Physically Unclonable and Reconfigurable Computing System (PURCS) for Hardware Security Applications
暂无分享,去创建一个
Garrett S. Rose | Badruddoja Majumder | Aysha S. Shanta | Sakib Hasan | Md Sakib Hasan | G. Rose | A. Shanta | M. Majumder | A. S. Shanta
[1] Ramesh Karri,et al. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices , 2018, IEEE Transactions on Emerging Topics in Computing.
[2] Garrett S. Rose,et al. A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering , 2019, Journal of Hardware and Systems Security.
[3] Jeyavijayan Rajendran,et al. A Disquisition on Logic Locking , 2019 .
[4] Garrett S. Rose,et al. Design for Eliminating Operation Specific Power Signatures from Digital Logic , 2019, ACM Great Lakes Symposium on VLSI.
[5] Ozgur Sinanoglu,et al. Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) – Unlocked , 2019, IEEE Transactions on Information Forensics and Security.
[6] Piotr Z. Wieczorek,et al. Chaos-Based Physical Unclonable Functions , 2019, Applied Sciences.
[7] Ankur Srivastava,et al. Anti-SAT: Mitigating SAT Attack on Logic Locking , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[8] Garrett S. Rose,et al. Design of a Reconfigurable Chaos Gate with Enhanced Functionality Space in 65nm CMOS , 2018, 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS).
[9] Makoto Nagata,et al. Supply-Chain Security Enhancement by Chaotic Wireless Chip-Package-Board Interactive PUF , 2018, 2018 IEEE 68th Electronic Components and Technology Conference (ECTC).
[10] Avesta Sasan,et al. LUT-Lock: A Novel LUT-Based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection , 2018, 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[11] Avesta Sasan,et al. SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware , 2018, ACM Great Lakes Symposium on VLSI.
[12] Garrett S. Rose,et al. Chaos computing for mitigating side channel attack , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[13] Takashi Sato,et al. Ising-PUF: A machine learning attack resistant PUF featuring lattice like arrangement of Arbiter-PUFs , 2018, 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[14] Hai Zhou,et al. Double DIP: Re-Evaluating Security of Logic Encryption Algorithms , 2017, ACM Great Lakes Symposium on VLSI.
[15] Meng Li,et al. AppSAT: Approximately deobfuscating integrated circuits , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[16] Garrett S. Rose,et al. Robustness Analysis of a Memristive Crossbar PUF Against Modeling Attacks , 2017, IEEE Transactions on Nanotechnology.
[17] Ramesh Karri,et al. On Improving the Security of Logic Locking , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[18] Taner Tuncer. The implementation of chaos-based PUF designs in field programmable gate array , 2016 .
[19] Yici Cai,et al. Secure and low-overhead circuit obfuscation technique with multiplexers , 2016, 2016 International Great Lakes Symposium on VLSI (GLSVLSI).
[20] Ozgur Sinanoglu,et al. SARLock: SAT attack resistant logic locking , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[21] Behnam Kia,et al. A Simple Nonlinear Circuit Contains an Infinite Number of Functions , 2016, IEEE Transactions on Circuits and Systems II: Express Briefs.
[22] Michael Segal,et al. Optical PUF for Non Forwardable Vehicle Authentication , 2015, 2015 IEEE 14th International Symposium on Network Computing and Applications.
[23] Behnam Kia,et al. Nonlinear dynamics based digital logic and circuits , 2015, Front. Comput. Neurosci..
[24] Sayak Ray,et al. Evaluating the security of logic encryption algorithms , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[25] Igor L. Markov,et al. Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[26] Jeyavijayan Rajendran,et al. Fault Analysis-Based Logic Encryption , 2015, IEEE Transactions on Computers.
[27] Mark Mohammad Tehranipoor,et al. Advanced Analysis of Cell Stability for Reliable SRAM PUFs , 2014, 2014 IEEE 23rd Asian Test Symposium.
[28] Garrett S. Rose. A Chaos-Based Arithmetic Logic Unit and Implications for Obfuscation , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.
[29] Brandon Wang,et al. Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[30] Jeyavijayan Rajendran,et al. VLSI testing based security metric for IC camouflaging , 2013, 2013 IEEE International Test Conference (ITC).
[31] Jean-Pierre Seifert,et al. Breaking and entering through the silicon , 2013, CCS.
[32] Jeyavijayan Rajendran,et al. Security analysis of integrated circuit camouflaging , 2013, CCS.
[33] Subramanian S. Iyer,et al. A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM , 2013, IEEE Journal of Solid-State Circuits.
[34] Ahmad-Reza Sadeghi,et al. Memristor PUFs: A new generation of memory-based Physically Unclonable Functions , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[35] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[36] Jeyavijayan Rajendran,et al. Security analysis of logic obfuscation , 2012, DAC Design Automation Conference 2012.
[37] Jeyavijayan Rajendran,et al. Logic encryption: A fault analysis perspective , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[38] Ingrid Verbauwhede,et al. Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs , 2012, CT-RSA.
[39] G. Edward Suh,et al. Extracting Device Fingerprints from Flash Memory by Exploiting Physical Variations , 2011, TRUST.
[40] Farinaz Koushanfar,et al. Integrated circuits metering for piracy protection and digital rights management: an overview , 2011, GLSVLSI '11.
[41] Abhranil Maiti,et al. Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive , 2011, Journal of Cryptology.
[42] Sudeshna Sinha,et al. Chaogates: morphing logic gates that exploit dynamical patterns. , 2010, Chaos.
[43] Patrick Schaumont,et al. An Analysis of Delay Based PUF Implementations on FPGA , 2010, ARC.
[44] Joseph Zambreno,et al. Preventing IC Piracy Using Reconfigurable Logic Barriers , 2010, IEEE Design & Test of Computers.
[45] Dhruva Acharyya,et al. A physical unclonable function defined using power distribution system equivalent resistance variations , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[46] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[47] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[48] Sudeshna Sinha,et al. Chaos computing: ideas and implementations , 2007, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[49] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[50] P. Dudek,et al. Integrated Circuit Implementation of a Compact Discrete-Time Chaos Generator , 2006 .
[51] Piotr Dudek,et al. Compact discrete-time chaos generator circuit , 2003 .
[52] William L. Ditto,et al. Implementation of nor Gate by a Chaotic Chua's Circuit , 2003, Int. J. Bifurc. Chaos.
[53] William L. Ditto,et al. Chaos computing: implementation of fundamental logical gates by chaotic elements , 2002 .
[54] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[55] Miodrag Potkonjak,et al. Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[56] Gang Qu,et al. Hardware metering , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[57] William L. Ditto,et al. DYNAMICS BASED COMPUTATION , 1998 .
[58] Edoardo Charbon. Hierarchical watermarking in IC design , 1998, Proceedings of the IEEE 1998 Custom Integrated Circuits Conference (Cat. No.98CH36143).