-
1
-
-
44449083733
-
The hunt for the kill switch
-
Adee S. The hunt for the kill switch. IEEE Spectrum (May 2008)
-
(2008)
IEEE Spectrum
-
-
Adee, S.1
-
2
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
May
-
Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B. Trojan detection using IC fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy; May 2007. p. 296-310.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
0036469652
-
SimpleScalar: An infrastructure for computer system modelling
-
February
-
Austin T, Larson E, Ernst D. SimpleScalar: an infrastructure for computer system modelling. IEEE Computer Society; February 2001. p. 59-67.
-
(2001)
IEEE Computer Society
, pp. 59-67
-
-
Austin, T.1
Larson, E.2
Ernst, D.3
-
7
-
-
70349447201
-
-
High Performance Microchip Supply. Defense Science Board; 2005.
-
High Performance Microchip Supply. Defense Science Board; 2005.
-
-
-
-
8
-
-
48049084349
-
A hardware threat modeling concept for trustable integrated circuits
-
April
-
Di J, Smith S. A hardware threat modeling concept for trustable integrated circuits. IEEE Region 5 Technical Conference; April 2007.
-
(2007)
IEEE Region 5 Technical Conference
-
-
Di, J.1
Smith, S.2
-
9
-
-
0038341105
-
Silicon physical random functions
-
Washington, DC; November
-
Gassend B, Clarke D, van Dijk M, Devadas S. Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC; November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
10
-
-
74049142169
-
CODESSEAL: A compiler/FPGA approach to secure applications
-
ISI
-
Gelbart O, Ott P, Narahari B, Simha R, Choudhary A, Zambreno J. CODESSEAL: a compiler/FPGA approach to secure applications. In: Proceedings of the IEEE Conference on Intelligence and Security Informatics (ISI); 2005.
-
(2005)
Proceedings of the IEEE Conference on Intelligence and Security Informatics
-
-
Gelbart, O.1
Ott, P.2
Narahari, B.3
Simha, R.4
Choudhary, A.5
Zambreno, J.6
-
11
-
-
51349157060
-
-
Gelbart O, Leontie E, Narahari B, Simha R. Architectural support for securing application data in embedded systems, IEEE International Conference on Electro/Information Technology, 2008. EIT 2008; 18-20 May 2008. p. 19-24.
-
Gelbart O, Leontie E, Narahari B, Simha R. Architectural support for securing application data in embedded systems, IEEE International Conference on Electro/Information Technology, 2008. EIT 2008; 18-20 May 2008. p. 19-24.
-
-
-
-
12
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
-
ISC
-
Grembowski T, Lien R, Gaj K, Nguyen N, Bellows P, Flidr J, et al. Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In: Proceedings of the International Conference on Information Security (ISC); 2002. p. 75-89.
-
(2002)
Proceedings of the International Conference on Information Security
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
et al7
-
13
-
-
84962779213
-
MiBench: A free, commercially representative embedded benchmark suite
-
December
-
Guthaus MR, Ringenberg JS, Ernst D, Austin TM, Mudge T, Brown RB. MiBench: a free, commercially representative embedded benchmark suite. In: Proceedings of 4th IEEE Workshop on Workload Characterization; December 2001. p. 10-22.
-
(2001)
Proceedings of 4th IEEE Workshop on Workload Characterization
, pp. 10-22
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
-
14
-
-
34547340370
-
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
-
Huffmire T, Brotherton B, Wang G, Sherwood T, Kastner R, Levin T, et al. Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy SP'07; 2007. p. 281-95.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy SP'07
, pp. 281-295
-
-
Huffmire, T.1
Brotherton, B.2
Wang, G.3
Sherwood, T.4
Kastner, R.5
Levin, T.6
et al7
-
15
-
-
70349457258
-
-
Innovation at risk: Intellectual Property Challenges and Opportunities, Semiconductor Equipment and Materials Industry (SEMI); 2008.
-
Innovation at risk: Intellectual Property Challenges and Opportunities, Semiconductor Equipment and Materials Industry (SEMI); 2008.
-
-
-
-
16
-
-
85084095841
-
Designing and implementing malicious hardware
-
San Francisco, California; April
-
King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y. Designing and implementing malicious hardware. In: Proceedings of 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California; April 2008.
-
(2008)
Proceedings of 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
22
-
-
0033293553
-
Building a high-performance programmable secure coprocessor
-
Smith S., and Weingart S. Building a high-performance programmable secure coprocessor. Computer Networks 31 (1999) 831-860
-
(1999)
Computer Networks
, vol.31
, pp. 831-860
-
-
Smith, S.1
Weingart, S.2
-
24
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
ACM, New York, NY;
-
Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S. AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th Annual International Conference on Supercomputing, San Francisco, CA, USA; 23-26 June 2003; ICS'03. ACM, New York, NY; 2003. p. 160-71.
-
(2003)
Proceedings of the 17th Annual International Conference on Supercomputing, San Francisco, CA, USA; 23-26 June 2003; ICS'03
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
25
-
-
70349455305
-
-
Trusted Computing Group
-
Trusted Computing Group, http://www.trustedcomputing.org.
-
-
-
-
33
-
-
85015850662
-
SAFE-OPS: a compiler/architecture approach to embedded software security
-
Zambreno J., Choudhary A., Narahari B., Memon N., and Simha R. SAFE-OPS: a compiler/architecture approach to embedded software security. ACM Transactions on Embedded Computing Systems 4 1 (February 2005)
-
(2005)
ACM Transactions on Embedded Computing Systems
, vol.4
, Issue.1
-
-
Zambreno, J.1
Choudhary, A.2
Narahari, B.3
Memon, N.4
Simha, R.5
|