-
2
-
-
32144458931
-
National security aspects of the global migration of the U.S. semiconductor industry
-
Airland Subcommittee, US Senate Armed Services Committee, June
-
J. Lieberman, "National Security Aspects of the Global Migration of the U.S. Semiconductor Industry," white paper, Airland Subcommittee, US Senate Armed Services Committee, June 2003; http://lieberman.senate. gov/documents/whitepapers/semiconductor.pdf.
-
(2003)
White Paper
-
-
Lieberman, J.1
-
3
-
-
44449083733
-
The hunt for the kill switch
-
S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, vol.45, no.5, 2008, pp. 34-39.
-
(2008)
IEEE Spectrum
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
4
-
-
76949092584
-
Innovation at Risk-Intellectual property challenges and opportunities
-
Semiconductor Equipment and Materials International, June
-
"Innovation at Risk-Intellectual Property Challenges and Opportunities," white paper, Semiconductor Equipment and Materials International, June 2008.
-
(2008)
White Paper
-
-
-
5
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
IEEE CS Press
-
X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions," Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 15-19.
-
(2008)
Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust (HOST 08)
, pp. 15-19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
6
-
-
49749105556
-
Towards trojan free trusted ICs: Problem analysis and detection scheme
-
ACM Press
-
F. Wolff et al., "Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme," Proc. Design, Automation and Test in Europe Conf. (DATE 08), ACM Press, 2008, pp. 1362-1365.
-
(2008)
Proc. Design Automation and Test in Europe Conf. (DATE 08)
, pp. 1362-1365
-
-
Wolff, F.1
-
8
-
-
70449134838
-
Experiences in hardware trojan design and implementation
-
IEEE CS Press
-
Y. Jin, N. Kupp, and Y. Makris, "Experiences in Hardware Trojan Design and Implementation," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 50-57.
-
(2009)
Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09)
, pp. 50-57
-
-
Jin, Y.1
Kupp, N.2
Makris, Y.3
-
9
-
-
67649998710
-
Hardware trojan detection and isolation using current integration and localized current analysis
-
IEEE CS Press
-
X. Wang et al., "Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis," Proc. IEEE Int'l Symp. Defect and Fault Tolerance of VLSI Systems (DFT 08), IEEE CS Press, 2008, pp. 87-95.
-
(2008)
Proc. IEEE Int'l Symp. Defect and Fault Tolerance of VLSI Systems (DFT 08)
, pp. 87-95
-
-
Wang, X.1
-
10
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
IEEE CS Press
-
R. Rad et al., "Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans," Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08), IEEE CS Press, 2008, pp. 632-639.
-
(2008)
Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08)
, pp. 632-639
-
-
Rad, R.1
-
13
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
IEEE CS Press
-
D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 296-310.
-
(2007)
Proc. IEEE Symp. Security and Privacy (SP 07)
, pp. 296-310
-
-
Agrawal, D.1
-
15
-
-
70350733802
-
Hardware trojan horse detection using gate-level characterization
-
ACM Press
-
M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," Proc. 46th Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 688-693.
-
(2009)
Proc. 46th Design Automation Conf. (DAC 09)
, pp. 688-693
-
-
Potkonjak, M.1
-
18
-
-
58449132326
-
Randomization based probabilistic approach to detect trojan circuits
-
IEEE CS Press
-
S. Jha and S.K. Jha, "Randomization Based Probabilistic Approach to Detect Trojan Circuits," Proc. 11th IEEE High Assurance Systems Engineering Symp., IEEE CS Press, 2008, pp. 117-124.
-
(2008)
Proc. 11th IEEE High Assurance Systems Engineering Symp.
, pp. 117-124
-
-
Jha, S.1
Jha, S.K.2
-
20
-
-
62949192896
-
A novel sustained vector technique for the detection of hardware trojans
-
IEEE CS Press
-
M. Banga and M. Hsiao, "A Novel Sustained Vector Technique for the Detection of Hardware Trojans," Proc. 22nd Int'l Conf. VLSI Design, IEEE CS Press, 2009, pp. 327-332.
-
(2009)
Proc. 22nd Int'l Conf. VLSI Design
, pp. 327-332
-
-
Banga, M.1
Hsiao, M.2
-
22
-
-
70350743267
-
Hardware authentication leveraging performance limits in detailed simulations and emulations
-
ACM Press
-
G.E. Suh, D. Deng, and A. Chan, "Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations," Proc. 46th Design Automation Conf. (DAC 09), ACM Press, 2009, pp. 682-687.
-
(2009)
Proc. 46th Design Automation Conf. (DAC 09)
, pp. 682-687
-
-
Suh, G.E.1
Deng, D.2
Chan, A.3
-
23
-
-
70449112832
-
OS support for detecting trojan circuit attacks
-
IEEE CS Press
-
G. Bloom, B. Narahari, and R. Simha, "OS Support for Detecting Trojan Circuit Attacks," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 100-103.
-
(2009)
Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust (HOST 09)
, pp. 100-103
-
-
Bloom, G.1
Narahari, B.2
Simha, R.3
-
25
-
-
70449123838
-
New design strategy for improving hardware trojan detection and reducing trojan activation time
-
IEEE CS Press
-
H. Salmani, M. Tehranipoor, and J. Plusquellic, "New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time," Proc. IEEE Workshop Hardware-Oriented Security and Trust (HOST 09), IEEE CS Press, 2009, pp. 66-73.
-
(2009)
Proc. IEEE Workshop Hardware-Oriented Security and Trust (HOST 09)
, pp. 66-73
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
28
-
-
51849089785
-
On- Demand transparency for improving hardware trojan detectability
-
IEEE CS Press
-
R.S. Chakraborty, S. Paul, and S. Bhunia, "On- Demand Transparency for Improving Hardware Trojan Detectability," Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust (HOST 08), IEEE CS Press, 2008, pp. 48-50.
-
(2008)
Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust (HOST 08)
, pp. 48-50
-
-
Chakraborty, R.S.1
Paul, S.2
Bhunia, S.3
-
30
-
-
4344587804
-
Identification and authentication of integrated circuits: Research articles
-
B. Gassend et al., "Identification and Authentication of Integrated Circuits: Research Articles," Concurrency and Computation: Practice & Experience, vol.16, no.11, 2004, pp. 1077-1098.
-
(2004)
Concurrency and Computation: Practice & Experience
, vol.16
, Issue.11
, pp. 1077-1098
-
-
Gassend, B.1
-
32
-
-
76949093125
-
"Techniques for design and implementation of secure reconfigurable PUFs," ACM trans
-
article 5
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for Design and Implementation of Secure Reconfigurable PUFs," ACM Trans. Reconfigurable Technology and Systems, vol.2, no.1, 2009, article 5.
-
(2009)
Reconfigurable Technology and Systems
, vol.2
, Issue.1
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
33
-
-
67249147207
-
Testing techniques for hardware security
-
IEEE CS Press
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing Techniques for Hardware Security," Proc. Int'l Test Conf. (ITC 08), IEEE CS Press, 2008, pp. 1-10.
-
(2008)
Proc. Int'l Test Conf. (ITC 08)
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
|