-
1
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DAC'07, Jun. 4-8 [Online]. Available:
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM/IEEE Design Autom. Conf., DAC'07, Jun. 4-8, 2007, pp. 9-14. [Online]. Available: https://www.trustedcomputinggroup.org/home
-
(2007)
Proc. 44th ACM/IEEE Design Autom. Conf.
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
2
-
-
51749089495
-
Brand and IP protection with physical unclonable functions
-
Syst., ISCAS'08, May 18-21
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Brand and IP protection with physical unclonable functions," in Proc. IEEE Int. Symp. Circuits, Syst., ISCAS'08, May 18-21, 2008, pp. 3186-3189.
-
(2008)
Proc. IEEE Int. Symp. Circuits
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
4
-
-
78149466000
-
-
D. Wheeler and R. Needham, TEA Extensions Cambridge Univ., Cambridge, U.K., Tech. Rep., 1997
-
D. Wheeler and R. Needham, TEA Extensions Cambridge Univ., Cambridge, U.K., Tech. Rep., 1997.
-
-
-
-
5
-
-
0021140198
-
A secure one-way hash function built from des
-
Xilinx Embedded Systems Tool Reference Manual
-
R. Winternitz, "A secure one-way hash function built from DES," in Proc. IEEE Symp. Informat. Security Privacy, 1984, pp. 88-90. Xilinx Embedded Systems Tool Reference Manual.
-
(1984)
Proc. IEEE Symp. Informat. Security Privacy
, pp. 88-90
-
-
Winternitz, R.1
-
8
-
-
51049117293
-
Efficient helper data key extractor on FPGAs
-
C. Bosch, J. Guajardo, A. Sadeghi, J. Shokrollahi, and P. Tuyls, "Efficient helper data key extractor on FPGAs," in Proc. Cryptographic Hardware Embedded Syst., CHES'08, 2008, pp. 181-197
-
(2008)
Proc. Cryptographic Hardware Embedded Syst., CHES'08
, pp. 181-197
-
-
Bosch, C.1
Guajardo, J.2
Sadeghi, A.3
Shokrollahi, J.4
Tuyls, P.5
-
10
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Proc. Cryptographic Hardware Embedded Syst., CHES'07, 2007, pp. 63-80.
-
(2007)
Proc. Cryptographic Hardware Embedded Syst., CHES'07
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
11
-
-
27544441530
-
Design and implementation of the AEGIS single-chip secure processor using physical random functions
-
G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas, "Design and implementation of the AEGIS single-chip secure processor using physical random functions," SIGARCH Comput. Archit. News 33, pp. 25-36, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
12
-
-
78149464945
-
Volatile FPGA design security\A survey
-
[Online]. Available:
-
"Volatile FPGA design security\A survey," Saar Drimer, 2008. [Online]. Available: http://www.cl.cam.ac.uk~sd410/papers/fpga-se-curity.pdf
-
(2008)
Saar Drimer
-
-
-
13
-
-
70349252061
-
Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
-
Oct 27
-
M. J. Atallah, E. D. Bryant, J. T. Korb, and J. R. Rice, "Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity," in Proc. 1st ACM Workshop Virtual Machine Security, Oct 27, 2008, pp. 45-48.
-
(2008)
Proc. 1st ACM Workshop Virtual Machine Security
, pp. 45-48
-
-
Atallah, M.J.1
Bryant, E.D.2
Korb, J.T.3
Rice, J.R.4
-
14
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation\Tools for software protection
-
Aug.
-
C. S. Collberg and C. Thomborson, "Watermarking, tamper-proofing, and obfuscation\Tools for software protection," IEEE Trans. Softw. Eng., vol. 28, no. 8, pp. 735-746, Aug. 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
15
-
-
84959055142
-
Dynamic self-checking techniques for improved tamper resistance
-
Lecture Notes in Computer Science
-
B. Horne, L. Matheson, C. Sheehan, and R. E. Tarjan, "Dynamic self-checking techniques for improved tamper resistance," Security and Privacy in Digital Rights Management, vol. 2320, Lecture Notes in Computer Science, pp. 141-159, 2002.
-
(2002)
Security and Privacy in Digital Rights Management
, vol.2320
, pp. 141-159
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.E.4
-
16
-
-
84959058990
-
Protecting software code by guards
-
Lecture Notes in Computer Science
-
H. Chang and M. Atallah, "Protecting software code by guards," Security and Privacy in Digital Rights Management, vol. 2320, Lecture Notes in Computer Science, pp. 160-175, 2002.
