-
4
-
-
77955205932
-
-
Trusted Computing Group. Online at
-
Trusted Computing Group. Online at https://www. trustedcomputinggroup. org/,2007.
-
(2007)
-
-
-
7
-
-
84876307879
-
On the power of simple branch prediction analysis
-
March
-
O. Aciicmez, C. K. Koc, and J. P. Sefert. On the Power of Simple Branch Prediction Analysis. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), pages 312-320, March 2007.
-
(2007)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 312-320
-
-
Aciicmez, O.1
Koc, C.K.2
Sefert, J.P.3
-
10
-
-
44449083733
-
The hunt for the kill switch
-
S. Adee. The hunt for the kill switch. IEEE Spectrum Magazine, 45(5): 34-39, 2008.
-
(2008)
IEEE Spectrum Magazine
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
12
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
May
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using ic fingerprinting. In Security and Privacy, 2007. SP '07. IEEE Symposium on, pages 296-310, May 2007.
-
(2007)
Security and Privacy, 2007. SP '07. IEEE Symposium on
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
14
-
-
0029475529
-
Formal verification of a powerpc microprocessor
-
Washington, DC, USA, IEEE Computer Society.
-
D. P. Appenzeller. Formal verification of a powerpc microprocessor. In ICCD '95: Proceedings of the 1995 International Conference on Computer Design, page 79, Washington, DC, USA, 1995. IEEE Computer Society.
-
(1995)
ICCD '95: Proceedings of the 1995 International Conference on Computer Design
, pp. 79
-
-
Appenzeller, D.P.1
-
16
-
-
56749145922
-
Guided test generation for isolation and detection of embedded trojans in ics
-
New York, NY, USA, ACM.
-
M. Banga, M. Chandrasekar, L. Fang, and M. S. Hsiao. Guided test generation for isolation and detection of embedded trojans in ics. In GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, pages 363-366, New York, NY, USA, 2008. ACM.
-
(2008)
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI
, pp. 363-366
-
-
Banga, M.1
Chandrasekar, M.2
Fang, L.3
Hsiao, M.S.4
-
18
-
-
49749112061
-
Scalable sequential equivalence checking across arbitrary design transformations
-
Oct.
-
J. Baumgartner, H. Mony, V. Paruthi, R. Kanzelman, and G. Janssen. Scalable sequential equivalence checking across arbitrary design transformations. In Computer Design, 2006. ICCD 2006. International Conference on, pages 259-266, Oct. 2006.
-
(2006)
Computer Design, 2006. ICCD 2006. International Conference on
, pp. 259-266
-
-
Baumgartner, J.1
Mony, H.2
Paruthi, V.3
Kanzelman, R.4
Janssen, G.5
-
22
-
-
38549138136
-
-
IACR ePrint Archive, Report 2006/052, February
-
E. Brickell, G. Graunke, M. Neve, and J. P. Seifert. Software Mitigations to Hedge AES Against Cache-based software side channel vulnerabilities. IACR ePrint Archive, Report 2006/052, February 2006.
-
(2006)
Software Mitigations to Hedge AES Against Cache-based Software Side Channel Vulnerabilities
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.P.4
-
23
-
-
70450230796
-
End-to-end register data-flow continuous self-test
-
J. Carretero, P. Chaparro, X. Vera, J. Abella, and A. González. End-to-end register data-flow continuous self-test. SIGARCH Comput. Archit. News, 37(3): 105-115, 2009.
-
(2009)
SIGARCH Comput. Archit. News
, vol.37
, Issue.3
, pp. 105-115
-
-
Carretero, J.1
Chaparro, P.2
Vera, X.3
Abella, J.4
González, A.5
-
24
-
-
51849089785
-
On-demand transparency for improving hardware trojan detectability
-
June 2008 H05T 2008
-
R. Chakraborty, S. Paul, and S. Bhunia. On-demand transparency for improving hardware trojan detectability. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 48-50, June 2008.
-
(2008)
Hardware-Oriented Security and Trust
, pp. 48-50
-
-
Chakraborty, R.1
Paul, S.2
Bhunia, S.3
-
25
-
-
0034462353
-
Efficient checker processor design
-
New York, NY, USA, ACM.
-
S. Chatterjee, C. Weaver, and T. Austin. Efficient checker processor design. In MICRO 33: Proceedings of the 33rd annual ACM/IEEE international symposium on Microarchitecture, pages 87-97, New York, NY, USA, 2000. ACM.
-
(2000)
MICRO 33: Proceedings of the 33rd Annual ACM/IEEE International Symposium on Microarchitecture
, pp. 87-97
-
-
Chatterjee, S.1
Weaver, C.2
Austin, T.3
-
27
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
C. K. Koc and C. Paar, editors, August
-
st Cryptographic Hardware and Embedded Systems, pages 292-302, August 1999.
