메뉴 건너뛰기




Volumn , Issue , 2009, Pages 688-693

Hardware trojan horse detection using gate-level characterization

Author keywords

Gate level characterization; Hardware trojan horses; Linear programming; Manufacturing variability

Indexed keywords

APPLICATION PROGRAMS; COMPUTER AIDED DESIGN; HARDWARE SECURITY; LINEAR PROGRAMMING; MANUFACTURE;

EID: 70350733802     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1629911.1630091     Document Type: Conference Paper
Times cited : (212)

References (16)
  • 12
    • 34548818732 scopus 로고    scopus 로고
    • Y. Su, J. Holleman, and B. Otis. A 1.6J/bit stable chip ID generating circuit using process variations. In International Solid State Circuits Conference (ISSCC), page to appear, 2007.
    • Y. Su, J. Holleman, and B. Otis. A 1.6J/bit stable chip ID generating circuit using process variations. In International Solid State Circuits Conference (ISSCC), page to appear, 2007.
  • 13
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • G. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference (DAC), pages 9-14, 2007.
    • (2007) Design Automation Conference (DAC) , pp. 9-14
    • Suh, G.1    Devadas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.