EqSA: A Golden-IC Free Equal Power Self-Authentication for Hardware Trojan Detection
暂无分享,去创建一个
[1] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[2] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Tomokazu Yoneda,et al. An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan , 2017, IEICE Trans. Inf. Syst..
[4] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[5] Kaushik Roy,et al. Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[7] Giorgio Di Natale,et al. On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis , 2013, Inf. Secur. J. A Glob. Perspect..
[8] Azadeh Davoodi,et al. A sensor-assisted self-authentication framework for hardware trojan detection , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[9] Mark Mohammad Tehranipoor,et al. A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[10] Farinaz Koushanfar,et al. Consistency-based characterization for IC Trojan detection , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[11] James Tschanz,et al. Parameter variations and impact on circuits and microarchitecture , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[12] Swarup Bhunia,et al. Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection , 2010, CHES.