-
(2002)
Security and Privacy in Digital Rights Management
, vol.2320
, pp. 160-175
-
-
Chang, H.1
Atallah, M.2
-
17
-
-
33645998409
-
Towards better software tamper resistance
-
Lecture Notes in Computer Science
-
H. Jin, G. Myles, and J. Lotspiech, "Towards better software tamper resistance," Proc. ISC 2005, vol. 3650, Lecture Notes in Computer Science, pp. 417-430, 2005.
-
(2005)
Proc. ISC 2005
, vol.3650
, pp. 417-430
-
-
Jin, H.1
Myles, G.2
Lotspiech, J.3
-
18
-
-
61649084032
-
Hash function based software watermarking
-
Dec. 13-15
-
X. Zhang, F. He, and W. Zuo, "Hash function based software watermarking," in Proc. Advanced Softw. Eng. Appl., Dec. 13-15, 2008, pp. 95-98.
-
(2008)
Proc. Advanced Softw. Eng. Appl.
, pp. 95-98
-
-
Zhang, X.1
He, F.2
Zuo, W.3
-
19
-
-
84949509764
-
Experience with software watermarking
-
ACSAC'00, Dec.
-
J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang, "Experience with software watermarking," in Proc. 16th Annu. Conf. Comput. Security Appl., ACSAC'00, Dec. 2000, pp. 308-316.
-
(2000)
Proc. 16th Annu. Conf. Comput. Security Appl.
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
20
-
-
33745828710
-
Control flow based obfuscation
-
Nov. 7
-
J. Ge, S. Chaudhuri, and A. Tyagi, "Control flow based obfuscation," in Proc. 5th ACM Workshop on Digital Rights Manage., Nov. 7, 2005, pp. 83-92.
-
(2005)
Proc. 5th ACM Workshop on Digital Rights Manage.
, pp. 83-92
-
-
Ge, J.1
Chaudhuri, S.2
Tyagi, A.3
-
21
-
-
77249090126
-
Mechanism for software tamper resistance: An application of white-box cryptography
-
Oct. 29
-
W. Michiels and P. Gorissen, "Mechanism for software tamper resistance: An application of white-box cryptography," in Proc. ACM Workshop Digital Rights Manage., Oct. 29, 2007, pp. 82-89.
-
(2007)
Proc. ACM Workshop Digital Rights Manage.
, pp. 82-89
-
-
Michiels, W.1
Gorissen, P.2
-
22
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
DOI 10.1109/TDSC.2005.24
-
P. van Oorschot, A. Somayaji, and G. Wurster, "Hardware-assisted circumvention of self-hashing software tamper resistance," IEEE Trans. Dependable Secure Comput., vol. 2, no. 2, pp. 82-92, Apr.-Jun. 2005. (Pubitemid 41259858)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 82-92
-
-
Van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
-
23
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
Jun. 23-26
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architecture for tamper-evident and tamper-resistant processing," in Proc. 17th Annu. Int. Conf. Supercomput., Jun. 23-26, 2003, pp. 160-171.
-
(2003)
Proc. 17th Annu. Int. Conf. Supercomput.
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
24
-
-
33748525201
-
The electronic part supply chain and risks of counterfeit parts in defense applications
-
Sep.
-
J. Stradley and D. Karraker, "The electronic part supply chain and risks of counterfeit parts in defense applications," IEEE Trans. Components and Packaging Technol., vol. 29, no. 3, pp. 703-705, Sep. 2006.
-
(2006)
IEEE Trans. Components and Packaging Technol.
, vol.29
, Issue.3
, pp. 703-705
-
-
Stradley, J.1
Karraker, D.2
-
25
-
-
78149465704
-
-
The International Anti-Counterfeiting Directory 2002 [Online]. Available
-
The International Anti-Counterfeiting Directory 2002, Counterfeiting Intelligence Bureau, 2005. [Online]. Available: http://www.ic-cwbo.org/ccs/cib- bureau/CIBDir.pdf
-
(2005)
Counterfeiting Intelligence Bureau
-
-
-
26
-
-
78149464241
-
-
RF Café\Gray Market (Counterfeit Components) [Online] Available:
-
RF Café\Gray Market (Counterfeit Components), 2006. [Online]. Available: www.rfcafe.com/references/gray-market-links.htm
-
(2006)
-
-
-
27
-
-
78149465889
-
Managing the risks of counterfeiting in the information technology industry
-
[Online]. Available:
-
"Managing the risks of counterfeiting in the information technology industry," White Paper, KPMG Electronics, 2005. [Online]. Available: http://www.agmaglobal.org/
-
(2005)
White Paper, KPMG Electronics
-
-
-
28
-
-
33646472901
-
Bogus: Electronic manufacturing and consumers confront a rising tide of counterfeit electronics
-
May
-
M. Pecht and S. Tiku, "Bogus: Electronic manufacturing and consumers confront a rising tide of counterfeit electronics," IEEE Spectrum, vol. 43, no. 5, pp. 37-46, May 2006.
