메뉴 건너뛰기




Volumn , Issue , 2010, Pages 173-188

Tamper evident microprocessors

Author keywords

Backdoors; Hardware security; Microprocessors; Security based on causal structure and division of work 2010 ieee

Indexed keywords

AREA COST; AREA EFFICIENT; BACKDOORS; HARDWARE SECURITY; INSIDER ATTACK; LARGE CLASS; MALICIOUS INSIDERS; MULTIPLE COMPONENTS; ON-CHIP CACHE; PERFORMANCE IMPACT; SECURITY MECHANISM; TAMPER-EVIDENT;

EID: 77955188145     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.19     Document Type: Conference Paper
Times cited : (69)

References (72)
  • 4
    • 77955205932 scopus 로고    scopus 로고
    • Trusted Computing Group. Online at
    • Trusted Computing Group. Online at https://www. trustedcomputinggroup. org/,2007.
    • (2007)
  • 10
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • S. Adee. The hunt for the kill switch. IEEE Spectrum Magazine, 45(5): 34-39, 2008.
    • (2008) IEEE Spectrum Magazine , vol.45 , Issue.5 , pp. 34-39
    • Adee, S.1
  • 24
    • 51849089785 scopus 로고    scopus 로고
    • On-demand transparency for improving hardware trojan detectability
    • June 2008 H05T 2008
    • R. Chakraborty, S. Paul, and S. Bhunia. On-demand transparency for improving hardware trojan detectability. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 48-50, June 2008.
    • (2008) Hardware-Oriented Security and Trust , pp. 48-50
    • Chakraborty, R.1    Paul, S.2    Bhunia, S.3
  • 27
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • C. K. Koc and C. Paar, editors, August
    • st Cryptographic Hardware and Embedded Systems, pages 292-302, August 1999.
    • (1999) st Cryptographic Hardware and Embedded Systems , pp. 292-302
    • Coron, J.1
  • 33
    • 0031270701 scopus 로고    scopus 로고
    • Investigation on radiated emission characteristics of multilayer printed circuits boards
    • E80-B(11)
    • T. Harada, H. Sasaki, and Y. Kami. Investigation on radiated emission characteristics of multilayer printed circuits boards. IEICE Transactions on Communications, E80-B(11): 1645-1651, 1997.
    • (1997) IEICE Transactions on Communications , pp. 1645-1651
    • Harada, T.1    Sasaki, H.2    Kami, Y.3
  • 39
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10), 1973.
    • (1973) Communications of the ACM , vol.16 , pp. 10
    • Lampson, B.W.1
  • 41
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for ic authentication and trojan horse detection
    • HOST 2008. IEEE International Workshop on, June
    • J. Li and J. Lach. At-speed delay characterization for ic authentication and trojan horse detection. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 8-14, June 2008.
    • (2008) Hardware-Oriented Security and Trust, 2008 , pp. 8-14
    • Li, J.1    Lach, J.2
  • 42
    • 33947311714 scopus 로고    scopus 로고
    • Exploiting radiated emissions - Em attacks on cryptographic ICs
    • S. Mangard. Exploiting radiated emissions - EM attacks on cryptographic ICs. In Proceedings of AustroChip, 2003.
    • (2003) Proceedings of AustroChip
    • Mangard, S.1
  • 57
    • 70449123838 scopus 로고    scopus 로고
    • New design strategy for improving hardware trojan detection and reducing trojan activation time
    • HOST '09. IEEE International Workshop on July
    • H. Salmani, M. Tehranipoor, and J. Plusquellic. New design strategy for improving hardware trojan detection and reducing trojan activation time. In Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on, pages 66-73, July 2009.
    • (2009) Hardware-Oriented Security and Trust, 2009. , pp. 66-73
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 61
    • 7244254277 scopus 로고    scopus 로고
    • Magic boxes and boots: Security in hardware
    • S. Smith. Magic boxes and boots: Security in hardware. IEEE Computer, 37(10): 106-109, 2004.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 106-109
    • Smith, S.1
  • 62
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • New York, NY, USA, ACM Press.
    • G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM Press.
    • (2007) Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 67
    • 62649134605 scopus 로고    scopus 로고
    • United Stated Department of Defense. February
    • United Stated Department of Defense. High performance microchip supply, February 2005.
    • (2005) High Performance Microchip Supply
  • 71
    • 40949114573 scopus 로고    scopus 로고
    • Hierarchical verification for increasing performance in reliable processors
    • J. Yoo and M. Franklin. Hierarchical verification for increasing performance in reliable processors. J. Electron. Test., 24(1-3): 117-128, 2008.
    • (2008) J. Electron. Test , vol.24 , Issue.1-3 , pp. 117-128
    • Yoo, J.1    Franklin, M.2
  • 72
    • 76949095784 scopus 로고    scopus 로고
    • Secure and robust error correction for physical unclonable functions
    • Jan.-Feb. 2010.
    • M.-D. M. Yu and S. Devadas. Secure and robust error correction for physical unclonable functions. Design & Test of Computers, IEEE, 27(1): 48-65, Jan.-Feb. 2010.
    • Design & Test of Computers, IEEE , vol.27 , Issue.1 , pp. 48-65
    • Yu, M.-D.M.1    Devadas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.