메뉴 건너뛰기




Volumn 27, Issue 1, 2010, Pages 10-25

A survey of hardware trojan taxonomy and detection

Author keywords

[No Author keywords available]

Indexed keywords

TROJANS;

EID: 76949093207     PISSN: 07407475     EISSN: None     Source Type: Journal    
DOI: 10.1109/MDT.2010.7     Document Type: Review
Times cited : (1071)

References (34)
  • 2
    • 32144458931 scopus 로고    scopus 로고
    • National security aspects of the global migration of the U.S. semiconductor industry
    • Airland Subcommittee, US Senate Armed Services Committee, June
    • J. Lieberman, "National Security Aspects of the Global Migration of the U.S. Semiconductor Industry," white paper, Airland Subcommittee, US Senate Armed Services Committee, June 2003; http://lieberman.senate. gov/documents/whitepapers/semiconductor.pdf.
    • (2003) White Paper
    • Lieberman, J.1
  • 3
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, vol.45, no.5, 2008, pp. 34-39.
    • (2008) IEEE Spectrum , vol.45 , Issue.5 , pp. 34-39
    • Adee, S.1
  • 4
    • 76949092584 scopus 로고    scopus 로고
    • Innovation at Risk-Intellectual property challenges and opportunities
    • Semiconductor Equipment and Materials International, June
    • "Innovation at Risk-Intellectual Property Challenges and Opportunities," white paper, Semiconductor Equipment and Materials International, June 2008.
    • (2008) White Paper
  • 6
    • 49749105556 scopus 로고    scopus 로고
    • Towards trojan free trusted ICs: Problem analysis and detection scheme
    • ACM Press
    • F. Wolff et al., "Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme," Proc. Design, Automation and Test in Europe Conf. (DATE 08), ACM Press, 2008, pp. 1362-1365.
    • (2008) Proc. Design Automation and Test in Europe Conf. (DATE 08) , pp. 1362-1365
    • Wolff, F.1
  • 9
    • 67649998710 scopus 로고    scopus 로고
    • Hardware trojan detection and isolation using current integration and localized current analysis
    • IEEE CS Press
    • X. Wang et al., "Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis," Proc. IEEE Int'l Symp. Defect and Fault Tolerance of VLSI Systems (DFT 08), IEEE CS Press, 2008, pp. 87-95.
    • (2008) Proc. IEEE Int'l Symp. Defect and Fault Tolerance of VLSI Systems (DFT 08) , pp. 87-95
    • Wang, X.1
  • 10
    • 57849119623 scopus 로고    scopus 로고
    • Power supply signal calibration techniques for improving detection resolution to hardware trojans
    • IEEE CS Press
    • R. Rad et al., "Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans," Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08), IEEE CS Press, 2008, pp. 632-639.
    • (2008) Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08) , pp. 632-639
    • Rad, R.1
  • 13
    • 34548719905 scopus 로고    scopus 로고
    • Trojan detection using IC fingerprinting
    • IEEE CS Press
    • D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 296-310.
    • (2007) Proc. IEEE Symp. Security and Privacy (SP 07) , pp. 296-310
    • Agrawal, D.1
  • 15
    • 70350733802 scopus 로고    scopus 로고
    • Hardware trojan horse detection using gate-level characterization
    • ACM Press
    • M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
    • (2009) Proc. 46th Design Automation Conf. (DAC 09) , pp. 688-693
    • Potkonjak, M.1
  • 18
    • 58449132326 scopus 로고    scopus 로고
    • Randomization based probabilistic approach to detect trojan circuits
    • IEEE CS Press
    • S. Jha and S.K. Jha, "Randomization Based Probabilistic Approach to Detect Trojan Circuits," Proc. 11th IEEE High Assurance Systems Engineering Symp., IEEE CS Press, 2008, pp. 117-124.
    • (2008) Proc. 11th IEEE High Assurance Systems Engineering Symp. , pp. 117-124
    • Jha, S.1    Jha, S.K.2
  • 20
    • 62949192896 scopus 로고    scopus 로고
    • A novel sustained vector technique for the detection of hardware trojans
    • IEEE CS Press
    • M. Banga and M. Hsiao, "A Novel Sustained Vector Technique for the Detection of Hardware Trojans," Proc. 22nd Int'l Conf. VLSI Design, IEEE CS Press, 2009, pp. 327-332.
    • (2009) Proc. 22nd Int'l Conf. VLSI Design , pp. 327-332
    • Banga, M.1    Hsiao, M.2
  • 22
    • 70350743267 scopus 로고    scopus 로고
    • Hardware authentication leveraging performance limits in detailed simulations and emulations
    • ACM Press
    • G.E. Suh, D. Deng, and A. Chan, "Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations," Proc. 46th Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 682-687.
    • (2009) Proc. 46th Design Automation Conf. (DAC 09) , pp. 682-687
    • Suh, G.E.1    Deng, D.2    Chan, A.3
  • 30
    • 4344587804 scopus 로고    scopus 로고
    • Identification and authentication of integrated circuits: Research articles
    • B. Gassend et al., "Identification and Authentication of Integrated Circuits: Research Articles," Concurrency and Computation: Practice & Experience, vol.16, no.11, 2004, pp. 1077-1098.
    • (2004) Concurrency and Computation: Practice & Experience , vol.16 , Issue.11 , pp. 1077-1098
    • Gassend, B.1
  • 32
    • 76949093125 scopus 로고    scopus 로고
    • "Techniques for design and implementation of secure reconfigurable PUFs," ACM trans
    • article 5
    • M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for Design and Implementation of Secure Reconfigurable PUFs," ACM Trans. Reconfigurable Technology and Systems, vol.2, no.1, 2009, article 5.
    • (2009) Reconfigurable Technology and Systems , vol.2 , Issue.1
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.