Rethinking split manufacturing: An information-theoretic approach with secure layout techniques
暂无分享,去创建一个
Ozgur Sinanoglu | Siddharth Garg | Abhrajit Sengupta | Johann Knechtel | Satwik Patnaik | Mohammed Ashraf | O. Sinanoglu | S. Garg | M. Ashraf | Satwik Patnaik | A. Sengupta | J. Knechtel
[1] Jonathan Tse,et al. Automatic obfuscated cell layout for trusted split-foundry design , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[2] Franz Franchetti,et al. Efficient and secure intellectual property (IP) design with split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[4] Jiang Hu,et al. Routing perturbation for enhanced security in split manufacturing , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[5] Lawrence T. Pileggi,et al. Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[6] Azadeh Davoodi,et al. Are Proximity Attacks a Threat to the Security of Split Manufacturing of Integrated Circuits? , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[7] Marek Patyra,et al. Impact of Local Interconnects on Timing and Power in a High Performance Microprocessor , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[8] David A. Basin,et al. An information-theoretic model for adaptive side-channel attacks , 2007, CCS '07.
[9] Lawrence T. Pileggi,et al. Detecting reliability attacks during split fabrication using test-only BEOL stack , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[10] Nadine Gottschalk,et al. Vlsi Physical Design From Graph Partitioning To Timing Closure , 2016 .
[11] Ramesh Karri,et al. A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.
[12] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[13] Peter Gadfort,et al. Split-fabrication obfuscation: Metrics and techniques , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[14] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[15] Jeyavijayan Rajendran,et al. The cat and mouse in split manufacturing , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[16] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).