Hayes,et al. Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering , 1999, IEEE Des. Test Comput..
[2] David A. Wagner,et al. Defeating UCI: Building Stealthy and Malicious Hardware , 2011, 2011 IEEE Symposium on Security and Privacy.
[3] Farinaz Koushanfar,et al. Consistency-based characterization for IC Trojan detection , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[4] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] K. Gulati,et al. Minimum leakage vector computation using weighted partial MaxSAT , 2010, 2010 53rd IEEE International Midwest Symposium on Circuits and Systems.
[6] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[7] Simha Sethumadhavan,et al. Silencing Hardware Backdoors , 2011, 2011 IEEE Symposium on Security and Privacy.
[8] Gang Wang,et al. Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Miodrag Potkonjak,et al. SVD-Based Ghost Circuitry Detection , 2009, Information Hiding.
[11] Ranga Vemuri,et al. Accurate estimation of vector dependent leakage power in the presence of process variations , 2009, 2009 IEEE International Conference on Computer Design.