Behavior profiling of power distribution networks for runtime hardware trojan detection
暂无分享,去创建一个
Faiq Khalid | Osman Hasan | Syed Rafay Hasan | Falah Awwadl | S. R. Hasan | O. Hasan | Faiq Khalid | Falah Awwadl
[1] Hongwei Luo,et al. Malicious circuitry detection using transient power analysis for IC security , 2013, 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE).
[2] Mark Mohammad Tehranipoor,et al. A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] Mark Mohammad Tehranipoor,et al. A study on the effectiveness of Trojan detection techniques using a red team blue team approach , 2013, 2013 IEEE 31st VLSI Test Symposium (VTS).
[4] Syed Rafay Hasan,et al. Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).
[5] Syed Rafay Hasan,et al. Hardware Trojans in asynchronous FIFO-buffers: From clock domain crossing perspective , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).
[6] Ankur Srivastava,et al. Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[7] Hong Zhao,et al. Applying chaos theory for runtime Hardware Trojan detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[8] Faiq Khalid,et al. A self-learning framework to detect the intruded integrated circuits , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[9] Li-Wei Wang,et al. A power analysis based approach to detect Trojan circuits , 2011, 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.
[10] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[11] Naoya Onizawa,et al. A Low-Energy Variation-Tolerant Asynchronous TCAM for Network Intrusion Detection Systems , 2013, 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems.
[12] Osman Hasan,et al. Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[13] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[14] Ankur Srivastava,et al. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[15] Osman Hasan,et al. Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[16] Mark Mohammad Tehranipoor,et al. Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[17] Chip-Hong Chang,et al. Cluster-based distributed active current timer for hardware Trojan detection , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).