High Resolution Pulse Propagation Driven Trojan Detection in Digital Logic: Optimization Algorithms and Infrastructure
暂无分享,去创建一个
[1] Jaume Segura,et al. Analytical modeling of Single Event Transients propagation in combinational logic gates , 2011, 2011 12th European Conference on Radiation and Its Effects on Components and Systems.
[2] Dhruva Acharyya,et al. Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.
[3] Sandeep K. Gupta,et al. Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[4] Prasanna Kumar,et al. Detection of hardware Trojan in SEA using path delay , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[5] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[6] L.W. Massengill,et al. Single-Event Transient Pulse Propagation in Digital CMOS , 2008, IEEE Transactions on Nuclear Science.
[7] Franco Stellari,et al. MARVEL — Malicious alteration recognition and verification by emission of light , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[8] Karem A. Sakallah,et al. Analytical transient response of CMOS inverters , 1992 .
[9] John Lach,et al. Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[10] Kaushik Roy,et al. Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[11] Sandeep K. Gupta,et al. Efficient Trojan Detection via Calibration of Process Variations , 2012, 2012 IEEE 21st Asian Test Symposium.
[12] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[13] Swarup Bhunia,et al. Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.
[14] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[15] Spiridon Nikolaidis,et al. Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices , 1998, IEEE J. Solid State Circuits.
[16] Mark Stephen Anderson,et al. Towards Countering the Rise of the Silicon Trojan , 2008 .
[17] Mark Mohammad Tehranipoor,et al. A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] Mark Mohammad Tehranipoor,et al. BISA: Built-in self-authentication for preventing hardware Trojan insertion , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).