Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection
暂无分享,去创建一个
Phillip H. Jones | Joseph Zambreno | Tim Meyer | Xinying Wang | Justin Rilling | David Graziano | Jamin Hitchcock | J. Zambreno | Xinying Wang | Justin Rilling | David Graziano | Jamin Hitchcock | Tim Meyer
[1] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[2] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[4] John P. Hayes,et al. On-line sensing for healthier FPGA systems , 2010, FPGA '10.
[5] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[6] Jeyavijayan Rajendran,et al. Design and analysis of ring oscillator based Design-for-Trust technique , 2011, 29th VLSI Test Symposium.
[7] Joseph Zambreno,et al. A case study in hardware Trojan design and implementation , 2011, International Journal of Information Security.
[8] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.