A Formal Approach to Accountability in Heterogeneous Systems-on-Chip
暂无分享,去创建一个
[1] Alptekin Küpçü,et al. Incentivized Outsourced Computation Resistant to Malicious Contractors , 2017, IEEE Transactions on Dependable and Secure Computing.
[2] Kees G. W. Goossens,et al. Transaction-Based Communication-Centric Debug , 2007, First International Symposium on Networks-on-Chip (NOCS'07).
[3] Lisa Spainhower,et al. IBM S/390 Parallel Enterprise Server G5 fault tolerance: A historical perspective , 1999, IBM J. Res. Dev..
[4] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[5] Smruti R. Sarangi,et al. A survey of checker architectures , 2013, CSUR.
[6] Jeyavijayan Rajendran,et al. Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling , 2013, IEEE Transactions on Emerging Topics in Computing.
[7] P. Mishra,et al. Post-Silicon Validation and Debug , 2019 .
[8] Wolfgang Rosenstiel,et al. Measurement of IP qualification costs and benefits , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[9] Todd M. Austin,et al. DIVA: a reliable substrate for deep submicron microarchitecture design , 1999, MICRO-32. Proceedings of the 32nd Annual ACM/IEEE International Symposium on Microarchitecture.
[10] Ranjani Parthasarathi,et al. A Survey on Post-Silicon Functional Validation for Multicore Architectures , 2017, ACM Comput. Surv..
[11] Preeti Ranjan Panda,et al. DHOOM: Reusing Design-for-Debug Hardware for Online Monitoring , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[12] Smruti R. Sarangi,et al. Managing Trace Summaries to Minimize Stalls During Postsilicon Validation , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[13] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[14] K. Xiao,et al. Hardware Trojans , 2016, ACM Trans. Design Autom. Electr. Syst..
[15] Smruti R. Sarangi,et al. SecX: A Framework for Collecting Runtime Statistics for SoCs with Multiple Accelerators , 2015, 2015 IEEE Computer Society Annual Symposium on VLSI.
[16] Swarup Bhunia,et al. Exploiting design-for-debug for flexible SoC security architecture , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[17] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[18] Jeyavijayan Rajendran,et al. High-level synthesis for security and trust , 2013, 2013 IEEE 19th International On-Line Testing Symposium (IOLTS).
[19] Jonathan Graf. Trust games: How game theory can guide the development of hardware Trojan detection methods , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[20] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[21] Smruti R. Sarangi,et al. Providing Accountability in Heterogeneous Systems-on-Chip , 2018, ACM Trans. Embed. Comput. Syst..
[22] Neal Stollon. On-Chip Instrumentation: Design and Debug for Systems on Chip , 2010 .
[23] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.
[24] Ankur Srivastava,et al. Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[25] Lawrence T. Pileggi,et al. Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[26] Katerina J. Argyraki,et al. Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.
[27] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[28] Mark Mohammad Tehranipoor,et al. Case study: Detecting hardware Trojans in third-party digital IP cores , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[29] Samir Chouali,et al. SysML Blocks Adaptation , 2015, ICFEM.
[30] Bart Vermeulen. Functional Debug Techniques for Embedded Systems , 2008, IEEE Design & Test of Computers.
[31] Daniel D. Gajski,et al. Embedded tutorial: essential issues for IP reuse , 2000, ASP-DAC '00.
[32] John Villasenor,et al. Chop shop electronics , 2013, IEEE Spectrum.
[33] Mark Mohammad Tehranipoor,et al. Comparative Analysis of Hardware Obfuscation for IP Protection , 2017, ACM Great Lakes Symposium on VLSI.
[34] Li-wei Wang,et al. Automated IP quality qualification for efficient system-on-chip design , 2012, 2012 13th International Conference on Electronic Packaging Technology & High Density Packaging.