CSST: An Efficient Secure Split-Test for Preventing IC Piracy
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Domenic Forte | Gustavo K. Contreras | Md. Tauhidur Rahman | Quihang Shi
[1] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[2] Swarup Bhunia,et al. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation , 2010, 2010 23rd International Conference on VLSI Design.
[3] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[4] Yuval Tamir,et al. Symmetric Crossbar Arbiters for VLSI Communication Switches , 1993, IEEE Trans. Parallel Distributed Syst..
[5] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[6] Mark Mohammad Tehranipoor,et al. TI-TRNG: Technology independent true random number generator , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[7] D.M.H. Walker,et al. Large integrated crossbar switch , 1995, Proceedings IEEE International Conference on Wafer Scale Integration (ICWSI).
[8] M. McLoone,et al. Fast Montgomery modular multiplication and RSA cryptographic processor architectures , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[9] Mark Mohammad Tehranipoor,et al. ARO-PUF: An aging-resistant ring oscillator PUF design , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[10] G. Edward Suh,et al. Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[11] Farinaz Koushanfar,et al. Active Hardware Metering for Intellectual Property Protection and Security , 2007, USENIX Security Symposium.
[12] Gang Qu,et al. Hardware metering , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[13] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[14] Mark Mohammad Tehranipoor,et al. Anti-counterfeit Techniques: From Design to Resign , 2013, 2013 14th International Workshop on Microprocessor Test and Verification.
[15] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[16] Mark Mohammad Tehranipoor,et al. Secure Split-Test for preventing IC piracy by untrusted foundry and assembly , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).
[17] Berk Sunar,et al. True Random Number Generators for Cryptography , 2009, Cryptographic Engineering.