-
1
-
-
77956200240
-
Synthesis oftrustable ICs using untrusted CAD tools
-
M. Potkonjak, "Synthesis oftrustable ICs using untrusted CAD tools," in Proc. Design Automation Conference (DAC), 2010, pp. 633-634.
-
Proc. Design Automation Conference (DAC)
, vol.2010
, pp. 633-634
-
-
Potkonjak, M.1
-
2
-
-
76949093207
-
A survey of hardware Trojan taxonomy and detection
-
DOI: 10.1109/MDT.2009.159
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEEDes. Test Comput., 2010, DOI: 10.1109/MDT.2009.159.
-
(2010)
IEEEDes. Test Comput.
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
3
-
-
77958115258
-
Trustworthy hardware: Identifying and classifying hardware Trojans
-
Oct.
-
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy hardware: Identifying and classifying hardware Trojans," IEEE Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010.
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 39-46
-
-
Karri, R.1
Rajendran, J.2
Rosenfeld, K.3
Tehranipoor, M.4
-
4
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
DOI 10.1109/SP.2007.36, 4223234, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in IEEE Symp. Security and Privacy (S&P), 2007, pp. 296-310. (Pubitemid 47432536)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
5
-
-
51849084404
-
Sensitivity analysis to hardware Trojans using power supply transient signals
-
R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity analysis to hardware Trojans using power supply transient signals," in Proc. Int. Symp. Hardware Oriented Security and Trust (HOST), 2008, pp. 3-7.
-
(2008)
Proc. Int. Symp. Hardware Oriented Security and Trust (HOST)
, pp. 3-7
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
6
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
-
R. Rad, X. Wang, J. Plusquellic, and M. Tehranipoor, "Power supply signal calibration techniques for improving detection resolution to hardware Trojans," in Proc. Int. Conf. Computer-Aided Design (ICCAD), 2008, pp. 632-639.
-
(2008)
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, pp. 632-639
-
-
Rad, R.1
Wang, X.2
Plusquellic, J.3
Tehranipoor, M.4
-
7
-
-
56749145922
-
Guided test generation for isolation and detection of embedded Trojans in ICs
-
M. Banga, M. Chandrasekar, L. Fang, and M. Hsiao, "Guided test generation for isolation and detection of embedded Trojans in ICs," in Great Lakes Symp. VLSI (GLS-VLSI), 2008, pp. 363-366.
-
(2008)
Great Lakes Symp. VLSI (GLS-VLSI)
, pp. 363-366
-
-
Banga, M.1
Chandrasekar, M.2
Fang, L.3
Hsiao, M.4
-
9
-
-
70350733802
-
Hardware Trojan horse detection using gate-level characterization
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, "Hardware Trojan horse detection using gate-level characterization," in Proc. Design Automation Conf. (DAC), 2009, pp. 688-693.
-
(2009)
Proc. Design Automation Conf. (DAC)
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
11
-
-
77956221000
-
Gate-level characterization: Foundations and hardware security applications
-
S. Wei, S. Meguerdichian, and M. Potkonjak, "Gate-level characterization: Foundations and hardware security applications," in Proc. Design Automation Conf. (DAC), 2010, pp. 222-227.
-
(2010)
Proc. Design Automation Conf. (DAC)
, pp. 222-227
-
-
Wei, S.1
Meguerdichian, S.2
Potkonjak, M.3
-
12
-
-
70350465114
-
SVD-based ghost circuitry detection
-
M. Nelson, A. Nahapetian, F. Koushanfar, and M. Potkonjak, "SVD-based ghost circuitry detection," in Proc. Information Hiding (IH) Conf., 2009, pp. 221-234.
-
(2009)
Proc. Information Hiding (IH) Conf.
, pp. 221-234
-
-
Nelson, M.1
Nahapetian, A.2
Koushanfar, F.3
Potkonjak, M.4
-
13
-
-
78650884368
-
Scalable segmentation-based malicious circuitrydetectionanddiagnosis
-
S. Wei and M. Potkonjak, "Scalable segmentation-based malicious circuitrydetectionanddiagnosis,"inProc. Int. Conf. Computer-Aided Design (ICCAD), 2010, pp. 483-486.