-
(1999)
st Cryptographic Hardware and Embedded Systems
, pp. 292-302
-
-
Coron, J.1
-
28
-
-
0035474388
-
Building the ibm 4758 secure coprocessor
-
Oct
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doom, and S. Smith. Building the ibm 4758 secure coprocessor. Computer, 34(10): 57-66, Oct 2001.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doom, L.5
Smith, S.6
-
29
-
-
67650314202
-
-
R. Elbaz, D. Champagne, C. Gebotys, R. B. Lee, N. Potlapally, and L. Torres. Hardware mechanisms for memory authentication: A survey of existing techniques and engines, pages 1-22, 2009.
-
(2009)
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines
, pp. 1-22
-
-
Elbaz, R.1
Champagne, D.2
Gebotys, C.3
Lee, R.B.4
Potlapally, N.5
Torres, L.6
-
30
-
-
0742272649
-
Identification of design errors through functional testing
-
Dec.
-
F. Ferrandi, F. Fummi, G. Pravadelli, and D. Sciuto. Identification of design errors through functional testing. Reliability, IEEE Transactions on, 52(4): 400-412, Dec. 2003.
-
(2003)
Reliability, IEEE Transactions on
, vol.52
, Issue.4
, pp. 400-412
-
-
Ferrandi, F.1
Fummi, F.2
Pravadelli, G.3
Sciuto, D.4
-
32
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA, ACM Press.
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In ACM Conference on Computer and Communications Security, pages 148-160, New York, NY, USA, 2002. ACM Press.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
33
-
-
0031270701
-
Investigation on radiated emission characteristics of multilayer printed circuits boards
-
E80-B(11)
-
T. Harada, H. Sasaki, and Y. Kami. Investigation on radiated emission characteristics of multilayer printed circuits boards. IEICE Transactions on Communications, E80-B(11): 1645-1651, 1997.
-
(1997)
IEICE Transactions on Communications
, pp. 1645-1651
-
-
Harada, T.1
Sasaki, H.2
Kami, Y.3
-
34
-
-
45149087639
-
Survey of scan chain diagnosis
-
Y. Huang, R. Guo, W.-T. Cheng, and J. C-M. Li. Survey of scan chain diagnosis. IEEE Design and Test of Computers, 25(3): 240-248, 2008.
-
(2008)
IEEE Design and Test of Computers
, vol.25
, Issue.3
, pp. 240-248
-
-
Huang, Y.1
Guo, R.2
Cheng, W.-T.3
Li, J.C.-M.4
-
39
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10), 1973.
-
(1973)
Communications of the ACM
, vol.16
, pp. 10
-
-
Lampson, B.W.1
-
40
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication application. In Proceedings of the Symposium on VLSI Circuits, pages 176-159, 2004.
-
(2004)
Proceedings of the Symposium on VLSI Circuits
, pp. 176-159
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
41
-
-
51849099113
-
At-speed delay characterization for ic authentication and trojan horse detection
-
HOST 2008. IEEE International Workshop on, June
-
J. Li and J. Lach. At-speed delay characterization for ic authentication and trojan horse detection. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 8-14, June 2008.
-
(2008)
Hardware-Oriented Security and Trust, 2008
, pp. 8-14
-
-
Li, J.1
Lach, J.2
-
42
-
-
33947311714
-
Exploiting radiated emissions - Em attacks on cryptographic ICs
-
S. Mangard. Exploiting radiated emissions - EM attacks on cryptographic ICs. In Proceedings of AustroChip, 2003.
-
(2003)
Proceedings of AustroChip
-
-
Mangard, S.1
-
43
-
-
84890863577
-
-
Springer-Verlag, Secaucus, NJ, USA
-
S. Mangard, E. Oswald, and T. Popp. Power analysis attacks: Revealing the secrets of smart cards. Springer-Verlag, Secaucus, NJ, USA, 2007.
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
46
-
-
38149116745
-
-
McGraw-Hill, Inc., New York, NY, USA
-
G. McFarland. Microprocessor Design. McGraw-Hill, Inc., New York, NY, USA, 2006.
-
(2006)
Microprocessor Design
-
-
McFarland, G.1
-
47
-
-
33947318808
-
Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem
-
November
-
E. D. Mulder, P. Buysschaert, S. B. Ors, P. Delmotte, B. Preneel, G. Vandenbosch, and I. Verbauwhede. Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem. In Proceedings of EUROCON, November 2005.
-
(2005)
Proceedings of EUROCON
-
-
Mulder, E.D.1
Buysschaert, P.2
Ors, S.B.3
Delmotte, P.4
Preneel, B.5
Vandenbosch, G.6
Verbauwhede, I.7
-
48
-
-
33750821066
-
A refined look at bernstein's AES side-channel analysis
-
March
-
M. Neve, J. P. Sefert, and Z. Wang. A Refined Look at Bernstein's AES Side-channel Analysis. In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), page 369, March 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 369
-
-
Neve, M.1
Sefert, J.P.2
Wang, Z.3
-
50
-
-
38349031545
-
Cache attacks and countermeasures: The case of AES
-
D. Osvik, A. Shamir, and E. Tromer. Cache attacks and Countermeasures: the Case of AES. Cryptology ePrint Archive, Report 2005/271, 2005.
