VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs
暂无分享,去创建一个
[1] I. Verbauwhede,et al. Circuits and design techniques for secure ICs resistant to side-channel attacks , 2006, 2006 IEEE International Conference on IC Design and Technology.
[2] Mohammad Tehranipoor,et al. IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings , 2008, IEEE International Symposium on Hardware Oriented Security and Trust.
[3] Mark Mohammad Tehranipoor,et al. Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[4] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[5] David Harris,et al. CMOS VLSI Design: A Circuits and Systems Perspective , 2004 .
[6] G.-J. Schrijen,et al. Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection , 2007, 2007 International Conference on Field Programmable Logic and Applications.
[7] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Janusz Rajski,et al. Logic BIST for large industrial designs: real issues and case studies , 1999, International Test Conference 1999. Proceedings (IEEE Cat. No.99CH37034).
[9] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.