-
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, vol.2010
, pp. 483-486
-
-
Wei, S.1
Potkonjak, M.2
-
14
-
-
34547268011
-
A general framework for spatial correlation modeling in VLSI design
-
DOI 10.1109/DAC.2007.375277, 4261296, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
F. Liu, "A general framework for spatial correlation modeling in VLSI design,"inProc. Design Automation Conf. (DAC), 2007,pp. 817-822. (Pubitemid 47130078)
-
(2007)
Proceedings - Design Automation Conference
, pp. 817-822
-
-
Liu, F.1
-
15
-
-
0033750077
-
Bounding circuit delay by testing a very small subset of paths
-
M. Sharma and J. Patel, "Bounding circuit delay by testing a very small subset of paths,"in VLSI Test Symp. (VTS), 2000, pp. 333-341.
-
(2000)
VLSI Test Symp. (VTS)
, pp. 333-341
-
-
Sharma, M.1
Patel, J.2
-
17
-
-
0034479555
-
Selection of potentially testable path delay faults for test generation
-
A. Murakami, S. Kajihara, T. Sasao, I. Pomeranz, and S. M. Reddy, "Selection of potentially testable path delay faults for test generation," in Proc. Int. Test Conf. (ITC), 2000, pp. 376-384. (Pubitemid 32134685)
-
(2000)
IEEE International Test Conference (TC)
, pp. 376-384
-
-
Murakami Atsushi1
Kajihara Seiji2
Sasao Tsutomu3
Pomeranz Irith4
Reddy Sudhakar, M.5
-
18
-
-
2942566264
-
IDDX-basedtestmethods: A survey
-
S. Sabadeand D. Walker, "IDDX-basedtestmethods: A survey,"ACM Trans. Design Automation Electron. Syst., vol. 9, no. 2, pp. 159-198, 2004.
-
(2004)
ACM Trans. Design Automation Electron. Syst.
, vol.9
, Issue.2
, pp. 159-198
-
-
Sabadeand, S.1
Walker, D.2
-
19
-
-
0030260163
-
Simulation and generation of IDDQ tests for bridging faults in combinational circuits
-
S. Chakravarty and P. Thadikaran, "Simulation and generation of IDDQ tests for bridging faults in combinational circuits," IEEE Trans. Comput., vol. 45, no. 10, pp. 1131-1140, Oct. 1996. (Pubitemid 126768541)
-
(1996)
IEEE Transactions on Computers
, vol.45
, Issue.10
, pp. 1131-1140
-
-
Chakravarty, S.1
Thadikaran, P.J.2
-
21
-
-
0036647203
-
Optimization with few violated constraints for linear bounded error parameter estimation
-
DOI 10.1109/TAC.2002.800644, PII 1011092002800644
-
E. Bai, H. Cho, R. Tempo, and Y. Ye, "Optimization with few violated constraints for linear bounded error parameter estimation," IEEE Trans. Autom. Control, vol. 47, no. 7, pp. 1067-1077, Jul. 2002. (Pubitemid 34835330)
-
(2002)
IEEE Transactions on Automatic Control
, vol.47
, Issue.7
, pp. 1067-1077
-
-
Bai, E.-W.1
Cho, H.2
Tempo, R.3
Ye, Y.4
-
23
-
-
0000095809
-
An analysis of the approximations for maximizing submodular set functions
-
G. Nemhauser, L. Wolsey, and M. Fisher, "An analysis of the approximations for maximizing submodular set functions," Math. Programming, vol. 14, pp. 265-294, 1978.
-
(1978)
Math. Programming
, vol.14
, pp. 265-294
-
-
Nemhauser, G.1
Wolsey, L.2
Fisher, M.3
-
24
-
-
0032108328
-
A Threshold of ln n for Approximating Set Cover
-
U. Feige, "A threshold of ln n for approximating set cover," J. ACM, vol. 45, no. 4, pp. 634-652, 1998. (Pubitemid 128488790)
-
(1998)
Journal of the ACM
, vol.45
, Issue.4
, pp. 634-652
-
-
Feige, U.1
-
25
-
-
27944460031
-
Mapping statistical process variations toward circuit performance variability: An analytical modeling approach
-
40.2, Proceedings 2005, 42nd Design Automation Conference, DAC 2005
-
Y. Cao and L. T. Clark, "Mapping statistical process variations toward circuit performance variability: An analytical modeling approach," in Proc. Design Automation Conf. (DAC), 2005, pp. 658-663. (Pubitemid 41675519)
-
(2005)
Proceedings - Design Automation Conference
, pp. 658-663
-
-
Cao, Y.1
Clark, L.T.2
-
28
-
-
57549113706
-
Noninvasive leakage power tomography of integrated circuits by compressive sensing
-
D. Shamsi, P. Boufounos, and F. Koushanfar, "Noninvasive leakage power tomography of integrated circuits by compressive sensing," in Proc. Int. Symp. Low Power Electronics and Designs (ISLPED), 2008, pp. 341-346.
