메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 162-174

A unified framework for multimodal submodular integrated circuits trojan detection

Author keywords

Change detection algorithms; circuit Trojan detection; gate level characterization; hardware malware detection; hardware security and trust; submodular functions; timing power tests

Indexed keywords

CHANGE DETECTION ALGORITHMS; GATE-LEVEL CHARACTERIZATION; HARDWARE SECURITY AND TRUST; SUBMODULAR FUNCTIONS; TIMING/POWER TESTS; TROJANS;

EID: 79951821310     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2096811     Document Type: Article
Times cited : (106)

References (37)
  • 1
    • 77956200240 scopus 로고    scopus 로고
    • Synthesis oftrustable ICs using untrusted CAD tools
    • M. Potkonjak, "Synthesis oftrustable ICs using untrusted CAD tools," in Proc. Design Automation Conference (DAC), 2010, pp. 633-634.
    • Proc. Design Automation Conference (DAC) , vol.2010 , pp. 633-634
    • Potkonjak, M.1
  • 2
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware Trojan taxonomy and detection
    • DOI: 10.1109/MDT.2009.159
    • M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEEDes. Test Comput., 2010, DOI: 10.1109/MDT.2009.159.
    • (2010) IEEEDes. Test Comput.
    • Tehranipoor, M.1    Koushanfar, F.2
  • 3
    • 77958115258 scopus 로고    scopus 로고
    • Trustworthy hardware: Identifying and classifying hardware Trojans
    • Oct.
    • R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy hardware: Identifying and classifying hardware Trojans," IEEE Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010.
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 39-46
    • Karri, R.1    Rajendran, J.2    Rosenfeld, K.3    Tehranipoor, M.4
  • 7
    • 56749145922 scopus 로고    scopus 로고
    • Guided test generation for isolation and detection of embedded Trojans in ICs
    • M. Banga, M. Chandrasekar, L. Fang, and M. Hsiao, "Guided test generation for isolation and detection of embedded Trojans in ICs," in Great Lakes Symp. VLSI (GLS-VLSI), 2008, pp. 363-366.
    • (2008) Great Lakes Symp. VLSI (GLS-VLSI) , pp. 363-366
    • Banga, M.1    Chandrasekar, M.2    Fang, L.3    Hsiao, M.4
  • 11
    • 77956221000 scopus 로고    scopus 로고
    • Gate-level characterization: Foundations and hardware security applications
    • S. Wei, S. Meguerdichian, and M. Potkonjak, "Gate-level characterization: Foundations and hardware security applications," in Proc. Design Automation Conf. (DAC), 2010, pp. 222-227.
    • (2010) Proc. Design Automation Conf. (DAC) , pp. 222-227
    • Wei, S.1    Meguerdichian, S.2    Potkonjak, M.3
  • 13
    • 78650884368 scopus 로고    scopus 로고
    • Scalable segmentation-based malicious circuitrydetectionanddiagnosis
    • S. Wei and M. Potkonjak, "Scalable segmentation-based malicious circuitrydetectionanddiagnosis,"inProc. Int. Conf. Computer-Aided Design (ICCAD), 2010, pp. 483-486.
    • Proc. Int. Conf. Computer-Aided Design (ICCAD) , vol.2010 , pp. 483-486
    • Wei, S.1    Potkonjak, M.2
  • 14
    • 34547268011 scopus 로고    scopus 로고
    • A general framework for spatial correlation modeling in VLSI design
    • DOI 10.1109/DAC.2007.375277, 4261296, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • F. Liu, "A general framework for spatial correlation modeling in VLSI design,"inProc. Design Automation Conf. (DAC), 2007,pp. 817-822. (Pubitemid 47130078)
    • (2007) Proceedings - Design Automation Conference , pp. 817-822
    • Liu, F.1
  • 15
    • 0033750077 scopus 로고    scopus 로고
    • Bounding circuit delay by testing a very small subset of paths
    • M. Sharma and J. Patel, "Bounding circuit delay by testing a very small subset of paths,"in VLSI Test Symp. (VTS), 2000, pp. 333-341.
    • (2000) VLSI Test Symp. (VTS) , pp. 333-341
    • Sharma, M.1    Patel, J.2
  • 19
    • 0030260163 scopus 로고    scopus 로고
    • Simulation and generation of IDDQ tests for bridging faults in combinational circuits
