Impact of Dummy Logic Insertion on Xilinx Family for Hardware Trojan Prevention
暂无分享,去创建一个
[1] Mark Mohammad Tehranipoor,et al. BISA: Built-in self-authentication for preventing hardware Trojan insertion , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[2] Yang Yang,et al. A Multi-Layer Hardware Trojan Protection Framework for IoT Chips , 2019, IEEE Access.
[3] Mamata Dalui,et al. Evaluation and Detection of Hardware Trojan for Real-Time Many-Core Systems , 2018, 2018 8th International Symposium on Embedded Computing and System Design (ISED).
[4] Jiliang Zhang,et al. A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[5] Abhijit Chatterjee,et al. Lifetime Prediction and Design-for-Reliability of IC Interconnections with Electromigration Induced Degradation in the Presence of Manufacturing Defects , 2006, J. Electron. Test..
[6] Benjamin Carrion Schafer,et al. Hardware Trojan Detection in Behavioral Intellectual Properties (IP's) Using Property Checking Techniques , 2017, IEEE Transactions on Emerging Topics in Computing.
[7] Subhasish Mitra,et al. The Trojan-proof chip , 2015, IEEE Spectrum.
[8] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[9] M. Tarek Ibn Ziad,et al. Homomorphic Data Isolation for Hardware Trojan Protection , 2015, 2015 IEEE Computer Society Annual Symposium on VLSI.
[10] Morteza Saheb Zamani,et al. Latch-Based Structure: A High Resolution and Self-Reference Technique for Hardware Trojan Detection , 2017, IEEE Transactions on Computers.
[11] Hassan Salmani,et al. COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist , 2017, IEEE Transactions on Information Forensics and Security.
[12] Kwang-Ting Cheng,et al. Detecting hardware Trojans in unspecified functionality through solving satisfiability problems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[13] Jie Zhang,et al. VeriTrust: Verification for Hardware Trust , 2015, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[14] Morteza Saheb Zamani,et al. Improving hardware Trojan detection by retiming , 2015, Microprocess. Microsystems.
[15] Trang Hoang,et al. An Efficient FPGA Implementation of the Advanced Encryption Standard Algorithm , 2012, 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future.
[16] H.-S. Philip Wong,et al. TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[17] Miodrag Potkonjak,et al. Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] William Stallings,et al. Cryptography and network security , 1998 .
[19] Aria Nosratinia,et al. Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks , 2019, IEEE Transactions on Information Forensics and Security.
[20] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[21] Hassan Salmani. The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack , 2018 .
[22] G. Harish,et al. Detection and analysis of hardware trojan using scan chain method , 2015, 2015 19th International Symposium on VLSI Design and Test.
[23] Siavash Bayat Sarmadi,et al. FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic , 2015, IEEE Embedded Systems Letters.
[24] Guochu Shou,et al. High Throughput, Pipelined Implementation of AES on FPGA , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.