How secure is split manufacturing in preventing hardware trojan?
暂无分享,去创建一个
Pingqiang Zhou | Zhang Chen | Tsung-Yi Ho | Yier Jin | Z. Chen | Tsung-Yi Ho | Yier Jin | Pingqiang Zhou
[1] Dick James,et al. The state-of-the-art in semiconductor reverse engineering , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[2] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[3] Julien Francq,et al. Introduction to hardware Trojan detection methods , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Yu Wang,et al. A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Yiqiang Zhao,et al. Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[6] Georg Sigl,et al. Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..
[7] Yier Jin,et al. Introduction to Hardware Security , 2015, Electronics.
[8] Jeyavijayan Rajendran,et al. Towards a comprehensive and systematic classification of hardware Trojans , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[9] Swarup Bhunia,et al. HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[10] John P. Hayes,et al. Unveiling the ISCAS-85 Benchmarks: A Case Study in Reverse Engineering , 1999, IEEE Des. Test Comput..
[11] Jeyavijayan Rajendran,et al. The cat and mouse in split manufacturing , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[12] Azadeh Davoodi,et al. Are proximity attacks a threat to the security of split manufacturing of integrated circuits? , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[13] Abhijit Chatterjee,et al. A new simultaneous circuit partitioning and chip placement approach based on simulated annealing , 1991, DAC '90.
[14] Yongqiang Lyu,et al. A Survey of Hardware Trojan Detection, Diagnosis and Prevention , 2015, 2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics).
[15] Lawrence T. Pileggi,et al. Building trusted ICs using split fabrication , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[16] Chris C. N. Chu,et al. FastPlace 3.0: A Fast Multilevel Quadratic Placement Algorithm with Placement Congestion Control , 2007, 2007 Asia and South Pacific Design Automation Conference.
[17] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[18] Qiang Liu,et al. A survey of hardware Trojan threat and defense , 2016, Integr..
[19] Lawrence T. Pileggi,et al. Detecting reliability attacks during split fabrication using test-only BEOL stack , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[20] Dick James,et al. Reverse Engineering in the Semiconductor Industry , 2007, 2007 IEEE Custom Integrated Circuits Conference.
[21] Jarrod A. Roy,et al. Ending Piracy of Integrated Circuits , 2010, Computer.
[22] Carl Sechen. Chip-planning, placement, and global routing of macro/custom cell integrated circuits using simulated annealing , 1988, 25th ACM/IEEE, Design Automation Conference.Proceedings 1988..
[23] Sanjit A. Seshia,et al. Reverse engineering circuits using behavioral pattern mining , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[24] Peter Gadfort,et al. Split-fabrication obfuscation: Metrics and techniques , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[25] Siddharth Garg,et al. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation , 2013, USENIX Security Symposium.
[26] Jeyavijayan Rajendran,et al. Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[27] Jeyavijayan Rajendran,et al. Is split manufacturing secure? , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[28] Ankur Srivastava,et al. Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy , 2017, Computer.