Hardware Trojan: Threats and emerging solutions
暂无分享,去创建一个
Swarup Bhunia | Rajat Subhra Chakraborty | Seetharam Narasimhan | S. Bhunia | S. Narasimhan | R. Chakraborty
[1] Farinaz Koushanfar,et al. Designer's Hardware Trojan Horse. , 2008, HOST 2008.
[2] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[3] Farinaz Koushanfar,et al. Extended abstract: Designer’s hardware Trojan horse , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[4] Bhagirath Narahari,et al. Providing secure execution environments with a last line of defense against Trojan circuit attacks , 2009, Comput. Secur..
[5] Nathan Kupp,et al. CSAW 2008 Team Report Yale University , 2008 .
[6] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[7] Michael S. Hsiao,et al. VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Bhagirath Narahari,et al. OS support for detecting Trojan circuit attacks , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[9] Tim Güneysu,et al. Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering , 2009, CHES.
[10] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[11] Susmit Jha,et al. Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[12] Lok-Won Kim,et al. A Trojan-resistant system-on-chip bus architecture , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[13] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[14] Mark Mohammad Tehranipoor,et al. Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[15] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[16] Christos A. Papachristou,et al. Dynamic evaluation of hardware trust , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[17] Zhimin Chen,et al. Hardware Trojan Designs on Basys Fpga Board , .
[18] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[19] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[20] Irith Pomeranz,et al. A measure of quality for n-detection test sets , 2004, IEEE Transactions on Computers.
[21] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.
[22] John Lach,et al. Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[23] Swarup Bhunia,et al. On-demand transparency for improving hardware Trojan detectability , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[24] Swarup Bhunia,et al. Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[25] Mark Stephen Anderson,et al. Towards Countering the Rise of the Silicon Trojan , 2008 .
[26] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[27] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[28] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[29] Ryan Kastner,et al. Extended abstract: Trustworthy system security through 3-D integrated hardware , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[30] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[31] Mark Mohammad Tehranipoor,et al. New design strategy for improving hardware Trojan detection and reducing Trojan activation time , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[32] Jia Di,et al. Detecting Malicious Logic Through Structural Checking , 2007, 2007 IEEE Region 5 Technical Conference.