Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
暂无分享,去创建一个
Farinaz Koushanfar | Sherief Reda | Abdullah Nazma Nowroz | Kangqiao Hu | F. Koushanfar | S. Reda | Kangqiao Hu
[1] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[2] Miodrag Potkonjak,et al. Gate-level characterization: Foundations and hardware security applications , 2010, Design Automation Conference.
[3] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[4] Chih-Cheng Hsieh,et al. Focal-plane-arrays and CMOS readout techniques of infrared imaging systems , 1997, IEEE Trans. Circuits Syst. Video Technol..
[5] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[6] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Miodrag Potkonjak,et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.
[8] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[10] David Blaauw,et al. Modeling and analysis of leakage power considering within-die process variations , 2002, ISLPED '02.
[11] Kevin Skadron,et al. Temperature-to-power mapping , 2010, 2010 IEEE International Conference on Computer Design.
[12] Jose Renau,et al. Power model validation through thermal measurements , 2007, ISCA '07.
[13] D. Massart,et al. Looking for natural patterns in data: Part 1. Density-based approach , 2001 .
[14] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[15] Miodrag Potkonjak,et al. Securing netlist-level FPGA design through exploiting process variation and degradation , 2012, FPGA '12.
[16] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[17] Sherief Reda,et al. Power Mapping of Integrated Circuits Using AC-Based Thermography , 2013, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] Sherief Reda,et al. Post-silicon power characterization using thermal infrared emissions , 2010, 2010 ACM/IEEE International Symposium on Low-Power Electronics and Design (ISLPED).
[19] Jian Yang,et al. Two-dimensional PCA: a new approach to appearance-based face representation and recognition , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Sherief Reda,et al. Improved Thermal Tracking for Processors Using Hard and Soft Sensor Allocation Techniques , 2011, IEEE Transactions on Computers.
[21] Jose Renau,et al. Characterizing processor thermal behavior , 2010, ASPLOS XV.
[22] Otwin Breitenstein,et al. Lock-in thermography : basics and use for functional diagnostics of electronic components , 2003 .
[23] David Blaauw,et al. Statistical timing analysis using bounds and selective enumeration , 2003, TAU '02.
[24] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[25] E. Cohen,et al. Hotspot-Limited Microprocessors: Direct Temperature and Power Distribution Measurements , 2007, IEEE Journal of Solid-State Circuits.
[26] Miodrag Potkonjak,et al. Hardware Trojan horse detection using gate-level characterization , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[27] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[28] Sherief Reda,et al. Post-silicon power mapping techniques for integrated circuits , 2013, Integr..
[29] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[30] Miodrag Potkonjak,et al. Scalable consistency-based hardware trojan detection and diagnosis , 2011, 2011 5th International Conference on Network and System Security.
[31] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges , 2011, Computer.
[32] Farinaz Koushanfar,et al. A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.
[33] Mark Mohammad Tehranipoor,et al. Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[34] Kevin Skadron,et al. HotSpot: a compact thermal modeling methodology for early-stage VLSI design , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[35] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.