-
(2005)
Cryptology EPrint Archive, Report
, vol.271
, pp. 2005
-
-
Osvik, D.1
Shamir, A.2
Tromer, E.3
-
54
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
Piscataway, NJ, USA, 2008. IEEE Press.
-
R. M. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic. Power supply signal calibration techniques for improving detection resolution to hardware trojans. In ICCAD '08: Proceedings of the 2008 IEEE/ACM International Conference on ComputerAided Design, pages 632-639, Piscataway, NJ, USA, 2008. IEEE Press.
-
ICCAD '08: Proceedings of the 2008 IEEE/ACM International Conference on ComputerAided Design
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
55
-
-
0033726332
-
Transient fault detection via simultaneous multithreading
-
New York, NY, USA, ACM.
-
S. K. Reinhardt and S.S. Mukherjee. Transient fault detection via simultaneous multithreading. In ISCA '00: Proceedings of the 27th annual international symposium on Computer architecture, pages 25-36, New York, NY, USA, 2000. ACM.
-
(2000)
ISCA '00: Proceedings of the 27th Annual International Symposium on Computer Architecture
, pp. 25-36
-
-
Reinhardt, S.K.1
Mukherjee, S.S.2
-
57
-
-
70449123838
-
New design strategy for improving hardware trojan detection and reducing trojan activation time
-
HOST '09. IEEE International Workshop on July
-
H. Salmani, M. Tehranipoor, and J. Plusquellic. New design strategy for improving hardware trojan detection and reducing trojan activation time. In Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on, pages 66-73, July 2009.
-
(2009)
Hardware-Oriented Security and Trust, 2009.
, pp. 66-73
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
58
-
-
84893793732
-
Masking the energy behavior of des encryption
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. Irwin, R. Brooks, S. Kim, and W. Zhang. Masking the Energy Behavior of DES Encryption. In Proceedings of the Design Automation and Test in Europe Conference (DATE), 2003.
-
(2003)
Proceedings of the Design Automation and Test in Europe Conference (DATE)
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
59
-
-
34249809980
-
Phoenix: Detecting and recovering from permanent processor design bugs with programmable hardware
-
Washington, DC, USA, IEEE Computer Society.
-
S. R. Sarangi, A. Tiwari, and J. Torrellas. Phoenix: Detecting and recovering from permanent processor design bugs with programmable hardware. In MICRO 39: Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 26-37, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
MICRO 39: Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 26-37
-
-
Sarangi, S.R.1
Tiwari, A.2
Torrellas, J.3
-
61
-
-
7244254277
-
Magic boxes and boots: Security in hardware
-
S. Smith. Magic boxes and boots: Security in hardware. IEEE Computer, 37(10): 106-109, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 106-109
-
-
Smith, S.1
-
62
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
New York, NY, USA, ACM Press.
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM Press.
-
(2007)
Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
67
-
-
62649134605
-
-
United Stated Department of Defense. February
-
United Stated Department of Defense. High performance microchip supply, February 2005.
-
(2005)
High Performance Microchip Supply
-
-
-
68
-
-
57349155550
-
Sequential equivalence checking between system level and rtl descriptions
-
S. Vasudevan, V Viswanath, J. A. Abraham, and J. Tu. Sequential equivalence checking between system level and rtl descriptions. Design Automation for Embedded Systems, 12(4): 377-396, 2008.
-
(2008)
Design Automation for Embedded Systems
, vol.12
, Issue.4
, pp. 377-396
-
-
Vasudevan, S.1
Viswanath, V.2
Abraham, J.A.3
Tu, J.4
-
69
-
-
37649030695
-
Circuits and design techniques for secure ICs resistant to side-channel attacks
-
May
-
I. Verbauwhede, K. Tiri, D. Hwang, A. Hodjat, and P. Schaumont. Circuits and Design Techniques for Secure ICs Resistant to Side-Channel Attacks. In Proceedings of the International Conference on IC Design & Technology (ICICDT), pages 1-4, May 2006.
-
(2006)
Proceedings of the International Conference on IC Design & Technology (ICICDT)
, pp. 1-4
-
-
Verbauwhede, I.1
Tiri, K.2
Hwang, D.3
Hodjat, A.4
Schaumont, P.5
-
70
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
June
-
X. Wang, M. Tehranipoor, and J. Plusquellic. Detecting malicious inclusions in secure hardware: Challenges and solutions. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 15-19, June 2008.
-
(2008)
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on
, pp. 15-19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
71
-
-
40949114573
-
Hierarchical verification for increasing performance in reliable processors
-
J. Yoo and M. Franklin. Hierarchical verification for increasing performance in reliable processors. J. Electron. Test., 24(1-3): 117-128, 2008.
-
(2008)
J. Electron. Test
, vol.24
, Issue.1-3
, pp. 117-128
-
-
Yoo, J.1
Franklin, M.2
-
72
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan.-Feb. 2010.
-
M.-D. M. Yu and S. Devadas. Secure and robust error correction for physical unclonable functions. Design & Test of Computers, IEEE, 27(1): 48-65, Jan.-Feb. 2010.
-
Design & Test of Computers, IEEE
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.-D.M.1
Devadas, S.2
|