-
1
-
-
78751647554
-
-
Cyber security awareness week 2008
-
Cyber security awareness week 2008 (2008).
-
(2008)
-
-
-
2
-
-
51949094261
-
-
Proceedings of the Conference on Adaptive Hardware and Systems (AHS)
-
Abdel-Hamid, A., Tahar, S.: Fragile IP watermarking techniques. In: Proceedings of the Conference on Adaptive Hardware and Systems (AHS), pp. 513-519 (2008).
-
(2008)
Fragile IP watermarking techniques
, pp. 513-519
-
-
Abdel-Hamid, A.1
Tahar, S.2
-
3
-
-
33646912488
-
-
Proceedings of the Conference on Design, Automation and Test in Europe (DATE)
-
Abdel-Hamid, A., Tahar, S., Aboulhamid, E. M.: A public-key watermarking technique for IP designs. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE), pp. 330-335 (2005).
-
(2005)
A public-key watermarking technique for IP designs
, pp. 330-335
-
-
Abdel-Hamid, A.1
Tahar, S.2
Aboulhamid, E.M.3
-
4
-
-
33845574341
-
-
Proceedings of the Conference on Adaptive Hardware and Systems (AHS)
-
Abdel-Hamid, A., Tahar, S., Aboulhamid, E. M.: Finite state machine IP watermarking: A tutorial. In: Proceedings of the Conference on Adaptive Hardware and Systems (AHS), pp. 457-464 (2006).
-
(2006)
Finite state machine IP watermarking: A tutorial
, pp. 457-464
-
-
Abdel-Hamid, A.1
Tahar, S.2
Aboulhamid, E.M.3
-
5
-
-
44449083733
-
The hunt for the kill switch
-
Adee, S.: The hunt for the kill switch. IEEE Spectrum 45 (May, 2008).
-
(2008)
IEEE Spectrum 45
-
-
Adee, S.1
-
7
-
-
49749144533
-
-
Proceedings of International Conference on Computer Aided Design (ICCAD)
-
Alkabani, Y., Koushanfar, F., Potkonjak, M.: Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of International Conference on Computer Aided Design (ICCAD), pp. 674-677 (2007).
-
(2007)
Remote activation of ICs for piracy prevention and digital right management
, pp. 674-677
-
-
Alkabani, Y.1
Koushanfar, F.2
Potkonjak, M.3
-
8
-
-
1242286077
-
-
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
-
Caldwell, A., Choi, H.-J., Kahng, A., Mantik, S., Potkonjak, M., Qu, G., Wong, J.: Effective iterative techniques for fingerprinting design IP. In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 208-215 (2004).
-
(2004)
Effective iterative techniques for fingerprinting design IP
, pp. 208-215
-
-
Caldwell, A.1
Choi, H.-J.2
Kahng, A.3
Mantik, S.4
Potkonjak, M.5
Qu, G.6
Wong, J.7
-
9
-
-
78751642090
-
-
DARPA. TRUST in integrated circuits (TIC)
-
DARPA. TRUST in integrated circuits (TIC) (2007).
-
(2007)
-
-
-
10
-
-
78751644780
-
-
Defense Science Board. Task force on high performance microchip supply. 200502HPMSReportFinal. pdf
-
Defense Science Board. Task force on high performance microchip supply. 200502HPMSReportFinal. pdf (2005).
-
(2005)
-
-
-
12
-
-
78751641607
-
-
Digilent. Basys system board
-
Digilent. Basys system board (2008).
-
(2008)
-
-
-
13
-
-
33645675518
-
AES-based security coprocessor IC in 0. 18-μm CMOS with resistance to differential power analysis side-channel attacks
-
Hwan, D., Tiri, K., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-based security coprocessor IC in 0. 18-μm CMOS with resistance to differential power analysis side-channel attacks. In: IEEE Transactions on Solid-State Circuits, pp. 781-792 (2006).
-
(2006)
IEEE Transactions on Solid-State Circuits
, pp. 781-792
-
-
Hwan, D.1
Tiri, K.2
Hodjat, A.3
Lai, B.-C.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
-
14
-
-
70449134838
-
-
Proceedings of the International Workshop on Hardware-Oriented Security and Trust (HOST)
-
Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware Trojan design and implementation. In: Proceedings of the International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 50-57 (2009).
-
(2009)
Experiences in hardware Trojan design and implementation
, pp. 50-57
-
-
Jin, Y.1
Kupp, N.2
Makris, Y.3
-
15
-
-
0035472848
-
Constraint-based watermarking techniques for design IP protection
-
Kahng, A., Lach, J., Mangione-Smith, W., Mantik, S., Markov, I., Potkonjak, M., Tucker, P., Wang, H., Wolfe, G.: Constraint-based watermarking techniques for design IP protection. In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1236-1252 (2001).
