CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Domenic Forte | Gustavo K. Contreras | Md. Tauhidur Rahman | Quihang Shi
[1] Swarup Bhunia,et al. Hardware protection and authentication through netlist level obfuscation , 2008, ICCAD 2008.
[2] Mark Mohammad Tehranipoor,et al. ARO-PUF: An aging-resistant ring oscillator PUF design , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Mark Mohammad Tehranipoor,et al. Secure Split-Test for preventing IC piracy by untrusted foundry and assembly , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).
[4] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[5] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..
[6] Brandon Wang,et al. Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges , 2011, Computer.
[8] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[9] Yiorgos Makris,et al. Enhancing security via provably trustworthy hardware intellectual property , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[10] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[11] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[12] Yuval Tamir,et al. Symmetric Crossbar Arbiters for VLSI Communication Switches , 1993, IEEE Trans. Parallel Distributed Syst..
[13] Miodrag Potkonjak,et al. Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[14] Mark Mohammad Tehranipoor,et al. CSST: An Efficient Secure Split-Test for Preventing IC Piracy , 2014, 2014 IEEE 23rd North Atlantic Test Workshop.
[15] M. McLoone,et al. Fast Montgomery modular multiplication and RSA cryptographic processor architectures , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[16] Mark Mohammad Tehranipoor,et al. Bit selection algorithm suitable for high-volume production of SRAM-PUF , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[17] Mark Mohammad Tehranipoor,et al. TI-TRNG: Technology independent true random number generator , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[18] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[19] Berk Sunar,et al. True Random Number Generators for Cryptography , 2009, Cryptographic Engineering.