Guided Electromagnetic Wave Technique for IC Authentication
暂无分享,去创建一个
[1] Thomas O. Boucher,et al. Reliability, validity, and imprecision in fuzzy multicriteria decision-making , 2002, IEEE Trans. Syst. Man Cybern. Part C.
[2] Ayman I. Kayssi. Macromodeling C- and RC-loaded CMOS inverters for timing analysis , 1996, Proceedings of the Sixth Great Lakes Symposium on VLSI.
[3] Etienne Perret,et al. Towards a robust and efficient EM based authentication of FPGA against counterfeiting and recycling , 2017, 2017 19th International Symposium on Computer Architecture and Digital Systems (CADS).
[4] Etienne Perret,et al. Radiated Electromagnetic Emission for Integrated Circuit Authentication , 2017, IEEE Microwave and Wireless Components Letters.
[5] Ingrid Verbauwhede,et al. PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.
[6] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[7] Etienne Perret,et al. Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique , 2018, 2018 IEEE 3rd International Verification and Security Workshop (IVSW).
[8] Patrick Bas,et al. Physical object authentication: Detection-theoretic comparison of natural and artificial randomness , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[9] H. Otake,et al. Circuit simulation of a silicon-carbide MOSFET considering the effect of the parasitic elements on circuit boards by using S-parameters , 2018, 2018 IEEE Applied Power Electronics Conference and Exposition (APEC).
[10] Kaushik Roy,et al. Parameter Variation Tolerance and Error Resiliency: New Design Paradigm for the Nanoscale Era , 2010, Proceedings of the IEEE.
[12] Domenic Forte,et al. Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs , 2014, VLSI Design.
[13] Ulrich Rührmair,et al. PUFs in Security Protocols: Attack Models and Security Evaluations , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] Alanson P. Sample,et al. EM-ID: Tag-less identification of electrical devices via electromagnetic emissions , 2016, 2016 IEEE International Conference on RFID (RFID).
[15] Dylan F. Williams,et al. The Relationship Between Switch-Term-Corrected Scattering-Parameters and Wave-Parameters Measured With a Two-Port Vector Network Analyzer , 2018, IEEE Microwave and Wireless Components Letters.
[16] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[17] C. Hagleitner,et al. Multi-transducer recordings from a single-chip gas sensor system coated with different polymers , 2003, TRANSDUCERS '03. 12th International Conference on Solid-State Sensors, Actuators and Microsystems. Digest of Technical Papers (Cat. No.03TH8664).
[18] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[19] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..
[20] Yiorgos Makris,et al. Counterfeit electronics: A rising threat in the semiconductor manufacturing industry , 2013, 2013 IEEE International Test Conference (ITC).
[21] Glenn E. R. Cowan,et al. A circuit design and fabrication approach to address global process variation , 2009, 2009 52nd IEEE International Midwest Symposium on Circuits and Systems.
[22] Etienne Perret,et al. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions , 2019, J. Hardw. Syst. Secur..
[23] Franco Stellari,et al. Counterfeit IC detection using light emission , 2014, 2014 International Test Conference.
[24] Sheldon X.-D. Tan,et al. EM-based on-chip aging sensor for detection and prevention of counterfeit and recycled ICs , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).