-
(2006)
IEEE Spectrum
, vol.43
, Issue.5
, pp. 37-46
-
-
Pecht, M.1
Tiku, S.2
-
30
-
-
38149139392
-
Malicious code detection for open firmware
-
F. Adelstein, M. Stillerman, and D. Kozen, "Malicious code detection for open firmware," in Proc. 18th Annu. Comput. Security Appl. Conf., 2002, pp. 403-412.
-
(2002)
Proc. 18th Annu. Comput. Security Appl. Conf.
, pp. 403-412
-
-
Adelstein, F.1
Stillerman, M.2
Kozen, D.3
-
31
-
-
34547317243
-
Trusted hardware: Can it be trustworthy?
-
DAC'07, Jun. 4-8
-
C. E. Irvine and K. Levitt, "Trusted hardware: Can it be trustworthy?," in Proc. 44th ACM/IEEE Design Autom. Conf., DAC'07, Jun. 4-8, 2007, pp. 1-4.
-
(2007)
Proc. 44th ACM/IEEE Design Autom. Conf.
, pp. 1-4
-
-
Irvine, C.E.1
Levitt, K.2
-
32
-
-
70349273538
-
Attack of the clones: Building clone-resistant products
-
B. Jun, "Attack of the clones: Building clone-resistant products," in Presentation in Proceedings of RSA Conf., 2006.
-
(2006)
Presentation in Proceedings of RSA Conf.
-
-
Jun, B.1
-
33
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
ISCA'05, Madison, WI Jun. 4-8
-
R. B. Lee, P. Kwan, J. P. McGregor, J. Dwoskin, and Z. Wang, "Architecture for protecting critical secrets in microprocessors," in Proc. 32nd Int. Symp. Comput. Architecture, ISCA'05, Madison, WI, Jun. 4-8, 2005, pp. 2-13.
-
(2005)
Proc. 32nd Int. Symp. Comput. Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
34
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Privacy, May 4-7
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture," in Proc. IEEE Symp. Security, Privacy, May 4-7, 1997, pp. 65-71.
-
(1997)
Proc. IEEE Symp. Security
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
35
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Aug.
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. 13th Usenix Security Symp., Aug. 2004, pp. 16-16.
-
(2004)
Proc. 13th Usenix Security Symp.
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
36
-
-
50249131957
-
Secure firmware updates over the air in intelligent vehicles
-
ICC'08, May 19-23
-
D. K. Nilsson and U. E. Larson, "Secure firmware updates over the air in intelligent vehicles," in Proc. IEEE Int. Conf. Commun. Workshops, ICC'08, May 19-23, 2008, pp. 380-384.
-
(2008)
Proc. IEEE Int. Conf. Commun. Workshops
, pp. 380-384
-
-
Nilsson, D.K.1
Larson, U.E.2
-
38
-
-
62849122781
-
Securing vehicles against cyber attacks
-
CSIIRW'08
-
U. E. Larson and D. K. Nilsson, "Securing vehicles against cyber attacks," in Proc. 4th Annu. Workshop Cyber Security Inform. Intell. Res., CSIIRW'08, 2008, vol. 288, pp. 1-3.
-
(2008)
Proc. 4th Annu. Workshop Cyber Security Inform. Intell. Res.
, vol.288
, pp. 1-3
-
-
Larson, U.E.1
Nilsson, D.K.2
-
39
-
-
51749089495
-
Brand and IP protection with physical unclonable functions
-
ISCAS'08, May 18-21
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Brand and IP protection with physical unclonable functions," in Proc. IEEE Int. Symp. Circuits Syst., ISCAS'08, May 18-21, 2008, pp. 3186-3189.
-
(2008)
Proc. IEEE Int. Symp. Circuits Syst.
, pp. 3186-3189
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
40
-
-
48149093328
-
Physical un-clonable functions and public-key crypto for FPGA IP protection
-
FPL'07 Aug. 27-29
-
J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Physical un-clonable functions and public-key crypto for FPGA IP protection," in Proc. Int. Conf. Field Programmable Logic Appl., FPL'07, Aug. 27-29, 2007, pp. 189-195.
