메뉴 건너뛰기




Volumn 6, Issue 3 PART 2, 2011, Pages 1136-1145

Malicious circuitry detection using thermal conditioning

Author keywords

Gate level characterization (GLC); hardware Trojans; process variation

Indexed keywords

DIGITAL RIGHTS MANAGEMENT; GATE-LEVEL CHARACTERIZATION (GLC); LINEAR COEFFICIENTS; LOW POWER; LP FORMULATIONS; NON DESTRUCTIVE; POST PROCESSING; PROCESS VARIATION; SCALING FACTORS; SYSTEM OF LINEAR EQUATIONS; THERMAL CONDITIONING; TROJAN HORSE; YIELD OPTIMIZATION;

EID: 80051746290     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2157341     Document Type: Article
Times cited : (35)

References (28)
  • 1
    • 77956221000 scopus 로고    scopus 로고
    • Gate-level characterization: Foundations and hardware security applications
    • S. Wei, S. Meguerdichian, and M. Potkonjak, "Gate-level characterization: Foundations and hardware security applications", in Proc. DAC, 2010, pp. 222-227.
    • (2010) Proc. DAC , pp. 222-227
    • Wei, S.1    Meguerdichian, S.2    Potkonjak, M.3
  • 3
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware Trojan taxonomy and detection
    • Jan.-Feb
    • M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection", IEEE Design Test Comput., vol. 27, no. 1, pp. 10-25, Jan.-Feb. 2010.
    • (2010) IEEE Design Test Comput. , vol.27 , Issue.1 , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 4
    • 57849113504 scopus 로고    scopus 로고
    • Post-silicon timing characterization by compressed sensing
    • F. Koushanfar, P. Boufounos, and D. Shamsi, "Post-silicon timing characterization by compressed sensing", in Proc. ICCAD, 2008, pp. 185-189.
    • (2008) Proc. ICCAD , pp. 185-189
    • Koushanfar, F.1    Boufounos, P.2    Shamsi, D.3
  • 5
    • 51549088218 scopus 로고    scopus 로고
    • Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability
    • Y. Alkabani, T. Massey, F. Koushanfar, and M. Potkonjak, "Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability", in Proc. DAC, 2008, pp. 606-609.
    • (2008) Proc. DAC , pp. 606-609
    • Alkabani, Y.1    Massey, T.2    Koushanfar, F.3    Potkonjak, M.4
  • 6
    • 70350733802 scopus 로고    scopus 로고
    • Hardware Trojan horse detection using gate-level characterization
    • M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, "Hardware Trojan horse detection using gate-level characterization", in Proc. DAC, 2009, pp. 688-693.
    • (2009) Proc. DAC , pp. 688-693
    • Potkonjak, M.1    Nahapetian, A.2    Nelson, M.3    Massey, T.4
  • 7
    • 84886673851 scopus 로고    scopus 로고
    • Modeling within-die spatial correlation effects for process-design co-optimization
    • P. Friedberg, Y. Cao, J. Cain, R. Wang, J. Rabaey, and C. Spanos, "Modeling within-die spatial correlation effects for process-design co-optimization", in Proc. ISQED, 2005, pp. 516-521.
    • (2005) Proc. ISQED , pp. 516-521
    • Friedberg, P.1    Cao, Y.2    Cain, J.3    Wang, R.4    Rabaey, J.5    Spanos, C.6
  • 8
    • 79951644815 scopus 로고    scopus 로고
    • Measuring and modeling variability using low-cost FPGAs
    • M. Brown, C. Bazeghi, M. Guthaus, and J. Renau, "Measuring and modeling variability using low-cost FPGAs", in Proc. FPGA, 2009, pp. 286-286.
    • (2009) Proc. FPGA , pp. 286-286
    • Brown, M.1    Bazeghi, C.2    Guthaus, M.3    Renau, J.4
  • 10
    • 77956213273 scopus 로고    scopus 로고
    • Bayesian virtual probe: Minimizing variation characterization cost for nanoscale IC technologies via Bayesian inference
    • W. Zhang, X. Li, and R. Rutenbar, "Bayesian virtual probe: Minimizing variation characterization cost for nanoscale IC technologies via Bayesian inference", in Proc. DAC, 2010, pp. 262-267.
    • (2010) Proc. DAC , pp. 262-267
    • Zhang, W.1    Li, X.2    Rutenbar, R.3
  • 11
    • 78650884368 scopus 로고    scopus 로고
    • Scalable segmentation-based malicious circuitry detection and diagnosis
    • S. Wei and M. Potkonjak, "Scalable segmentation-based malicious circuitry detection and diagnosis", in Proc. ICCAD, 2010, pp. 483-486.
    • (2010) Proc. ICCAD , pp. 483-486
    • Wei, S.1    Potkonjak, M.2
  • 13
    • 49749105556 scopus 로고    scopus 로고
    • Towards Trojan-free trusted ICs: Problem analysis and detection scheme
    • F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty, "Towards Trojan-free trusted ICs: Problem analysis and detection scheme", in Proc. DATE, 2008, pp. 1362-1365.
    • (2008) Proc. DATE , pp. 1362-1365
    • Wolff, F.1    Papachristou, C.2    Bhunia, S.3    Chakraborty, R.4
  • 14
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware of Trojans
    • M. Banga and M. Hsiao, "A region based approach for the identification of hardware of Trojans", in Proc. HOST, 2008, pp. 40-47.
    • (2008) Proc. HOST , pp. 40-47
    • Banga, M.1    Hsiao, M.2
  • 15
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for IC authentication and Trojan horse detection
