Real-time trust evaluation in integrated circuits
暂无分享,去创建一个
[1] Giovanni Squillero,et al. RT-Level ITC'99 Benchmarks and First ATPG Results , 2000, IEEE Des. Test Comput..
[2] B. Baykant Alagoz. Fault Masking By Probabilistic Voting , 2009 .
[3] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[4] Yiorgos Makris,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.
[5] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[6] Yiorgos Makris,et al. Experiences in Hardware Trojan design and implementation , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Yiorgos Makris,et al. Post-deployment trust evaluation in wireless cryptographic ICs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[8] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Mark Mohammad Tehranipoor,et al. Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[10] Michael J. Wirthlin,et al. Voter insertion algorithms for FPGA designs using triple modular redundancy , 2010, FPGA '10.
[11] Jeyavijayan Rajendran,et al. Blue team red team approach to hardware trust assessment , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[12] Emmanuelle Encrenaz-Tiphène,et al. Complementary Formal Approaches for Dependability Analysis , 2009, 2009 24th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems.
[13] Daniela De Venuto,et al. International Symposium on Quality Electronic Design , 2005, Microelectron. J..
[14] Yiorgos Makris,et al. Is single-scheme Trojan prevention sufficient? , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[15] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[16] Wenchao Li,et al. Verification-guided soft error resilience , 2007 .
[17] P Reviriego,et al. Automatic insertion of selective TMR for SEU mitigation , 2008, 2008 European Conference on Radiation and Its Effects on Components and Systems.
[18] Kevin J. Nowka,et al. Power gating with multiple sleep modes , 2006, 7th International Symposium on Quality Electronic Design (ISQED'06).