-
(2001)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, pp. 1236-1252
-
-
Kahng, A.1
Lach, J.2
Mangione-Smith, W.3
Mantik, S.4
Markov, I.5
Potkonjak, M.6
Tucker, P.7
Wang, H.8
Wolfe, G.9
-
16
-
-
1642575933
-
-
Proceedings of the International Workshop on Information Hiding (IH)
-
Lach, J., Mangione-Smith, W., Potkonjak, M.: Fingerprinting digital circuits on programmable hardware. In: Proceedings of the International Workshop on Information Hiding (IH), pp. 16-31 (1998).
-
(1998)
Fingerprinting digital circuits on programmable hardware
, pp. 16-31
-
-
Lach, J.1
Mangione-Smith, W.2
Potkonjak, M.3
-
17
-
-
0031633026
-
FPGA fingerprinting techniques for protecting intellectual property
-
Proceedings of the Custom Integrated Circuits Conference (CICC)
-
Lach, J., Mangione-Smith, W., Potkonjak, M.: FPGA fingerprinting techniques for protecting intellectual property. In: Proceedings of the Custom Integrated Circuits Conference (CICC), pp. 299-302 (1998).
-
(1998)
, pp. 299-302
-
-
Lach, J.1
Mangione-Smith, W.2
Potkonjak, M.3
-
18
-
-
4544381402
-
-
Proceedings of VLSI Circuits
-
Lee, J., Lim, D., Gassend, B., Suh, G. E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of VLSI Circuits, pp. 176-179 (2004).
-
(2004)
A technique to build a secret key in integrated circuits for identification and authentication applications
, pp. 176-179
-
-
Lee, J.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
19
-
-
0034428343
-
-
Proceedings of International Solid-State Circuits Conference (ISSCC)
-
Lofstrom, K., Daasch, W. R., Taylor, D.: IC identification circuit using device mismatch. In: Proceedings of International Solid-State Circuits Conference (ISSCC), pp. 372-373 (2000).
-
(2000)
IC identification circuit using device mismatch
, pp. 372-373
-
-
Lofstrom, K.1
Daasch, W.R.2
Taylor, D.3
-
20
-
-
0041663673
-
-
Electron Devices, IEEE Transactions on
-
Maeda, S., Kuriyama, H., Ipposhi, T., Maegawa, S., Inoue, Y., Inuishi, M., Kotani, N., Nishimura, T.: An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs. In: Electron Devices, IEEE Transactions on, pp. 1451-1458 (2003).
-
(2003)
An artificial fingerprint device (AFD): A study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs
, pp. 1451-1458
-
-
Maeda, S.1
Kuriyama, H.2
Ipposhi, T.3
Maegawa, S.4
Inoue, Y.5
Inuishi, M.6
Kotani, N.7
Nishimura, T.8
-
21
-
-
78751648041
-
-
NSA. Trusted access program office
-
NSA. Trusted access program office (2009).
-
(2009)
-
-
-
25
-
-
49749134668
-
-
Proceedings of Design, Automation, and Test in Europe (DATE)
-
Roy, J. A., Koushanfar, F., Markov, I. L.: EPIC: Ending piracy of integrated circuits. In: Proceedings of Design, Automation, and Test in Europe (DATE), pp. 1069-1074 (2008).
-
(2008)
EPIC: Ending piracy of integrated circuits
, pp. 1069-1074
-
-
Roy, J.A.1
Koushanfar, F.2
Markov, I.L.3
-
26
-
-
34548818732
-
-
Proceedings of International Solid-State Circuits Conference (ISSCC)
-
Su, Y., Holleman, J., Otis, B.: A 1. 6j/bit stable chip ID generating circuit using process variations. In: Proceedings of International Solid-State Circuits Conference (ISSCC), pp. 406-407 (2007).
-
(2007)
A 1. 6j/bit stable chip ID generating circuit using process variations
, pp. 406-407
-
-
Su, Y.1
Holleman, J.2
Otis, B.3
-
28
-
-
27544441530
-
-
Proceedings of International Symposium on Computer Architecture (ISCA)
-
Suh, G. E., O'Donnell, C. W., Sachdev, I., Devadas, S.: Design and implementation of the AEGIS single-chip secure processor using physical random functions. In: Proceedings of International Symposium on Computer Architecture (ISCA), pp. 25-36 (2005).
-
(2005)
Design and implementation of the AEGIS single-chip secure processor using physical random functions
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
|