    • S. Chakravarty and P. Thadikaran, "Simulation and generation of IDDQ tests for bridging faults in combinational circuits," IEEE Trans. Comput., vol. 45, no. 10, pp. 1131-1140, Oct. 1996. (Pubitemid 126768541)
    • (1996) IEEE Transactions on Computers , vol.45 , Issue.10 , pp. 1131-1140
    • Chakravarty, S.1    Thadikaran, P.J.2
  • 21
    • 0036647203 scopus 로고    scopus 로고
    • Optimization with few violated constraints for linear bounded error parameter estimation
    • DOI 10.1109/TAC.2002.800644, PII 1011092002800644
    • E. Bai, H. Cho, R. Tempo, and Y. Ye, "Optimization with few violated constraints for linear bounded error parameter estimation," IEEE Trans. Autom. Control, vol. 47, no. 7, pp. 1067-1077, Jul. 2002. (Pubitemid 34835330)
    • (2002) IEEE Transactions on Automatic Control , vol.47 , Issue.7 , pp. 1067-1077
    • Bai, E.-W.1    Cho, H.2    Tempo, R.3    Ye, Y.4
  • 23
    • 0000095809 scopus 로고
    • An analysis of the approximations for maximizing submodular set functions
    • G. Nemhauser, L. Wolsey, and M. Fisher, "An analysis of the approximations for maximizing submodular set functions," Math. Programming, vol. 14, pp. 265-294, 1978.
    • (1978) Math. Programming , vol.14 , pp. 265-294
    • Nemhauser, G.1    Wolsey, L.2    Fisher, M.3
  • 24
    • 0032108328 scopus 로고    scopus 로고
    • A Threshold of ln n for Approximating Set Cover
    • U. Feige, "A threshold of ln n for approximating set cover," J. ACM, vol. 45, no. 4, pp. 634-652, 1998. (Pubitemid 128488790)
    • (1998) Journal of the ACM , vol.45 , Issue.4 , pp. 634-652
    • Feige, U.1
  • 25
    • 27944460031 scopus 로고    scopus 로고
    • Mapping statistical process variations toward circuit performance variability: An analytical modeling approach
    • 40.2, Proceedings 2005, 42nd Design Automation Conference, DAC 2005
    • Y. Cao and L. T. Clark, "Mapping statistical process variations toward circuit performance variability: An analytical modeling approach," in Proc. Design Automation Conf. (DAC), 2005, pp. 658-663. (Pubitemid 41675519)
    • (2005) Proceedings - Design Automation Conference , pp. 658-663
    • Cao, Y.1    Clark, L.T.2
  • 31
    • 34547252533 scopus 로고    scopus 로고
    • CAD-based security, cryptography, and digital rights management
    • DOI 10.1109/DAC.2007.375167, 4261186, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • F. Koushanfar and M. Potkonjak, "CAD-based security, cryptography, and digital rights management," in Proc. Design Automation Conf. (DAC), 2007, pp. 268-269. (Pubitemid 47129968)
    • (2007) Proceedings - Design Automation Conference , pp. 268-269
    • Koushanfar, F.1    Potkonjak, M.2
  • 32
    • 79951829227 scopus 로고    scopus 로고
    • A gate level sensor network for integrated circuits temperature monitoring
    • be published
    • A. Vahdatpour, M. Potkonjak, and S. Meguerdichian, "A gate level sensor network for integrated circuits temperature monitoring," IEEE Sensors, to be published.
    • IEEE Sensors
    • Vahdatpour, A.1    Potkonjak, M.2    Meguerdichian, S.3
  • 35
    • 36349024290 scopus 로고    scopus 로고
    • Near-optimal observation selection using submodular functions
    • AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
    • A. Krause and C. Guestrin, "Near-optimal observation selection using submodular functions," in Proc. Nat. Conf. Artificial Intelligence (AAAI), 2007, vol. 2, pp. 1650-1654. (Pubitemid 350149805)
    • (2007) Proceedings of the National Conference on Artificial Intelligence , vol.2 , pp. 1650-1654
    • Krause, A.1    Guestrin, C.2
  • 37
    • 33748079840 scopus 로고    scopus 로고
    • A recursive greedy algorithm for walks in directed graphs
    • DOI 10.1109/SFCS.2005.9, 1530718, Proceedings - 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005
    • C. Chekuri and M. Pal, "A recursive greedy algorithm for walks in directed graphs," in Annu. Symp. Foundations of Computer Science (FOCS), 2005, pp. 245-253. (Pubitemid 44375736)
    • (2005) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS , vol.2005 , pp. 245-253
    • Chekuri, C.1    Pal, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.