暂无分享,去创建一个
[1] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[2] Swaroop Ghosh,et al. Methodologies to exploit ATPG tools for de-camouflaging , 2017, 2017 18th International Symposium on Quality Electronic Design (ISQED).
[3] Umut Arslan,et al. Retention time optimization for eDRAM in 22nm tri-gate CMOS technology , 2013, 2013 IEEE International Electron Devices Meeting.
[4] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[5] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[6] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[7] Melvin A. Breuer,et al. Digital systems testing and testable design , 1990 .
[8] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[9] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[11] Swaroop Ghosh,et al. A 1 Gb 2 GHz 128 GB/s Bandwidth Embedded DRAM in 22 nm Tri-Gate CMOS Technology , 2015, IEEE Journal of Solid-State Circuits.
[12] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[13] Reinhard Mayer Falk. Advanced LIVA / TIVA Techniques , 2001 .
[14] Siddharth Garg,et al. Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).