-
1
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using ic fingerprinting. In IEEE S& P, pages 296-310, 2007.
-
(2007)
IEEE S& P
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
2
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak. Trusted integrated circuits: A nondestructive hidden characteristics extraction approach. In Information Hiding, pages 102-117, 2008.
-
(2008)
Information Hiding
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
3
-
-
51549088218
-
-
Y. Alkabani, F. Koushanfar, and M. Potkonjak. Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability. In DAC, 2008.
-
Y. Alkabani, F. Koushanfar, and M. Potkonjak. Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability. In DAC, 2008.
-
-
-
-
4
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
M. Banga and M. Hsiao. A region based approach for the identification of hardware trojans. In HOST, pages 43-50, 2008.
-
(2008)
HOST
, pp. 43-50
-
-
Banga, M.1
Hsiao, M.2
-
6
-
-
51849095999
-
Hardware trojan detection using path delay fingerprint
-
Y. Jin and Y. Makris. Hardware trojan detection using path delay fingerprint. In HOST, pages 51-57, 2008.
-
(2008)
HOST
, pp. 51-57
-
-
Jin, Y.1
Makris, Y.2
-
7
-
-
0003553371
-
-
Kluwer Academic Publishers, Dordrecht
-
V. Kreinovich, A. Lakeyev, J. Rohn, and P. Kahl. Computational Complexity and Feasibility of Data Processing and Interval Computations. Kluwer Academic Publishers, Dordrecht, 1997.
-
(1997)
Computational Complexity and Feasibility of Data Processing and Interval Computations
-
-
Kreinovich, V.1
Lakeyev, A.2
Rohn, J.3
Kahl, P.4
-
8
-
-
76349094068
-
-
A. M. L. P. J. Rousseeuw, editor, Wiley
-
A. M. L. P. J. Rousseeuw, editor. Peter J. Rousseeuw, Annick M. Leroy. Wiley, 2003.
-
(2003)
Peter J. Rousseeuw, Annick M. Leroy
-
-
-
9
-
-
70350733802
-
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey. Hardware trojan horse detection using gate-level characterization. In DAC, 2009.
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey. Hardware trojan horse detection using gate-level characterization. In DAC, 2009.
-
-
-
-
10
-
-
51849084404
-
Sensitivity analysis to hardware trojans using power supply transient signals
-
R. Rad, J. Plusquellic, and M. Tehranipoor. Sensitivity analysis to hardware trojans using power supply transient signals. In HOST, pages 3-7, 2008.
-
(2008)
HOST
, pp. 3-7
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
11
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
R. Rad, X. Wang, J. Plusquellic, and M. Tehranipoor. Power supply signal calibration techniques for improving detection resolution to hardware trojans. In ICCAD, pages 632-639, 2008.
-
(2008)
ICCAD
, pp. 632-639
-
-
Rad, R.1
Wang, X.2
Plusquellic, J.3
Tehranipoor, M.4
-
13
-
-
57549113706
-
Noninvasive leakage power tomography of integrated circuits by compressive sensing
-
D. Shamsi, P. Boufounos, and F. Koushanfar. Noninvasive leakage power tomography of integrated circuits by compressive sensing. In ISLPED, pages 341-346, 2008.
-
(2008)
ISLPED
, pp. 341-346
-
-
Shamsi, D.1
Boufounos, P.2
Koushanfar, F.3
-
14
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
X. Wang, J. Plusquellic, and M. Tehranipoor. Detecting malicious inclusions in secure hardware: Challenges and solutions. In HOST, pages 15-22, 2008.
-
(2008)
HOST
, pp. 15-22
-
-
Wang, X.1
Plusquellic, J.2
Tehranipoor, M.3
-
15
-
-
49749105556
-
Towards trojan-free trusted ICs: Problem analysis and detection scheme
-
F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty. Towards trojan-free trusted ICs: problem analysis and detection scheme. In DATE, pages 1362-1365, 2008.
-
(2008)
DATE
, pp. 1362-1365
-
-
Wolff, F.1
Papachristou, C.2
Bhunia, S.3
Chakraborty, R.4
|