Temperature tracking: An innovative run-time approach for hardware Trojan detection
暂无分享,去创建一个
[1] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[2] Sarita V. Adve,et al. The impact of technology scaling on lifetime reliability , 2004, International Conference on Dependable Systems and Networks, 2004.
[3] Kevin Skadron,et al. Temperature-aware microarchitecture: Modeling and implementation , 2004, TACO.
[4] Yufu Zhang,et al. Adaptive and autonomous thermal tracking for high performance computing systems , 2010, Design Automation Conference.
[5] Kofi A. A. Makinwa,et al. A 1.2V 10µW NPN-based temperature sensor in 65nm CMOS with an inaccuracy of ±0.2°C (3s) from −70°C to 125°C , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).
[6] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Sarma B. K. Vrudhula,et al. Battery Modeling for Energy-Aware System Design , 2003, Computer.
[8] Yufu Zhang,et al. On-chip sensor-driven efficient thermal profile estimation algorithms , 2010, TODE.
[9] Yufu Zhang,et al. Statistical characterization of chip power behavior at post-fabrication stage , 2011, 2011 International Green Computing Conference and Workshops.
[10] J. Junkins,et al. Optimal Estimation of Dynamic Systems , 2004 .
[11] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Cynthia E. Irvine,et al. Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[13] Ankur Srivastava,et al. Energy and thermal-aware video coding via encoder/decoder workload balancing , 2010, 2010 ACM/IEEE International Symposium on Low-Power Electronics and Design (ISLPED).
[14] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] Yufu Zhang,et al. Statistical Framework for Designing On-Chip Thermal Sensing Infrastructure in Nanoscale Systems , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[16] Swarup Bhunia,et al. Improving IC Security Against Trojan Attacks Through Integration of Security Monitors , 2012, IEEE Design & Test of Computers.
[17] Yufu Zhang,et al. Accurate temperature estimation using noisy thermal sensors , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[18] Miodrag Potkonjak,et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.
[19] Mark Mohammad Tehranipoor,et al. Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.
[20] Mark Mohammad Tehranipoor,et al. A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[21] Tajana Simunic,et al. Accurate Temperature Estimation for Efficient Thermal Management , 2008, 9th International Symposium on Quality Electronic Design (isqed 2008).
[22] Miron Abramovici,et al. Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.
[23] David Harris,et al. CMOS VLSI Design: A Circuits and Systems Perspective , 2004 .
[24] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[25] Farinaz Koushanfar,et al. A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.
[26] Yufu Zhang,et al. Leakage-aware Kalman filter for accurate temperature tracking , 2011, 2011 International Green Computing Conference and Workshops.
[27] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.