Reverse Engineering for 2.5-D Split Manufactured ICs
暂无分享,去创建一个
[1] Ryan Kastner,et al. A 3-D Split Manufacturing Approach to Trustworthy System Development , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[2] Mark Mohammad Tehranipoor,et al. Efficient and secure split manufacturing via obfuscated built-in self-authentication , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[3] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[4] Ozgur Sinanoglu,et al. Raise Your Game for Split Manufacturing: Restoring the True Functionality Through BEOL , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[5] Joungho Kim,et al. Signal Integrity Design and Analysis of Silicon Interposer for GPU-Memory Channels in High-Bandwidth Memory Interface , 2018, IEEE Transactions on Components, Packaging and Manufacturing Technology.
[6] Jeyavijayan Rajendran,et al. The cat and mouse in split manufacturing , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[7] Chang-Chi Lee,et al. An Overview of the Development of a GPU with Integrated HBM on Silicon Interposer , 2016, 2016 IEEE 66th Electronic Components and Technology Conference (ECTC).
[8] Yuan Xie,et al. Cost-efficient 3D Integration to Hinder Reverse Engineering During and After Manufacturing , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[9] Peter Gadfort,et al. Split-fabrication obfuscation: Metrics and techniques , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[10] Paul Pettersson,et al. Tools and Algorithms for the Construction and Analysis of Systems: 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part II , 1998, TACAS.
[11] V. Sundaram,et al. Low cost, high performance, and high reliability 2.5D silicon interposer , 2013, 2013 IEEE 63rd Electronic Components and Technology Conference.
[12] Lawrence T. Pileggi,et al. Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[13] Ankur Srivastava,et al. Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy , 2017, Computer.
[14] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[15] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[16] Xiangyu Zhang,et al. Incremental SAT-Based Reverse Engineering of Camouflaged Logic Circuits , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Ankur Srivastava,et al. 3D/2.5D IC-Based Obfuscation , 2017 .
[18] Ozgur Sinanoglu,et al. Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[19] Ankur Srivastava,et al. Security-Aware Design Flow for 2.5D IC Technology , 2015, TrustED@CCS.