Repurposing SoC analog circuitry for additional COTS hardware security
暂无分享,去创建一个
[1] W. Marsden. I and J , 2012 .
[2] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[3] Xuelong Zhang,et al. Design of a reliable PUF circuit based on R-2R ladder digital-to-analog convertor , 2015 .
[4] S. H. Lewis,et al. A pipelined 5-Msample/s 9-bit analog-to-digital converter , 1987 .
[5] K. R. Lakshmikumar,et al. Characterisation and modeling of mismatch in MOS transistors for precision analog design , 1986 .
[6] Sergei Skorobogatov. Flash Memory 'Bumping' Attacks , 2010, CHES.
[7] Sergei P. Skorobogatov,et al. Data Remanence in Flash Memory Devices , 2005, CHES.
[8] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[9] Sergei Skorobogatov,et al. Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy , 2016, CARDIS.
[10] Aurélien Francillon,et al. Half-blind attacks: mask ROM bootloaders are dangerous , 2009 .