Hardware authentication leveraging performance limits in detailed simulations and emulations
暂无分享,去创建一个
[1] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[2] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[3] Ram Krishnamurthy,et al. A 25 GHz 32 b integer-execution core in 130 nm dual-V/sub T/ CMOS , 2002 .
[4] Aharon Aharon,et al. Test Program Generation for Functional Verification of PowePC Processors in IBM , 1995, 32nd Design Automation Conference.
[5] Derek Chiou,et al. FPGA-based Fast , Cycle-Accurate , Full-System Simulators , 2006 .
[6] Josep Torrellas,et al. Designing Hardware that Supports Cycle-Accurate Deterministic Replay , 2006 .
[7] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] M. Suzuoki,et al. Importance of CAD tools and methodologies in high speed CPU design , 2000, Proceedings 2000. Design Automation Conference. (IEEE Cat. No.00CH37106).
[9] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Sanjay J. Patel,et al. Characterizing the effects of transient faults on a high-performance processor pipeline , 2004, International Conference on Dependable Systems and Networks, 2004.
[11] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[12] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[13] Masato Nagamatsu,et al. Importance of CAD tools and methodology in high speed CPU design: invited talk , 2000, ASP-DAC '00.