On Database-Free Authentication of Microelectronic Components
暂无分享,去创建一个
Swarup Bhunia | Amit Ranjan Trivedi | Fengchao Zhang | Shubhra Deb Paul | Patanjali Slpsk | S. Bhunia | A. Trivedi | Fengchao Zhang | Patanjali Slpsk
[1] Swarup Bhunia,et al. Robust counterfeit PCB detection exploiting intrinsic trace impedance variations , 2015, 2015 IEEE 33rd VLSI Test Symposium (VTS).
[2] Patrick Schaumont,et al. A design method for remote integrity checking of complex PCBs , 2016, 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Ingrid Verbauwhede,et al. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[4] Swarup Bhunia,et al. Active protection against PCB physical tampering , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).
[5] Takeshi Sugawara,et al. An on-chip glitchy-clock generator for testing fault injection attacks , 2011, Journal of Cryptographic Engineering.
[6] Yu Cao,et al. Modeling and minimization of PMOS NBTI effect for robust nanometer design , 2006, 2006 43rd ACM/IEEE Design Automation Conference.
[7] Mark Tehranipoor,et al. System-Level Counterfeit Detection Using On-Chip Ring Oscillator Array , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[8] Swaroop Ghosh,et al. How Secure Are Printed Circuit Boards Against Trojan Attacks? , 2015, IEEE Design & Test.
[9] James F. Plusquellic,et al. PUF-based authentication , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[10] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[11] Swarup Bhunia,et al. The Hardware Trojan War , 2018 .
[12] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[13] M. Rosenblatt. A CENTRAL LIMIT THEOREM AND A STRONG MIXING CONDITION. , 1956, Proceedings of the National Academy of Sciences of the United States of America.
[14] Lindsay I. Smith,et al. A tutorial on Principal Components Analysis , 2002 .
[15] Mark Mohammad Tehranipoor,et al. SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware , 2017, IEEE Transactions on Dependable and Secure Computing.
[16] Swarup Bhunia,et al. An Intrinsic and Database-Free Authentication by Exploiting Process Variation in Back-End Capacitors , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] Swarup Bhunia,et al. PiRA: IC authentication utilizing intrinsic variations in pin resistance , 2015, 2015 IEEE International Test Conference (ITC).
[18] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[19] Ingrid Verbauwhede,et al. Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS , 2012, 2012 Proceedings of the ESSCIRC (ESSCIRC).
[20] Yu Zheng,et al. SACCI: Scan-Based Characterization Through Clock Phase Sweep for Counterfeit Chip Detection , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[21] S. S. Young,et al. Resampling-Based Multiple Testing: Examples and Methods for p-Value Adjustment , 1993 .
[22] Yu Zheng,et al. DScanPUF: A Delay-Based Physical Unclonable Function Built Into Scan Chain , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[23] Y. Hochberg. A sharper Bonferroni procedure for multiple tests of significance , 1988 .
[24] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[25] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[26] Jie Zhang,et al. BoardPUF: Physical Unclonable Functions for printed circuit board authentication , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[27] Yu Zheng,et al. ScanPUF: Robust ultralow-overhead PUF using scan chain , 2013, 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC).