Trustworthy Hardware: Identifying and Classifying Hardware Trojans
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Jeyavijayan Rajendran | Ramesh Karri | Kurt Rosenfeld | M. Tehranipoor | R. Karri | Kurt Rosenfeld | Jeyavijayan Rajendran
[1] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[2] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[3] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[4] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[5] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[6] Jarrod A. Roy,et al. Extended abstract: Circuit CAD tools as a security threat , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[8] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[9] Jeyavijayan Rajendran,et al. Towards a comprehensive and systematic classification of hardware Trojans , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[10] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[11] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[12] Y. C. Yeh,et al. Triple-triple redundant 777 primary flight computer , 1996, 1996 IEEE Aerospace Applications Conference. Proceedings.