-
2
-
-
62649134605
-
-
Defense Science Board, Online
-
Defense Science Board, "Task force on high performance microchip supply", 2005. [Online]. Available: http://www.acq.osd.mil/dsb/reports/ 200502HPMSReportFinal.pdf.
-
(2005)
Task Force on High Performance Microchip Supply
-
-
-
4
-
-
80051982002
-
-
Australian Government DoD-DSTO, Online
-
Australian Government DoD-DSTO, "Towards Countering the Rise of the Silicon Trojan", 2008. [Online]. Available: http://dspace.dsto.defence. gov.au/dspace/bitstream/1947/9736/l/DSTO-TR-2220\%20PR.pdf.
-
(2008)
Towards Countering the Rise of the Silicon Trojan
-
-
-
5
-
-
44449083733
-
The hunt for the kill switch
-
May
-
S. Adee, "The Hunt for the Kill Switch", IEEE Spectrum, May 2008.
-
(2008)
IEEE Spectrum
-
-
Adee, S.1
-
6
-
-
76649104120
-
Integrated circuit security - New threats and solutions
-
M. Abramovici and P. Bradley, "Integrated Circuit Security - New Threats and Solutions", CSIIR Workshop, 2009.
-
(2009)
CSIIR Workshop
-
-
Abramovici, M.1
Bradley, P.2
-
7
-
-
49749105556
-
Towards trojan-free trusted ICs: Problem analysis and detection scheme
-
F. Wolff et al., "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme", DATE, 2008.
-
(2008)
DATE
-
-
Wolff, F.1
-
8
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
X. Wang, M. Tehranipoor and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions", HOST, 2008.
-
(2008)
HOST
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
9
-
-
84894124907
-
Hardware trojan designs on BASYS FPGA board (Virginia tech)
-
Online
-
Z. Chen et al., "Hardware Trojan Designs on BASYS FPGA Board (Virginia Tech)", CSAW Embedded System Challenge, 2008. [Online]. Available: http://isis.poly.edu/~vikram/vt.pdf.
-
(2008)
CSAW Embedded System Challenge
-
-
Chen, Z.1
-
10
-
-
76649104443
-
Embedded systems challenge (Iowa State University)
-
Online.
-
A. Baumgarten et al., "Embedded Systems Challenge (Iowa State University)", CSAW Embedded System Challenge, 2008. [Online]. Available: http://isis.poly.edu/~vikram/iowa-state.pdf.
-
(2008)
CSAW Embedded System Challenge
-
-
Baumgarten, A.1
-
11
-
-
76649111140
-
-
Yale University, CSAW Embedded System Challenge, Online
-
Y. Jin and N. Kupp, "CSAW 2008 Team Report (Yale University)", CSAW Embedded System Challenge, 2008. [Online], Available: http://isis. poly.edu/~vikram/yale.pdf.
-
(2008)
CSAW 2008 Team Report
-
-
Jin, Y.1
Kupp, N.2
-
12
-
-
76349087817
-
Security against hardware trojan through a novel application of design obfuscation
-
R.S. Chakraborty and S. Bhunia, "Security against Hardware Trojan through a Novel Application of Design Obfuscation", ICCAD, 2009.
-
(2009)
ICCAD
-
-
Chakraborty, R.S.1
Bhunia, S.2
-
13
-
-
51849089785
-
On-demand transparency for improving hardware trojan detectability
-
R.S. Chakraborty, S. Paul and S. Bhunia, "On-Demand Transparency for Improving Hardware Trojan Detectability", HOST, 2008.
-
(2008)
HOST
-
-
Chakraborty, R.S.1
Paul, S.2
Bhunia, S.3
-
14
-
-
51849090209
-
Trustworthy system security through 3-D integrated hardware
-
T. Huffmire et al., "Trustworthy System Security through 3-D Integrated Hardware", HOST, 2008.
-
(2008)
HOST
-
-
Huffmire, T.1
-
15
-
-
70449127255
-
VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs
-
M. Banga and M.S. Hsiao, "VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs", HOST, 2009.
-
(2009)
HOST
-
-
Banga, M.1
Hsiao, M.S.2
-
16
-
-
51849099113
-
At-speed delay characterization for IC authentication and trojan horse detection
-
J. Li and J. Lach, "At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection", HOST, 2008.
-
(2008)
HOST
-
-
Li, J.1
Lach, J.2
-
18
-
-
70449127253
-
Dynamic evaluation of hardware trust
-
D. Mclntyre et al., "Dynamic Evaluation of Hardware Trust", HOST, 2009.
-
(2009)
HOST
-
-
Mclntyre, D.1
-
19
-
-
70449112832
-
OS support for detecting trojan circuit attacks
-
G. Bloom, B. Narahari and R. Slmha, "OS Support for Detecting Trojan Circuit Attacks", HOST, 2009.
-
(2009)
HOST
-
-
Bloom, G.1
Narahari, B.2
Slmha, R.3
-
20
-
-
79952530026
-
MERO: A statistical approach for hardware trojan detection
-
R.S. Chakraborty et al., "MERO: A Statistical Approach for Hardware Trojan Detection", CHES Workshop, 2009.