    • J. Li and J. Lach, "At-speed delay characterization for IC authentication and Trojan horse detection", in Proc. HOST, 2008, pp. 8-14.
    • (2008) Proc. HOST , pp. 8-14
    • Li, J.1    Lach, J.2
  • 16
    • 51849095999 scopus 로고    scopus 로고
    • Hardware Trojan detection using path delay fingerprint
    • Y. Jin and Y. Makris, "Hardware Trojan detection using path delay fingerprint", in Proc. HOST, 2008, pp. 51-57.
    • (2008) Proc. HOST , pp. 51-57
    • Jin, Y.1    Makris, Y.2
  • 17
    • 67649998710 scopus 로고    scopus 로고
    • Hardware Trojan detection and isolation using current integration and localized current analysis
    • X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, "Hardware Trojan detection and isolation using current integration and localized current analysis", in Proc. DFT, 2008, pp. 87-95.
    • (2008) Proc. DFT , pp. 87-95
    • Wang, X.1    Salmani, H.2    Tehranipoor, M.3    Plusquellic, J.4
  • 18
    • 78649399066 scopus 로고    scopus 로고
    • Detecting Trojans through leakage current analysis using multiple supply pad IDDQS
    • Dec.
    • J. Aarestad, D. Acharyya, R. Rad, and J. Plusquellic, "Detecting Trojans through leakage current analysis using multiple supply pad IDDQS", IEEE Tran. Inf. Forensics Security, vol. 5, no. 4, pp. 893-904, Dec. 2010.
    • (2010) IEEE Tran. Inf. Forensics Security , vol.5 , Issue.4 , pp. 893-904
    • Aarestad, J.1    Acharyya, D.2    Rad, R.3    Plusquellic, J.4
  • 19
    • 75649141765 scopus 로고    scopus 로고
    • Ultralowpower design in near-threshold region
    • Feb.
    • D. Markovic, C. Wang, L. Alarcon, T. Liu, and J. Rabaey, "Ultralowpower design in near-threshold region", Proc. IEEE, vol. 98, no. 2, pp. 237-252, Feb. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.2 , pp. 237-252
    • Markovic, D.1    Wang, C.2    Alarcon, L.3    Liu, T.4    Rabaey, J.5
  • 20
    • 0032320827 scopus 로고    scopus 로고
    • Random dopant induced threshold voltage lowering and fluctuations in sub-0.1 fjim MOSFET's: A 3-D "atomistic" simulation study
    • PII S001893839809025X
    • A. Asenov, "Random dopant induced threshold voltage lowering and fluctuations in sub-0.1 MOSFETs: A 3-D atomistic simulation study", IEEE Trans. Electron Devices, vol. 45, no. 12, pp. 2505-2513, 1998. (Pubitemid 128736693)
    • (1998) IEEE Transactions on Electron Devices , vol.45 , Issue.12 , pp. 2505-2513
    • Asenov, A.1
  • 21
    • 41549090501 scopus 로고    scopus 로고
    • Analysis and modeling of CD variation for statistical static timing
    • B. Cline, K. Chopra, D. Blaauw, and Y. Cao, "Analysis and modeling of CD variation for statistical static timing", in Proc. ICCAD, 2006, pp. 60-66.
    • (2006) Proc. ICCAD , pp. 60-66
    • Cline, B.1    Chopra, K.2    Blaauw, D.3    Cao, Y.4
  • 22
    • 0034171710 scopus 로고    scopus 로고
    • Iddq testing for CMOS VLSI
    • Apr.
    • R. Rajsuman, "Iddq testing for CMOS VLSI", Proc. IEEE, vol. 88, no. 4, pp. 544-566, Apr. 2000.
    • (2000) Proc. IEEE , vol.88 , Issue.4 , pp. 544-566
    • Rajsuman, R.1
  • 23
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis", in Proc. CRYPTO, 1999, pp. 388-397.
    • (1999) Proc. CRYPTO , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 24
    • 80051716534 scopus 로고    scopus 로고
    • Online. Available
    • [Online]. Available: http://sine.ni.com/nips/cds/view/p/lang/en/nid/ 204239
  • 25
    • 77954945729 scopus 로고    scopus 로고
    • ATMI: Analytical model of temperature in microprocessors
    • P. Michaud and Y. Sazeides, "ATMI: Analytical model of temperature in microprocessors", in Proc. MoBS, 2007, pp. 1-10.
    • (2007) Proc. MoBS , pp. 1-10
    • Michaud, P.1    Sazeides, Y.2
  • 26
    • 84945709924 scopus 로고
    • On the approximation of curves by line segments using dynamic programming
    • R. Bellman, "On the approximation of curves by line segments using dynamic programming", Commun. ACM, vol. 4, no. 6, pp. 284-284, 1961.
    • (1961) Commun. ACM , vol.4 , Issue.6 , pp. 284-284
    • Bellman, R.1
  • 27
    • 0346778724 scopus 로고    scopus 로고
    • A heuristic to determine low leakage sleep state vectors for CMOS combinational circuits
    • R. Rao, F. Liu, J. Burns, and R. Brown, "A heuristic to determine low leakage sleep state vectors for CMOS combinational circuits", in Proc. ICCAD, 2003, pp. 689-692.
    • (2003) Proc. ICCAD , pp. 689-692
    • Rao, R.1    Liu, F.2    Burns, J.3    Brown, R.4
  • 28
    • 33645009272 scopus 로고    scopus 로고
    • A combined gate replacement and input vector control approach for leakage current reduction
    • Feb.
    • L. Yuan and G. Qu, "A combined gate replacement and input vector control approach for leakage current reduction", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 14, no. 2, pp. 173-182, Feb. 2006.
    • (2006) IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol.14 , Issue.2 , pp. 173-182
    • Yuan, L.1    Qu, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.