Self Aware SoC Security to Counteract Delay Inducing Hardware Trojans at Runtime
暂无分享,去创建一个
Amlan Chakrabarti | Debasri Saha | Krishnendu Guha | Debasri Saha | A. Chakrabarti | Krishnendu Guha
[1] Yiorgos Makris,et al. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.
[2] Yousra Alkabani,et al. System-level protection and hardware Trojan detection using weighted voting☆ , 2013, Journal of advanced research.
[3] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[4] Amlan Chakrabarti,et al. RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks , 2015, 2015 19th International Symposium on VLSI Design and Test.
[5] A. Stierle,et al. Designing Collective Behavior in a Termite-Inspired Robot Construction Team , 2014, Science.
[6] Jeyavijayan Rajendran,et al. Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling , 2013, IEEE Transactions on Emerging Topics in Computing.
[7] Christos A. Papachristou,et al. Dynamic evaluation of hardware trust , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..
[9] QingXiang Wu,et al. Development of FPGA Toolbox for Implementation of Spiking Neural Networks , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[10] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[11] Mark Mohammad Tehranipoor,et al. Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection , 2012, IEEE Transactions on Information Forensics and Security.
[12] Srinivas Devadas,et al. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching , 2014, IEEE Transactions on Emerging Topics in Computing.
[13] Puneet Gupta,et al. CyberPhysical-System-On-Chip (CPSoC): A self-aware MPSoC paradigm with cross-layer virtual sensing and actuation , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[14] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[15] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.