메뉴 건너뛰기




Volumn , Issue , 2010, Pages 222-227

Gate-level characterization: Foundations and hardware security applications

Author keywords

Gate level characterization; Hardware Trojan horse; Manufacturing variability; Thermal conditioning

Indexed keywords

AVERAGE ERRORS; CONSTRAINT MANIPULATION; DIGITAL RIGHTS MANAGEMENT; GATE LEVELS; GATE-LEVEL CHARACTERIZATION; HARDWARE SECURITY; LEAKAGE POWER; MANUFACTURING VARIABILITY; NEW SOLUTIONS; SCALING FACTORS; SIMULATION RESULT; STRONG CORRELATION; SYSTEM OF LINEAR EQUATIONS; TARGET CIRCUITS; THERMAL CONDITIONING; THERMAL CONTROL; TROJAN HORSE;

EID: 77956221000     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837274.1837332     Document Type: Conference Paper
Times cited : (68)

References (19)
  • 1
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • M. Banga, M. Hsiao. A Region Based Approach for the Identification of Hardware Trojans. HOST 2008, pp. 40-47.
    • (2008) HOST , pp. 40-47
    • Banga, M.1    Hsiao, M.2
  • 4
    • 70350469042 scopus 로고    scopus 로고
    • Hardware-based public-key cryptography with public physically unclonable functions
    • N. Beckmann, M. Potkonjak. Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions. Information Hiding 2009, pp. 206-220.
    • (2009) Information Hiding , pp. 206-220
    • Beckmann, N.1    Potkonjak, M.2
  • 5
    • 76949093125 scopus 로고    scopus 로고
    • Techniques for design and implementation of secure reconfigurable PUFs
    • M. Majzoobi, F. Koushanfar, M. Potkonjak. Techniques for Design and Implementation of Secure Reconfigurable PUFs. ACM TRETS, Vol.2 No.1, 2009, pp. 1-33.
    • (2009) ACM TRETS , vol.2 , Issue.1 , pp. 1-33
    • Majzoobi, M.1    Koushanfar, F.2    Potkonjak, M.3
  • 6
    • 34547252533 scopus 로고    scopus 로고
    • CAD-based security cryptography and digital rights management
    • F. Koushanfar, M. Potkonjak. CAD-based Security, Cryptography, and Digital Rights Management. DAC 2007, pp. 268-269.
    • (2007) DAC , pp. 268-269
    • Koushanfar, F.1    Potkonjak, M.2
  • 7
    • 76349093122 scopus 로고    scopus 로고
    • Consistency-based characterization for ic trojan detection
    • Y. Alkabani, F. Koushanfar. Consistency-based Characterization for IC Trojan Detection. ICCAD 2009, pp. 123-127.
    • (2009) ICCAD , pp. 123-127
    • Alkabani, Y.1    Koushanfar, F.2
  • 8
    • 84886673851 scopus 로고    scopus 로고
    • Modeling within-die spatial correlation effects for process-design co-optimization
    • P. Friedberg, Y Cao, J. Cain, R. Wang, J. Rabaey, C. Spanos. Modeling Within-Die Spatial Correlation Effects for Process-Design Co-Optimization. ISQED 2005. pp. 516-521.
    • (2005) ISQED , pp. 516-521
    • Friedberg, P.1    Cao, Y.2    Cain, J.3    Wang, R.4    Rabaey, J.5    Spanos, C.6
  • 9
    • 51549088218 scopus 로고    scopus 로고
    • Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability
    • Y. Alkabani, T. Massey, F. Koushanfar, M. Potkonjak. Input Vector Control for Post-silicon Leakage Current Minimization in the Presence of Manufacturing Variability. DAC 2008, pp. 606-609.
    • (2008) DAC , pp. 606-609
    • Alkabani, Y.1    Massey, T.2    Koushanfar, F.3    Potkonjak, M.4
  • 10
    • 56749170623 scopus 로고    scopus 로고
    • Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
    • Y. Alkabani, F. Koushanfar, N. Kiyavash, M. Potkonjak. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Information Hiding 2008, pp. 102-117.
    • (2008) Information Hiding , pp. 102-117
    • Alkabani, Y.1    Koushanfar, F.2    Kiyavash, N.3    Potkonjak, M.4
  • 11
    • 57849113504 scopus 로고    scopus 로고
    • Post-silicon timing characterization by compressed sensing
    • F. Koushanfar, P. Boufounos, D. Shamsi. Post-silicon Timing Characterization by Compressed Sensing. ICCAD 2008, pp. 185-189.
    • (2008) ICCAD , pp. 185-189
    • Koushanfar, F.1    Boufounos, P.2    Shamsi, D.3
  • 12
  • 14
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for IC authentication and trojan horse detection
    • J. Li, J. Lach. At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection. HOST 2008, pp. 8-14.
    • (2008) HOST , pp. 8-14
    • Li, J.1    Lach, J.2
  • 16
    • 70350733802 scopus 로고    scopus 로고
    • Hardware trojan horse detection using gate-level characterization
    • M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey. Hardware Trojan Horse Detection Using Gate-level Characterization. DAC 2009, pp. 688-693.
    • (2009) DAC , pp. 688-693
    • Potkonjak, M.1    Nahapetian, A.2    Nelson, M.3    Massey, T.4
  • 18
    • 33645009272 scopus 로고    scopus 로고
    • A combined gate replacement and input vector control approach for leakage current reduction
    • L. Yuan, G. Qu. A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No.2, 2006, pp. 173-182.
    • (2006) IEEE Transactions on Very Large Scale Integration (VLSI) Systems , vol.14 , Issue.2 , pp. 173-182
    • Yuan, L.1    Qu, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.