-
1
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
M. Banga, M. Hsiao. A Region Based Approach for the Identification of Hardware Trojans. HOST 2008, pp. 40-47.
-
(2008)
HOST
, pp. 40-47
-
-
Banga, M.1
Hsiao, M.2
-
4
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
N. Beckmann, M. Potkonjak. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions. Information Hiding 2009, pp. 206-220.
-
(2009)
Information Hiding
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
5
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable PUFs
-
M. Majzoobi, F. Koushanfar, M. Potkonjak. Techniques for Design and Implementation of Secure Reconfigurable PUFs. ACM TRETS, Vol.2 No.1, 2009, pp. 1-33.
-
(2009)
ACM TRETS
, vol.2
, Issue.1
, pp. 1-33
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
6
-
-
34547252533
-
CAD-based security cryptography and digital rights management
-
F. Koushanfar, M. Potkonjak. CAD-based Security, Cryptography, and Digital Rights Management. DAC 2007, pp. 268-269.
-
(2007)
DAC
, pp. 268-269
-
-
Koushanfar, F.1
Potkonjak, M.2
-
7
-
-
76349093122
-
Consistency-based characterization for ic trojan detection
-
Y. Alkabani, F. Koushanfar. Consistency-based Characterization for IC Trojan Detection. ICCAD 2009, pp. 123-127.
-
(2009)
ICCAD
, pp. 123-127
-
-
Alkabani, Y.1
Koushanfar, F.2
-
8
-
-
84886673851
-
Modeling within-die spatial correlation effects for process-design co-optimization
-
P. Friedberg, Y Cao, J. Cain, R. Wang, J. Rabaey, C. Spanos. Modeling Within-Die Spatial Correlation Effects for Process-Design Co-Optimization. ISQED 2005. pp. 516-521.
-
(2005)
ISQED
, pp. 516-521
-
-
Friedberg, P.1
Cao, Y.2
Cain, J.3
Wang, R.4
Rabaey, J.5
Spanos, C.6
-
9
-
-
51549088218
-
Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability
-
Y. Alkabani, T. Massey, F. Koushanfar, M. Potkonjak. Input Vector Control for Post-silicon Leakage Current Minimization in the Presence of Manufacturing Variability. DAC 2008, pp. 606-609.
-
(2008)
DAC
, pp. 606-609
-
-
Alkabani, Y.1
Massey, T.2
Koushanfar, F.3
Potkonjak, M.4
-
10
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, M. Potkonjak. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Information Hiding 2008, pp. 102-117.
-
(2008)
Information Hiding
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
11
-
-
57849113504
-
Post-silicon timing characterization by compressed sensing
-
F. Koushanfar, P. Boufounos, D. Shamsi. Post-silicon Timing Characterization by Compressed Sensing. ICCAD 2008, pp. 185-189.
-
(2008)
ICCAD
, pp. 185-189
-
-
Koushanfar, F.1
Boufounos, P.2
Shamsi, D.3
-
12
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
M. Tehranipoor, F. Koushanfar. A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design and Test of Computers, Vol.27, No.1, 2010, pp. 10-25.
-
(2010)
IEEE Design and Test of Computers
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
13
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar. Trojan Detection Using IC Fingerprinting. S&P 2007, pp. 296-310.
-
(2007)
S&P
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
14
-
-
51849099113
-
At-speed delay characterization for IC authentication and trojan horse detection
-
J. Li, J. Lach. At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. HOST 2008, pp. 8-14.
-
(2008)
HOST
, pp. 8-14
-
-
Li, J.1
Lach, J.2
-
16
-
-
70350733802
-
Hardware trojan horse detection using gate-level characterization
-
M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey. Hardware Trojan Horse Detection Using Gate-level Characterization. DAC 2009, pp. 688-693.
-
(2009)
DAC
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
17
-
-
0038684860
-
Temperature-aware microarchitecture
-
K. Skadron, M. Stan, W. Huang, S. Velusamy, K. Sankaranarayanan, D. Tarjan. Temperature-aware Microarchitecture. ISCA 2003, pp. 2-13.
-
(2003)
ISCA
, pp. 2-13
-
-
Skadron, K.1
Stan, M.2
Huang, W.3
Velusamy, S.4
Sankaranarayanan, K.5
Tarjan, D.6
-
18
-
-
33645009272
-
A combined gate replacement and input vector control approach for leakage current reduction
-
L. Yuan, G. Qu. A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No.2, 2006, pp. 173-182.
-
(2006)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.14
, Issue.2
, pp. 173-182
-
-
Yuan, L.1
Qu, G.2
|