-
(2009)
CHES Workshop
-
-
Chakraborty, R.S.1
-
23
-
-
51849084404
-
Sensitivity analysis to hardware trojans using power supply transient signals
-
R.M. Rad, J. Plusquellic and M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals", HOST, 2008.
-
(2008)
HOST
-
-
Rad, R.M.1
Plusquellic, J.2
Tehranipoor, M.3
-
24
-
-
51849095999
-
Hardware trojan detection using path delay fingerprint
-
Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint", HOST, 2008.
-
(2008)
HOST
-
-
Jin, Y.1
Makris, Y.2
-
25
-
-
70449094859
-
Performance of delay-based trojan detection techniques under parameter variations
-
D. Rai and J. Lach, "Performance of Delay-Based Trojan Detection Techniques under Parameter Variations", HOST, 2009.
-
(2009)
HOST
-
-
Rai, D.1
Lach, J.2
-
26
-
-
70350733802
-
Hardware trojan horse detection using gatelevel characterization
-
M. Potkonjak et al., "Hardware Trojan Horse Detection Using GateLevel Characterization", DAC, 2009.
-
(2009)
DAC
-
-
Potkonjak, M.1
-
27
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
M. Banga and M.S. Hsiao, "A Region Based Approach for the Identification of Hardware Trojans", HOST, 2008.
-
(2008)
HOST
-
-
Banga, M.1
Hsiao, M.S.2
-
28
-
-
62949192896
-
A novel sustained vector technique for the detection of hardware trojans
-
M. Banga and M.S. Hsiao, "A Novel Sustained Vector Technique for the Detection of Hardware Trojans", VLSI Design, 2009.
-
(2009)
VLSI Design
-
-
Banga, M.1
Hsiao, M.S.2
-
29
-
-
70449123838
-
New design strategy for improving hardware trojan detection and reducing trojan activation time
-
H. Salmani, M. Tehranipoor and J. Plusquellic, "New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time", HOST, 2009.
-
(2009)
HOST
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
30
-
-
51849124268
-
Designer's hardware trojan horse
-
Y. Alkabani and F. Koushanfar, "Designer's Hardware Trojan Horse", HOST, 2008.
-
(2008)
HOST
-
-
Alkabani, Y.1
Koushanfar, F.2
-
31
-
-
85084095841
-
Designing and implementing malicious hardware
-
S. King et al., "Designing and Implementing Malicious Hardware", LEET, 2008.
-
(2008)
LEET
-
-
King, S.1
-
32
-
-
79952970541
-
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
-
L. Lin et al., "Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering", CHES Workshop, 2009.
-
(2009)
CHES Workshop
-
-
Lin, L.1
-
33
-
-
76649121279
-
Demonstration of hardware trojans
-
F. Kiamilev and R. Hoover, "Demonstration of Hardware Trojans", DEFCON 16, 2008.
-
(2008)
DEFCON
, vol.16
-
-
Kiamilev, F.1
Hoover, R.2
-
35
-
-
70349464732
-
Providing secure execution environments with a last line of defense against trojan circuit attacks
-
G. Bloom et al., "Providing Secure Execution Environments with a Last Line of Defense against Trojan Circuit Attacks", Computers and Security, 2009.
-
(2009)
Computers and Security
-
-
Bloom, G.1
-
37
-
-
76649144276
-
-
United States Patent Number 6,496,022 B1
-
J.A. Kash, J.C. Tsang and D.R. Knebel, "Method and Apparatus for Reverse Engineering Integrated Circuits by Monitoring Optical Emission", United States Patent Number 6,496,022 B1, 2002.
-
(2002)
Method and apparatus for reverse engineering integrated circuits by monitoring optical emission
-
-
Kash, J.A.1
Tsang, J.C.2
Knebel, D.R.3
-
38
-
-
48049105514
-
Detecting malicious logic through structural checking
-
April
-
S. Smith and J. Di, "Detecting Malicious Logic Through Structural Checking", IEEE Region 5 Technical Conference, April 2007.
-
(2007)
IEEE Region 5 Technical Conference
-
-
Smith, S.1
Di, J.2
|