-
(2008)
Proc. Int. Symp. Low Power Electronics and Designs (ISLPED)
, pp. 341-346
-
-
Shamsi, D.1
Boufounos, P.2
Koushanfar, F.3
-
29
-
-
57849113504
-
Post-silicon timing characterization by compressed sensing
-
F. Koushanfar, P. Boufounos, and D. Shamsi, "Post-silicon timing characterization by compressed sensing," in Proc. Int. Conf. Computer-Aided Design (ICCAD), 2008, pp. 185-189.
-
(2008)
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, pp. 185-189
-
-
Koushanfar, F.1
Boufounos, P.2
Shamsi, D.3
-
30
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Trusted integrated circuits: A nondestructive hidden characteristics extraction approach,"inProc. Information Hiding (IH) Conf., 2008, pp. 102-117.
-
(2008)
Proc. Information Hiding (IH) Conf.
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
31
-
-
34547252533
-
CAD-based security, cryptography, and digital rights management
-
DOI 10.1109/DAC.2007.375167, 4261186, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
F. Koushanfar and M. Potkonjak, "CAD-based security, cryptography, and digital rights management," in Proc. Design Automation Conf. (DAC), 2007, pp. 268-269. (Pubitemid 47129968)
-
(2007)
Proceedings - Design Automation Conference
, pp. 268-269
-
-
Koushanfar, F.1
Potkonjak, M.2
-
32
-
-
79951829227
-
A gate level sensor network for integrated circuits temperature monitoring
-
be published
-
A. Vahdatpour, M. Potkonjak, and S. Meguerdichian, "A gate level sensor network for integrated circuits temperature monitoring," IEEE Sensors, to be published.
-
IEEE Sensors
-
-
Vahdatpour, A.1
Potkonjak, M.2
Meguerdichian, S.3
-
34
-
-
77955753636
-
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
-
S. Narasimhan, D. Dongdong, R. Chakraborty, S. S. Paul, F. Wolff, C. Papachristou, K. Roy, and S. Bhunia, "Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach," in Proc. Int. Symp. Hardware Oriented Security and Trust (HOST), 2010, pp. 13-18.
-
(2010)
Proc. Int. Symp. Hardware Oriented Security and Trust (HOST)
, pp. 13-18
-
-
Narasimhan, S.1
Dongdong, D.2
Chakraborty, R.3
Paul, S.S.4
Wolff, F.5
Papachristou, C.6
Roy, K.7
Bhunia, S.8
-
35
-
-
36349024290
-
Near-optimal observation selection using submodular functions
-
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
-
A. Krause and C. Guestrin, "Near-optimal observation selection using submodular functions," in Proc. Nat. Conf. Artificial Intelligence (AAAI), 2007, vol. 2, pp. 1650-1654. (Pubitemid 350149805)
-
(2007)
Proceedings of the National Conference on Artificial Intelligence
, vol.2
, pp. 1650-1654
-
-
Krause, A.1
Guestrin, C.2
-
36
-
-
36849083014
-
Cost-effective outbreak detection in networks
-
DOI 10.1145/1281192.1281239, KDD-2007: Proceedings of the Thirteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. Van Briesen, and N. Glance, "Cost-effective outbreak detection in networks," in Proc. Conf. Knowledge Discovery and Data Mining (KDD), 2007, pp. 420-429. (Pubitemid 350229228)
-
(2007)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 420-429
-
-
Leskovec, J.1
Krause, A.2
Guestrin, C.3
Faloutsos, C.4
Vanbriesen, J.5
Glance, N.6
-
37
-
-
33748079840
-
A recursive greedy algorithm for walks in directed graphs
-
DOI 10.1109/SFCS.2005.9, 1530718, Proceedings - 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005
-
C. Chekuri and M. Pal, "A recursive greedy algorithm for walks in directed graphs," in Annu. Symp. Foundations of Computer Science (FOCS), 2005, pp. 245-253. (Pubitemid 44375736)
-
(2005)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, vol.2005
, pp. 245-253
-
-
Chekuri, C.1
Pal, M.2
|