The Big Hack Explained
暂无分享,去创建一个
Damon L. Woodard | Hangwei Lu | Navid Asadizanjani | Mark Tehranipoor | Mir Tanjidur Rahman | Olivia P. Paradis | Dhwani Mehta | Mukhil Azhagan M. S. | M. Tanjidur Rahman | Yousef Iskander | Praveen Chawla | D. Woodard | M. Tehranipoor | N. Asadizanjani | Dhwani Mehta | Hangwei Lu | Praveen Chawla | Yousef Iskander
[1] Yafang Xue,et al. Optical Character Recognition , 2022 .
[2] Aditya Gupta. JTAG Debugging and Exploitation , 2019 .
[3] Ian S. Anderson,et al. Neutron Imaging and Applications , 2009 .
[4] Vinod K. Agarwal,et al. Testing and diagnosis of interconnects using boundary scan architecture , 1988, International Test Conference 1988 Proceeding@m_New Frontiers in Testing.
[5] Mark Mohammad Tehranipoor,et al. Investigation of obfuscation-based anti-reverse engineering for printed circuit boards , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] J. M. Lloyd,et al. Thermal Imaging Systems , 1975 .
[7] Tao Peng,et al. Algorithms and models for 3-D shape measurement using digital fringe projections , 2007 .
[8] Ujjwal Guin,et al. Counterfeit Integrated Circuits , 2015 .
[9] SeungGeun Youn,et al. Automatic classification of SMD packages using neural network , 2014, 2014 IEEE/SICE International Symposium on System Integration.
[10] M. Nuss,et al. Imaging with terahertz waves. , 1995, Optics letters.
[11] Waleed Khalil,et al. Defense-in-Depth: A Recipe for Logic Locking to Prevail , 2019, Integr..
[12] O.M. Ramahi,et al. Electromagnetic interference (EMI) reduction from printed circuit boards (PCB) using electromagnetic bandgap structures , 2004, IEEE Transactions on Electromagnetic Compatibility.
[13] Swarup Bhunia,et al. Hardware Security: A Hands-on Learning Approach , 2018 .
[14] Jason Geng,et al. Structured-light 3D surface imaging: a tutorial , 2011 .
[15] Ujjwal Guin,et al. Invasion of the hardware snatchers , 2017, IEEE Spectrum.
[16] Navid Asadizanjani,et al. Non-Destructive PCB Reverse Engineering Using X-Ray Micro Computed Tomography , 2015, International Symposium for Testing and Failure Analysis.
[17] Mark Mohammad Tehranipoor,et al. A Survey on Chip to System Reverse Engineering , 2016, JETC.
[18] TsunekawaShou,et al. Automatic PCB Inspection Algorithms , 1996 .
[19] R. Smith,et al. An Overview of the Tesseract OCR Engine , 2007, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).
[20] Domenic Forte,et al. EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering , 2019, ArXiv.
[21] James C. Wyant,et al. White light interferometry , 2002, SPIE Defense + Commercial Sensing.
[22] C. Quate,et al. Acoustic microscope—scanning version , 1974 .
[23] Michael Vollmer,et al. Infrared Thermal Imaging: Fundamentals, Research and Applications , 2010 .
[24] Huihui. Wu,et al. Automated visual inspection of surface mounted chip components , 2010, 2010 IEEE International Conference on Mechatronics and Automation.
[25] Cihan H. Dagli,et al. Automatic PCB Inspection Algorithms: A Survey , 1996, Comput. Vis. Image Underst..
[26] Simon Kind,et al. Advanced Technologies in Life Cycle Engineering , 2014 .
[27] K. Dransfeld,et al. Scanning near-field acoustic microscopy , 1989 .
[28] J. Grzyb,et al. All-silicon integrated THz harmonic source and receiver components for future active imaging modalities , 2014, 2014 39th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz).
[29] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[30] G. Hroundas. Economics of Bare Printed Circuit Board Testing , 1986 .
[31] Ray Smith. An Overview of the Tesseract OCR Engine , 2007 .
[32] T. Feng,et al. Penetrative imaging of sub-surface microstructures with a near-field microwave microscope , 2014 .
[33] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[34] Georg Sigl,et al. Secure Physical Enclosures from Covers with Tamper-Resistance , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[35] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[36] Ramesh Karri,et al. Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.
[37] Hojjat Adeli,et al. A New Approach for Health Monitoring of Structures: Terrestrial Laser Scanning , 2007, Comput. Aided Civ. Infrastructure Eng..
[38] A. Verma. Optimizing test strategies during PCB design for boards with limited ICT access , 2002, 27th Annual IEEE/SEMI International Electronics Manufacturing Technology Symposium.
[39] Ramesh Karri,et al. Security and Testing , 2012 .
[40] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[41] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[42] Paolo Cignoni,et al. A low cost 3D scanner based on structured light , 2001 .