-
(2007)
Proc. Int. Conf. Field Programmable Logic Appl.
, pp. 189-195
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
41
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-hashing for message authentication," in Internet RFC 2104. 1997.
-
(1997)
Internet RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
42
-
-
46449138830
-
Controlled physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Controlled physical random functions," in Proc. 18th Annu. Comput. Security Appl. Conf., 2002, pp. 149-160.
-
(2002)
Proc. 18th Annu. Comput. Security Appl. Conf.
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
43
-
-
70449794558
-
Improving the quality of a physical unclonable function using configurable ring oscillators
-
FPL'09 Aug. 2
-
A. Maiti and P. Schaumont, "Improving the quality of a physical unclonable function using configurable ring oscillators," in Proc. Int. Conf. Field Programmable Logic Appl., FPL'09, Aug. 2, 2009, pp. 703-707.
-
(2009)
Proc. Int. Conf. Field Programmable Logic Appl.
, pp. 703-707
-
-
Maiti, A.1
Schaumont, P.2
-
44
-
-
54949144684
-
Secure FPGA configuration architecture preventing system downgrade
-
FPL'08 Sep. 8-10
-
B. Badrignans, R. Elbaz, and L. Torres, "Secure FPGA configuration architecture preventing system downgrade," in Proc. Int. Conf. Field Programmable Logic App., FPL'08, Sep. 8-10, 2008, pp. 317-322.
-
(2008)
Proc. Int. Conf. Field Programmable Logic App.
, pp. 317-322
-
-
Badrignans, B.1
Elbaz, R.2
Torres, L.3
-
45
-
-
70449926266
-
IP protection in partially reconfigurable FPGAs
-
FPL'09 Sep. 2
-
K. Kepa, F. Morgan, and K. Kosciuszkiewicz, "IP protection in partially reconfigurable FPGAs," in Proc. Int. Conf. Field Programmable Logic Appl., FPL'09, Sep. 2, 2009, pp. 403-409.
-
(2009)
Proc. Int. Conf. Field Programmable Logic Appl.
, pp. 403-409
-
-
Kepa, K.1
Morgan, F.2
Kosciuszkiewicz, K.3
-
46
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D.Lie,C.Thekkath,M. Mitchell,P.Lincoln, D.Boneh, J. Mitchell, and Horowitz, "Architectural support for copy and tamper resistant software," in SIGPLAN Not. 35, 2000, pp. 168-177.
-
(2000)
SIGPLAN Not.
, vol.35
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz7
-
47
-
-
62349135782
-
Forward-secure content distribution to reconfigurable hardware
-
D. Champagne, R. Elbaz, C. Gebotys, L. Torres, and R. B. Lee, "Forward-secure content distribution to reconfigurable hardware," in Re-configurable Computing and FPGAs, 2008.
-
(2008)
Re-configurable Computing and FPGAs
-
-
Champagne, D.1
Elbaz, R.2
Gebotys, C.3
Torres, L.4
Lee, R.B.5
-
49
-
-
48149113769
-
Wires on demand: Run-time communication synthesis for reconfigurable computing
-
Aug. 27-29
-
P. Athanas, J. Bowen, T. Dunham, C. Patterson, J. Rice, M. Shel-burne, J. Suris, M. Bucciero, and J. Graf, "Wires on demand: Run-time communication synthesis for reconfigurable computing," in Proc. Int. Conf. Field Programmable Logic Appl., FPL'07, Aug. 27-29, 2007, pp. 513-516.
-
(2007)
Proc. Int. Conf. Field Programmable Logic Appl., FPL'07
, pp. 513-516
-
-
Athanas, P.1
Bowen, J.2
Dunham, T.3
Patterson, C.4
Rice, J.5
Shel-Burne, M.6
Suris, J.7
Bucciero, M.8
Graf, J.9
-
50
-
-
70350599741
-
The state-of-the-art in IC reverse engineering
-
Lecture Notes in Computer Science
-
R. Torrance, "The state-of-the-art in IC reverse engineering," in Proc. Cryptographic Hardware and Embedded Systems (CHES 2009), vol. 5747, Lecture Notes in Computer Science, pp. 363-381.
-
(2009)
Proc. Cryptographic Hardware and Embedded Systems (CHES
, vol.5747
, pp. 363-381
-
-
Torrance, R.1
|