-
1
-
-
77955726606
-
-
DARPA:, TIC
-
DARPA: TRUST in Integrated Circuits, TIC (2007), http://www.darpa.mil/ MTO/solicitations/baa07-24
-
(2007)
TRUST in Integrated Circuits
-
-
-
2
-
-
44449083733
-
The hunt for the kill switch
-
Adee, S.: The hunt for the kill switch. IEEE Spectrum 45(5), 34-39 (2008)
-
(2008)
IEEE Spectrum.
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
3
-
-
85084095841
-
Designing and implementing malicious hardware
-
King, S., et al.: Designing and implementing malicious hardware. In: LEET (2008)
-
(2008)
LEET
-
-
King, S.1
-
4
-
-
49749105556
-
Towards trojan-free trusted ICs: Problem analysis and detection scheme
-
Wolff, F., et al.: Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: DATE, pp. 1362-1365 (2008)
-
(2008)
DATE
, pp. 1362-1365
-
-
Wolff, F.1
-
6
-
-
78649519550
-
A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions
-
Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Tran. VLSI (2010)
-
(2010)
IEEE Tran. VLSI
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
7
-
-
51849107491
-
A region based approach for the identification of hardware Trojans
-
Banga, M., Hsiao, M.: A region based approach for the identification of hardware Trojans. In: HOST, pp. 40-47 (2008)
-
(2008)
HOST
, pp. 40-47
-
-
Banga, M.1
Hsiao, M.2
-
8
-
-
67650670977
-
The problem of hardware Trojans detection in system-on-chip
-
Adamov, A., Saprykin, A., Melnik, D., Lukashenko, O.: The problem of hardware Trojans detection in system-on-chip. In: CADSM, pp. 178-179 (2009)
-
(2009)
CADSM
, pp. 178-179
-
-
Adamov, A.1
Saprykin, A.2
Melnik, D.3
Lukashenko, O.4
-
9
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Symposium on Security and Privacy, pp. 296-310 (2007)
-
(2007)
Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
10
-
-
70350729558
-
Taxonomy of Trojans and methods of detection for IC trust
-
Rad, R., Wang, X., Tehranipoor, M., Plusquellic, J.: Taxonomy of Trojans and methods of detection for IC trust. In: ICCAD (2008)
-
(2008)
ICCAD
-
-
Rad, R.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
11
-
-
51849095999
-
Hardware Trojan detection using path delay fingerprint
-
Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: HOST (2008)
-
(2008)
HOST
-
-
Jin, Y.1
Makris, Y.2
-
12
-
-
79952530026
-
MERO: A statistical approach for Hardware Trojan detection
-
Chakraborty, R. S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: A statistical approach for Hardware Trojan detection. In: CHES (2009)
-
(2009)
CHES
-
-
Chakraborty, R.S.1
Wolff, F.2
Paul, S.3
Papachristou, C.4
Bhunia, S.5
-
13
-
-
0041633858
-
Parameter variations and impact on circuits and microarchitecture
-
Borkar, S., et al.: Parameter variations and impact on circuits and microarchitecture. In: DAC, pp. 338-342 (2003)
-
(2003)
DAC
, pp. 338-342
-
-
Borkar, S.1
-
14
-
-
0003663467
-
-
4th edn. McGraw-Hill, New York
-
Papoulis, A., Pillai, S. U.: Probability, Random Variables and Stochastic Processes, 4th edn. McGraw-Hill, New York (2002)
-
(2002)
Probability, Random Variables and Stochastic Processes
-
-
Papoulis, A.1
Pillai, S.U.2
-
15
-
-
78049327434
-
-
Predictive Technology Model
-
Predictive Technology Model, http://www.eas.asu.edu/~ptm/
-
-
-
|