Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
暂无分享,去创建一个
Mark Mohammad Tehranipoor | Michael S. Hsiao | James F. Plusquellic | Swarup Bhunia | Dakshi Agrawal | Miron Abramovici | Paul Bradley
[1] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[2] Mark Mohammad Tehranipoor,et al. Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection , 2012, IEEE Transactions on Information Forensics and Security.
[3] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] H. V. Trees. Detection, Estimation, And Modulation Theory , 2001 .
[5] Dhruva Acharyya,et al. Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.
[6] Jeyavijayan Rajendran,et al. Design and analysis of ring oscillator based Design-for-Trust technique , 2011, 29th VLSI Test Symposium.
[7] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[8] PlusquellicJim,et al. Detecting Trojans through leakage current analysis using multiple supply pad IDDQS , 2010 .
[9] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[10] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[11] D. Acharyya,et al. Calibrating power supply signal measurements for process and probe card variations , 2004, Proceedings. 2004 IEEE International Workshop on Current and Defect Based Testing (IEEE Cat. No.04EX1004).
[12] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[13] Thomas L. Marzetta,et al. Detection, Estimation, and Modulation Theory , 1976 .
[14] Melvin A. Breuer,et al. Digital systems testing and testable design , 1990 .
[15] Eric Rotenberg,et al. Assertion-Based Microarchitecture Design for Improved Fault Tolerance , 2006, 2006 International Conference on Computer Design.
[16] A. Gualtierotti. H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .
[17] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[18] John Lach,et al. Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[19] Mark Mohammad Tehranipoor,et al. A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits , 2010, 2010 IEEE International Workshop on Information Forensics and Security.