Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging
暂无分享,去创建一个
Qihang Shi | Nidish Vashistha | Hangwei Lu | Haoting Shen | Bahar Tehranipoor | Damon L Woodard | Navid Asadizanjani | D. Woodard | N. Asadizanjani | Qihang Shi | Haoting Shen | Hangwei Lu | Nidish Vashistha | Bahar Tehranipoor
[1] Qihang Shi,et al. Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[2] Yu Liu,et al. Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] M. Tehranipoor,et al. Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.
[4] Assia Tria,et al. A high efficiency Hardware Trojan detection technique based on fast SEM imaging , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[5] Mark Mohammad Tehranipoor,et al. A Survey on Chip to System Reverse Engineering , 2016, JETC.
[6] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[7] Seiji Matsuura,et al. Evaluation of variation of root shape of Japanese radish (Raphanus sativus L.) based on image analysis using elliptic Fourier descriptors , 1998, Euphytica.
[8] Dhruva Acharyya,et al. Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.
[9] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[10] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[11] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[12] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[13] Azriel Rosenfeld,et al. Digital Picture Processing , 1976 .
[14] Nidish Vashistha,et al. Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning , 2018, ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis.
[15] Dana H. Ballard,et al. Generalizing the Hough transform to detect arbitrary shapes , 1981, Pattern Recognit..
[16] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] G. Diaz,et al. Elliptic fourier analysis of cell and nuclear shapes. , 1989, Computers and biomedical research, an international journal.
[18] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[19] E. L. Principe,et al. Steps Toward Automated Deprocessing of Integrated Circuits , 2017 .
[20] Ryan M. Rifkin,et al. In Defense of One-Vs-All Classification , 2004, J. Mach. Learn. Res..
[21] Assia Tria,et al. SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection , 2015, 2015 European Conference on Circuit Theory and Design (ECCTD).
[22] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[23] Ajay Joshi,et al. Detecting Hardware Trojans using backside optical imaging of embedded watermarks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[24] Bah-Hwee Gwee,et al. A highly efficient method for extracting FSMs from flattened gate-level netlist , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[25] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[26] Tim Ellis,et al. Recognizing hand gesture using Fourier descriptors , 2004, ICPR 2004.
[27] Tardi Tjahjadi,et al. Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors , 2012, Pattern Recognit..
[28] Ankur Srivastava,et al. On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.
[29] Ming Zhang,et al. Circuit Failure Prediction and Its Application to Transistor Aging , 2007, 25th IEEE VLSI Test Symposium (VTS'07).
[30] R. Xu,et al. IDDQ trending as a precursor to semiconductor failure , 2008, 2008 International Conference on Prognostics and Health Management.
[31] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[32] Qihang Shi,et al. Deterrent Approaches Against Hardware Trojan Insertion , 2018 .
[33] Todd J. Wagner. Hierarchical Layout Verification , 1985, IEEE Design & Test of Computers.
[34] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[35] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.