Post-layout estimation of side-channel power supply signatures
暂无分享,去创建一个
Chintan Patel | Nilanjan Banerjee | Ryan Robucci | Sushmita Kadiyala Rao | Deepak Krishnankutty | C. Patel | R. Robucci | Nilanjan Banerjee | Deepak Krishnankutty | S. K. Rao
[1] KoushanfarFarinaz,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010 .
[2] Jean-Sébastien Coron,et al. Statistics and secret leakage , 2000, TECS.
[3] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Eric Peeters. Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits , 2013 .
[5] Chintan Patel,et al. Framework for dynamic estimation of power-supply noise and path delay , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[8] Mark Mohammad Tehranipoor,et al. RON: An on-chip ring oscillator network for hardware Trojan detection , 2011, 2011 Design, Automation & Test in Europe.
[9] Dhananjay S. Phatak,et al. Defect Simulation Methodology for iDDT Testing , 2006, J. Electron. Test..
[10] Ralph Howard,et al. Data encryption standard , 1987 .
[11] Azadeh Davoodi,et al. A sensor-assisted self-authentication framework for hardware trojan detection , 2012, DATE 2012.
[12] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[13] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[14] Azadeh Davoodi,et al. A sensor-assisted self-authentication framework for hardware trojan detection , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).