VLSI testing based security metric for IC camouflaging
暂无分享,去创建一个
Jeyavijayan Rajendran | Ramesh Karri | Ozgur Sinanoglu | O. Sinanoglu | R. Karri | Jeyavijayan Rajendran
[1] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[2] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[3] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[4] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[5] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[6] Dong Sam Ha,et al. HOPE: an efficient parallel fault simulator for synchronous sequential circuits , 1992, DAC '92.
[7] Dick James,et al. The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[8] Neil Walkinshaw,et al. Reverse-Engineering Software Behavior , 2013, Adv. Comput..