Non-Invasive Recognition of Poorly Resolved Integrated Circuit Elements
暂无分享,去创建一个
[1] Costas J. Spanos,et al. Fundamentals of Semiconductor Manufacturing and Process Control: May/Fundamentals of Semiconductor Manufacturing and Process Control , 2006 .
[2] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[3] Bennett B. Goldberg,et al. Theoretical analysis of numerical aperture increasing lens microscopy , 2005 .
[4] Hongtao Cui,et al. Non Destructive Failure Analysis Technique With a Laboratory Based 3D X-ray Nanotomography System , 2006 .
[5] G. S. Kino,et al. Solid immersion lens , 1999, Other Conferences.
[6] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Mark Mohammad Tehranipoor,et al. Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection , 2012, IEEE Transactions on Information Forensics and Security.
[8] Ralf Schweizer. Elements Of Modern Optical Design , 2016 .
[9] Edward I. Cole,et al. Novel failure analysis techniques using photon probing with a scanning optical microscope , 1994, Proceedings of 1994 IEEE International Reliability Physics Symposium.
[10] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges , 2011, Computer.
[11] H. Livingston. Avoiding Counterfeit Electronic Components , 2007, IEEE Transactions on Components and Packaging Technologies.
[12] Colin Studholme,et al. An overlap invariant entropy measure of 3D medical image alignment , 1999, Pattern Recognit..
[13] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[14] D. P. Vallett. Failure analysis requirements for nanoelectronics , 2002 .
[15] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[16] Vincent Lepetit,et al. BRIEF: Binary Robust Independent Elementary Features , 2010, ECCV.
[17] Ian McNulty,et al. Tomographic reconstruction of an integrated circuit interconnect , 1999 .
[18] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[19] Miodrag Potkonjak,et al. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach , 2008, Information Hiding.
[20] Cordelia Schmid,et al. A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Costas J. Spanos,et al. Fundamentals of Semiconductor Manufacturing and Process Control , 2006 .
[22] Gabriela Csurka,et al. Visual categorization with bags of keypoints , 2002, eccv 2004.
[23] Richard Szeliski,et al. Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.
[24] Vincent Lepetit,et al. DAISY: An Efficient Dense Descriptor Applied to Wide-Baseline Stereo , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Rosalinda M. Ring,et al. Resistive interconnection localization , 2002, Proceedings of the 9th International Symposium on the Physical and Failure Analysis of Integrated Circuits (Cat. No.02TH8614).
[26] Eric R. Ziegel,et al. The Elements of Statistical Learning , 2003, Technometrics.
[27] D.P. Vallett. Why Waste Time on Roadmaps When We Don't Have Cars? , 2007, IEEE Transactions on Device and Materials Reliability.
[28] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[29] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[30] Paiboon Tangyunyong,et al. Soft defect localization (SDL) in integrated circuits using laser scanning microscopy , 2003, The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003..