메뉴 건너뛰기




Volumn 6225 LNCS, Issue , 2010, Pages 173-187

Self-referencing: A scalable side-channel approach for hardware trojan detection

Author keywords

Hardware Trojan; Self referencing; Side channel analysis

Indexed keywords

EMBEDDED SYSTEMS; INTEGRATED CIRCUIT DESIGN; INTEGRATED CIRCUITS; MALWARE; NANOTECHNOLOGY; SENSITIVITY ANALYSIS; SIDE CHANNEL ATTACK; THRESHOLD VOLTAGE;

EID: 78049331855     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15031-9_12     Document Type: Conference Paper
Times cited : (91)

References (15)
  • 1
    • 77955726606 scopus 로고    scopus 로고
    • DARPA:, TIC
    • DARPA: TRUST in Integrated Circuits, TIC (2007), http://www.darpa.mil/ MTO/solicitations/baa07-24
    • (2007) TRUST in Integrated Circuits
  • 2
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • Adee, S.: The hunt for the kill switch. IEEE Spectrum 45(5), 34-39 (2008)
    • (2008) IEEE Spectrum. , vol.45 , Issue.5 , pp. 34-39
    • Adee, S.1
  • 3
    • 85084095841 scopus 로고    scopus 로고
    • Designing and implementing malicious hardware
    • King, S., et al.: Designing and implementing malicious hardware. In: LEET (2008)
    • (2008) LEET
    • King, S.1
  • 4
    • 49749105556 scopus 로고    scopus 로고
    • Towards trojan-free trusted ICs: Problem analysis and detection scheme
    • Wolff, F., et al.: Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: DATE, pp. 1362-1365 (2008)
    • (2008) DATE , pp. 1362-1365
    • Wolff, F.1
  • 6
    • 78649519550 scopus 로고    scopus 로고
    • A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions
    • Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Tran. VLSI (2010)
    • (2010) IEEE Tran. VLSI
    • Rad, R.1    Plusquellic, J.2    Tehranipoor, M.3
  • 7
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware Trojans
    • Banga, M., Hsiao, M.: A region based approach for the identification of hardware Trojans. In: HOST, pp. 40-47 (2008)
    • (2008) HOST , pp. 40-47
    • Banga, M.1    Hsiao, M.2
  • 8
    • 67650670977 scopus 로고    scopus 로고
    • The problem of hardware Trojans detection in system-on-chip
    • Adamov, A., Saprykin, A., Melnik, D., Lukashenko, O.: The problem of hardware Trojans detection in system-on-chip. In: CADSM, pp. 178-179 (2009)
    • (2009) CADSM , pp. 178-179
    • Adamov, A.1    Saprykin, A.2    Melnik, D.3    Lukashenko, O.4
  • 10
    • 70350729558 scopus 로고    scopus 로고
    • Taxonomy of Trojans and methods of detection for IC trust
    • Rad, R., Wang, X., Tehranipoor, M., Plusquellic, J.: Taxonomy of Trojans and methods of detection for IC trust. In: ICCAD (2008)
    • (2008) ICCAD
    • Rad, R.1    Wang, X.2    Tehranipoor, M.3    Plusquellic, J.4
  • 11
    • 51849095999 scopus 로고    scopus 로고
    • Hardware Trojan detection using path delay fingerprint
    • Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: HOST (2008)
    • (2008) HOST
    • Jin, Y.1    Makris, Y.2
  • 13
    • 0041633858 scopus 로고    scopus 로고
    • Parameter variations and impact on circuits and microarchitecture
    • Borkar, S., et al.: Parameter variations and impact on circuits and microarchitecture. In: DAC, pp. 338-342 (2003)
    • (2003) DAC , pp. 338-342
    • Borkar, S.1
  • 15
    • 78049327434 scopus 로고    scopus 로고
    • Predictive Technology Model
    • Predictive Technology Model, http://www.eas.asu.edu/~ptm/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.