IP watermark verification based on power consumption analysis
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Watermarking graph partitioning solutions , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[2] Miodrag Potkonjak,et al. Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[3] Bertrand Le Gal,et al. Automatic low-cost IP watermarking technique based on output mark insertions , 2012, Des. Autom. Embed. Syst..
[4] Vincent Rijmen,et al. The Advanced Encryption Standard Process , 2002 .
[5] Christof Paar,et al. Side-channel based watermarks for integrated circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Celia Gorman,et al. Counterfeit chips on the rise , 2012 .
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Gang Qu,et al. Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[9] Rajat Subhra Chakraborty,et al. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan , 2012, IEEE Design & Test of Computers.
[10] Lilian Bossuet,et al. SALWARE: Salutary Hardware to design Trusted IC. , 2013 .
[11] Yiorgos Makris,et al. Counterfeit electronics: A rising threat in the semiconductor manufacturing industry , 2013, 2013 IEEE International Test Conference (ITC).
[12] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[13] Ingrid Verbauwhede,et al. Analysis and design of active IC metering schemes , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[14] Edoardo Charbon,et al. Watermarking-based copyright protection of sequential functions , 1999 .
[15] Amr T. Abdel-Hamid,et al. A Survey on IP Watermarking Techniques , 2004, Des. Autom. Embed. Syst..
[16] I. Torunoglu,et al. Watermarking-based copyright protection of sequential functions , 2000, IEEE Journal of Solid-State Circuits.
[17] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[18] François Durvaux,et al. Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[19] C. Hung,et al. An Locking and Unlocking Primitive Function of FSM-modeled Sequential Systems Based on Extracting Logical Property , 2013 .
[20] M. Pecht,et al. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.