Hardware obfuscation using PUF-based logic
暂无分享,去创建一个
[1] Dick James,et al. The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[2] Miodrag Potkonjak,et al. Secure remote sensing and communication using digital PUFs , 2014, 2014 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).
[3] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[4] Miodrag Potkonjak,et al. The bidirectional polyomino partitioned PPUF as a hardware security primitive , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[5] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[6] David Bryan,et al. Combinational profiles of sequential benchmark circuits , 1989, IEEE International Symposium on Circuits and Systems,.
[7] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[8] Miodrag Potkonjak,et al. Nanotechnology-based trusted remote sensing , 2011, 2011 IEEE SENSORS Proceedings.
[9] Beatrice Fraboni,et al. Layout reconstruction of complex silicon chips , 1993 .
[10] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[11] Miodrag Potkonjak,et al. Matched Digital PUFs for Low Power Security in Implantable Medical Devices , 2014, 2014 IEEE International Conference on Healthcare Informatics.
[12] Miodrag Potkonjak,et al. Remote activation of ICs for piracy prevention and digital right management , 2007, 2007 IEEE/ACM International Conference on Computer-Aided Design.
[13] Giovanni Squillero,et al. RT-Level ITC'99 Benchmarks and First ATPG Results , 2000, IEEE Des. Test Comput..
[14] Miodrag Potkonjak,et al. Digital bimodal function: An ultra-low energy security primitive , 2013, International Symposium on Low Power Electronics and Design (ISLPED).
[15] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[16] Koji Nakamae,et al. Automatic recognition of defect areas on a semiconductor wafer using multiple scanning electron microscope images , 2009 .
[17] Miodrag Potkonjak,et al. A secure and unclonable embedded system using instruction-level PUF authentication , 2014, 2014 24th International Conference on Field Programmable Logic and Applications (FPL).
[18] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[19] F. Brglez,et al. A neutral netlist of 10 combinational benchmark circuits and a target translator in FORTRAN , 1985 .
[20] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[21] Jean-Pierre Seifert,et al. Breaking and entering through the silicon , 2013, CCS.
[22] Miodrag Potkonjak,et al. Public Physical Unclonable Functions , 2014, Proceedings of the IEEE.
[23] Boris Skoric,et al. Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions , 2009, Inf. Syst. Frontiers.
[24] Ashish Tiwari,et al. WordRev: Finding word-level structures in a sea of bit-level gates , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[25] Sharad Malik,et al. Reverse engineering digital circuits using functional analysis , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[26] Erich Barke,et al. A Technology Independent Block Extraction Algorithm , 1984, 21st Design Automation Conference Proceedings.
[27] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[28] Miodrag Potkonjak,et al. Robust and flexible FPGA-based digital PUF , 2014, 2014 24th International Conference on Field Programmable Logic and Applications (FPL).
[29] Jean-Pierre Seifert,et al. Functional integrated circuit analysis , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[30] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.