메뉴 건너뛰기




Volumn , Issue , 2009, Pages 123-127

Consistency-based characterization for IC Trojan detection

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; COMPUTER AIDED DESIGN; INTEGRATED CIRCUITS; TIMING CIRCUITS;

EID: 76349093122     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1687399.1687426     Document Type: Conference Paper
Times cited : (85)

References (15)
  • 2
    • 56749170623 scopus 로고    scopus 로고
    • Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
    • Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak. Trusted integrated circuits: A nondestructive hidden characteristics extraction approach. In Information Hiding, pages 102-117, 2008.
    • (2008) Information Hiding , pp. 102-117
    • Alkabani, Y.1    Koushanfar, F.2    Kiyavash, N.3    Potkonjak, M.4
  • 3
    • 51549088218 scopus 로고    scopus 로고
    • Y. Alkabani, F. Koushanfar, and M. Potkonjak. Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability. In DAC, 2008.
    • Y. Alkabani, F. Koushanfar, and M. Potkonjak. Input vector control for postsilicon leakage current minimization in the presence of manufacturing variability. In DAC, 2008.
  • 4
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • M. Banga and M. Hsiao. A region based approach for the identification of hardware trojans. In HOST, pages 43-50, 2008.
    • (2008) HOST , pp. 43-50
    • Banga, M.1    Hsiao, M.2
  • 6
    • 51849095999 scopus 로고    scopus 로고
    • Hardware trojan detection using path delay fingerprint
    • Y. Jin and Y. Makris. Hardware trojan detection using path delay fingerprint. In HOST, pages 51-57, 2008.
    • (2008) HOST , pp. 51-57
    • Jin, Y.1    Makris, Y.2
  • 8
    • 76349094068 scopus 로고    scopus 로고
    • A. M. L. P. J. Rousseeuw, editor, Wiley
    • A. M. L. P. J. Rousseeuw, editor. Peter J. Rousseeuw, Annick M. Leroy. Wiley, 2003.
    • (2003) Peter J. Rousseeuw, Annick M. Leroy
  • 9
    • 70350733802 scopus 로고    scopus 로고
    • M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey. Hardware trojan horse detection using gate-level characterization. In DAC, 2009.
    • M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey. Hardware trojan horse detection using gate-level characterization. In DAC, 2009.
  • 10
    • 51849084404 scopus 로고    scopus 로고
    • Sensitivity analysis to hardware trojans using power supply transient signals
    • R. Rad, J. Plusquellic, and M. Tehranipoor. Sensitivity analysis to hardware trojans using power supply transient signals. In HOST, pages 3-7, 2008.
    • (2008) HOST , pp. 3-7
    • Rad, R.1    Plusquellic, J.2    Tehranipoor, M.3
  • 11
    • 57849119623 scopus 로고    scopus 로고
    • Power supply signal calibration techniques for improving detection resolution to hardware trojans
    • R. Rad, X. Wang, J. Plusquellic, and M. Tehranipoor. Power supply signal calibration techniques for improving detection resolution to hardware trojans. In ICCAD, pages 632-639, 2008.
    • (2008) ICCAD , pp. 632-639
    • Rad, R.1    Wang, X.2    Plusquellic, J.3    Tehranipoor, M.4
  • 13
    • 57549113706 scopus 로고    scopus 로고
    • Noninvasive leakage power tomography of integrated circuits by compressive sensing
    • D. Shamsi, P. Boufounos, and F. Koushanfar. Noninvasive leakage power tomography of integrated circuits by compressive sensing. In ISLPED, pages 341-346, 2008.
    • (2008) ISLPED , pp. 341-346
    • Shamsi, D.1    Boufounos, P.2    Koushanfar, F.3
  • 14
    • 51849111151 scopus 로고    scopus 로고
    • Detecting malicious inclusions in secure hardware: Challenges and solutions
    • X. Wang, J. Plusquellic, and M. Tehranipoor. Detecting malicious inclusions in secure hardware: Challenges and solutions. In HOST, pages 15-22, 2008.
    • (2008) HOST , pp. 15-22
    • Wang, X.1    Plusquellic, J.2    Tehranipoor, M.3
  • 15
    • 49749105556 scopus 로고    scopus 로고
    • Towards trojan-free trusted ICs: Problem analysis and detection scheme
    • F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty. Towards trojan-free trusted ICs: problem analysis and detection scheme. In DATE, pages 1362-1365, 2008.
    • (2008) DATE , pp. 1362-1365
    • Wolff, F.1    Papachristou, C.2    Bhunia, S.3    Chakraborty, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.