Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
暂无分享,去创建一个
Kaushik Roy | Christos A. Papachristou | Francis G. Wolff | Swarup Bhunia | Rajat Subhra Chakraborty | Somnath Paul | Seetharam Narasimhan | Dongdong Du | K. Roy | S. Bhunia | S. Narasimhan | R. Chakraborty | Dongdong Du | Somnath Paul | F. Wolff | C. Papachristou
[1] A. R. Newton,et al. Alpha-power law MOSFET model and its applications to CMOS inverter delay and other formulas , 1990 .
[2] James Tschanz,et al. Parameter variations and impact on circuits and microarchitecture , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[3] Kaushik Roy,et al. Multiple-parameter CMOS IC testing with increased sensitivity for IDDQ , 2003, IEEE Trans. Very Large Scale Integr. Syst..
[4] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Michael S. Hsiao,et al. A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[6] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[8] John Lach,et al. Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[9] Christos A. Papachristou,et al. MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.
[10] Mark Mohammad Tehranipoor,et al. A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.