VeriTrust: Verification for hardware trust
暂无分享,去创建一个
Jie Zhang | Qiang Xu | Feng Yuan | Lingxiao Wei | Zelong Sun | Q. Xu | Lingxiao Wei | Jie Zhang | F. Yuan | Zelong Sun
[1] Mark Mohammad Tehranipoor,et al. Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[2] Li Li,et al. Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures , 2009, TRETS.
[3] Ganesh Gopalakrishnan,et al. Formal Verification of a Complex Pipelined Processor , 2003, Formal Methods Syst. Des..
[4] Swarup Bhunia,et al. Security against hardware Trojan through a novel application of design obfuscation , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[5] Jacob A. Abraham,et al. Automatic decomposition for sequential equivalence checking of system level and RTL descriptions , 2006, Fourth ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2006. MEMOCODE '06. Proceedings..
[6] Jie Li,et al. At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[7] Simha Sethumadhavan,et al. FANCI: identification of stealthy malicious logic using boolean functional analysis , 2013, CCS.
[8] Mark R. Greenstreet,et al. Formal verification in hardware design: a survey , 1999, TODE.
[9] Miodrag Potkonjak,et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.
[10] Gang Wang,et al. Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Farinaz Koushanfar,et al. Consistency-based characterization for IC Trojan detection , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[12] Farinaz Koushanfar,et al. A Unified Submodular Framework for Multimodal IC Trojan Detection , 2010, Information Hiding.
[13] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[14] Miodrag Potkonjak,et al. Synthesis of trustable ICs using untrusted CAD tools , 2010, Design Automation Conference.
[15] Miodrag Potkonjak,et al. Scalable segmentation-based malicious circuitry detection and diagnosis , 2010, 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[16] J. Gabriel. The Defense , 2013 .
[17] Jie Zhang,et al. DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans , 2014, CCS.
[18] Mark R. Beaumont,et al. Hardware Trojans - Prevention, Detection, Countermeasures (A Literature Review) , 2011 .
[19] Mark Mohammad Tehranipoor,et al. Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.
[20] Sergei Skorobogatov,et al. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 2012, CHES.
[21] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[22] Joseph Zambreno,et al. A case study in hardware Trojan design and implementation , 2011, International Journal of Information Security.
[23] Simha Sethumadhavan,et al. Tamper Evident Microprocessors , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] Yiorgos Makris,et al. Experiences in Hardware Trojan design and implementation , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[25] Yiorgos Makris,et al. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.
[26] Jie Zhang,et al. On hardware Trojan design and implementation at register-transfer level , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[27] Claude E. Shannon,et al. The synthesis of two-terminal switching circuits , 1949, Bell Syst. Tech. J..
[28] Miodrag Potkonjak,et al. Gate-level characterization: Foundations and hardware security applications , 2010, Design Automation Conference.
[29] Simha Sethumadhavan,et al. Silencing Hardware Backdoors , 2011, 2011 IEEE Symposium on Security and Privacy.
[30] Tim Güneysu,et al. Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering , 2009, CHES.
[31] David A. Wagner,et al. Defeating UCI: Building Stealthy and Malicious Hardware , 2011, 2011 IEEE Symposium on Security and Privacy.
[32] Jie Zhang,et al. On Trojan side channel design and identification , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[33] Sally Adee,et al. The Hunt For The Kill Switch , 2008, IEEE Spectrum.
[34] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[35] Swarup Bhunia,et al. Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection , 2010, CHES.
[36] Jie Zhang,et al. VeriTrust: Verification for Hardware Trust , 2015, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[37] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[38] Miodrag Potkonjak,et al. Integrated circuit security techniques using variable supply voltage , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[39] Sven Beyer,et al. Complete Formal Verification of TriCore2 and Other Processors , 2007 .
[40] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[41] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).