暂无分享,去创建一个
Muhammad Shafique | Faiq Khalid | Osman Hasan | Syed Rafay Hasan | Falah Awwad | S. R. Hasan | M. Shafique | O. Hasan | Faiq Khalid | F. Awwad
[1] Syed Rafay Hasan,et al. Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).
[2] Tinoosh Mohsenin,et al. SVM-based real-time hardware Trojan detection for many-core platform , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).
[3] Axel Poschmann,et al. A signature based architecture for Trojan detection , 2014, WESS '14.
[4] Luigi Carro,et al. Communication architectures for system-on-chip , 2001, Symposium on Integrated Circuits and Systems Design.
[5] Bhagirath Narahari,et al. OS support for detecting Trojan circuit attacks , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[6] Ankur Srivastava,et al. Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[7] Faiq Khalid,et al. Runtime hardware Trojan monitors through modeling burst mode communication using formal verification , 2018, Integr..
[8] Fareena Saqib,et al. Detecting Hardware Trojans Using Delay Analysis , 2018 .
[9] Robert Karam,et al. Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[10] Sylvain Guilley,et al. Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[11] M. Tehranipoor,et al. Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.
[12] Yang Zhang,et al. Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis , 2018, ICCSP.
[13] Ramesh Karri,et al. Hardware Trojan Detection Using the Order of Path Delay , 2018, ACM J. Emerg. Technol. Comput. Syst..
[14] John D. Villasenor,et al. A System-On-Chip Bus Architecture for Thwarting Integrated Circuit Trojan Horses , 2011, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[15] Yannick Chevalier,et al. Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[16] Christof Paar,et al. Stealthy dopant-level hardware Trojans: extended version , 2013, Journal of Cryptographic Engineering.
[17] Marten van Dijk,et al. HaTCh: Hardware Trojan Catcher , 2014, IACR Cryptol. ePrint Arch..
[18] Thomas Korak,et al. On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms , 2014, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[19] Ankur Srivastava,et al. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[20] Swarup Bhunia,et al. Hardware Trojan Detection , 2012 .
[21] Osman Hasan,et al. Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[22] Ioannis M. Kyprianidis,et al. Chaos generator device based on a 32 bit microcontroller embedded system , 2018, 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST).
[23] David Hutchison,et al. Fog computing systems: State of the art, research issues and future trends, with a focus on resilience , 2020, J. Netw. Comput. Appl..
[24] Simha Sethumadhavan,et al. FANCI: identification of stealthy malicious logic using boolean functional analysis , 2013, CCS.
[25] T. Kleinow. Testing continuous time models in financial markets , 2002 .
[26] Morteza Saheb Zamani,et al. Latch-Based Structure: A High Resolution and Self-Reference Technique for Hardware Trojan Detection , 2017, IEEE Transactions on Computers.
[27] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[28] Marco Caccamo,et al. S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems , 2013, HiCoNS '13.
[29] Faiq Khalid,et al. A self-learning framework to detect the intruded integrated circuits , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[30] Saiyu Ren,et al. Hardware Trojan detection by timing measurement: Theory and implementation , 2018, Microelectron. J..
[31] Milos Doroslovacki,et al. Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[32] Avesta Sasan,et al. Special Session: Advances and Throwbacks in Hardware-Assisted Security , 2018, 2018 International Conference on Compilers, Architectures and Synthesis for Embedded Systems (CASES).
[33] Omar S. Elkeelany,et al. Hardware trojans in 3-D ICs due to NBTI effects and countermeasure , 2017, Integr..
[34] Mark Mohammad Tehranipoor,et al. Benchmarking of Hardware Trojans and Maliciously Affected Circuits , 2017, Journal of Hardware and Systems Security.
[35] N Mohankumar,et al. Delay-Based Reference Free Hardware Trojan Detection Using Virtual Intelligence , 2018 .
[36] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[37] Li-Shiuan Peh,et al. A Statistical Traffic Model for On-Chip Interconnection Networks , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.
[38] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[39] Haocheng Ma,et al. Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications , 2019, J. Electron. Test..
[40] Swarup Bhunia,et al. Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise , 2017, J. Electron. Test..
[41] Muhammad Shafique,et al. Intelligent Security Measures for Smart Cyber Physical Systems , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).
[42] Ankur Srivastava,et al. On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[43] Pedro J. Gil,et al. Studying the effects of intermittent faults on a microcontroller , 2012, Microelectron. Reliab..
[44] Osman Hasan,et al. Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[45] Jie Zhang,et al. DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans , 2014, CCS.
[46] Marcel Pelgrom. Nyquist Analog-to-Digital Conversion , 2017 .
[47] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[48] Takeshi Kumaki,et al. Detection technique for hardware Trojans using machine learning in frequency domain , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).
[49] Hong Zhao,et al. Applying chaos theory for runtime Hardware Trojan detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[50] Liang Shi,et al. High-level synthesis for run-time hardware Trojan detection and recovery , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[51] Muhammad Shafique,et al. A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems , 2018, IEEE Access.
[52] Nik Rumzi Nik Idris,et al. Simplified VHDL Coding of Modified Non-Restoring Square Root Calculator , 2012 .
[53] Jing Liu,et al. Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
[54] Tinoosh Mohsenin,et al. Adaptive real-time Trojan detection framework through machine learning , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[55] Omar S. Elkeelany,et al. Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs , 2017, Integr..