-
1
-
-
85084095841
-
Designing and implementing malicious hardware
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou, "Designing and implementing malicious hardware," in Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008, pp. 1-8.
-
(2008)
Proceedings of the First USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET)
, pp. 1-8
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
2
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith, "Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically," in Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010, pp. 159-172.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 159-172
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.K.4
Smith, J.M.5
-
3
-
-
77958001987
-
Old trick threatens the newest weapons
-
October 27
-
J. Markoff, "Old trick threatens the newest weapons," The New York Times, p. D1, October 27 2009.
-
(2009)
The New York Times
-
-
Markoff, J.1
-
4
-
-
44449083733
-
The hunt for the kill switch
-
S. Adee, "The hunt for the kill switch," IEEE Spectrum, vol. 45, no. 5, pp. 34-39, 2008.
-
(2008)
IEEE Spectrum
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
5
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 148-160.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
6
-
-
85177690963
-
A PUF piece: Revealing secrets buried deep within your silicon
-
January 24
-
B. Moyer, "A PUF piece: Revealing secrets buried deep within your silicon," EE Journal, January 24 2011, http://www.techfocusmedia.net/ archives/articles/20110124-puf/.
-
(2011)
EE Journal
-
-
Moyer, B.1
-
7
-
-
78049331855
-
Self-referencing: A scalable side-channel approach for hardware trojan detection
-
Springer-Verlag
-
D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, "Self-referencing: a scalable side-channel approach for hardware trojan detection," in 12th International Conference on Cryptographic Hardware and Embedded Systems (CHES). Springer-Verlag, 2010.
-
(2010)
12th International Conference on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Du, D.1
Narasimhan, S.2
Chakraborty, R.S.3
Bhunia, S.4
-
11
-
-
77953115730
-
Detecting/preventing information leakage on the memory bus due to malicious hardware
-
A. Das, G. Memik, J. Zambreno, and A. Choudhary, "Detecting/ preventing information leakage on the memory bus due to malicious hardware," in Design, Automation & Test in Europe, 2010.
-
(2010)
Design, Automation & Test in Europe
-
-
Das, A.1
Memik, G.2
Zambreno, J.3
Choudhary, A.4
-
12
-
-
77956200240
-
Synthesis of trustable ICs using untrusted CAD tools
-
ACM/IEEE
-
M. Potkonjak, "Synthesis of trustable ICs using untrusted CAD tools," in Design Automation Conference (DAC). ACM/IEEE, 2010.
-
(2010)
Design Automation Conference (DAC)
-
-
Potkonjak, M.1
-
13
-
-
78649989155
-
Modeling attacks on physical unclonable functions
-
U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," in Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
-
-
Rührmair, U.1
Sehnke, F.2
Sölter, J.3
Dror, G.4
Devadas, S.5
Schmidhuber, J.6
-
15
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
DOI 10.1109/SP.2007.36, 4223234, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007, pp. 296-310. (Pubitemid 47432536)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
17
-
-
34547340370
-
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
-
T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, T. Levin, T. Nguyen, and C. Irvine, "Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
-
-
Huffmire, T.1
Brotherton, B.2
Wang, G.3
Sherwood, T.4
Kastner, R.5
Levin, T.6
Nguyen, T.7
Irvine, C.8
-
19
-
-
24544442959
-
-
University of British Columbia, Vancouver, BC, Canada, Canada, Tech. Rep.
-
C. Seger, "An introduction to formal hardware verification," University of British Columbia, Vancouver, BC, Canada, Canada, Tech. Rep., 1992.
-
(1992)
An Introduction to Formal Hardware Verification
-
-
Seger, C.1
-
20
-
-
0005440654
-
Formal verification in hardware design: A survey
-
C. Kern and M. R. Greenstreet, "Formal verification in hardware design: a survey," ACM Trans. Des. Autom. Electron. Syst., vol. 4, no. 2, pp. 123-193, 1999.
-
(1999)
ACM Trans. Des. Autom. Electron. Syst.
, vol.4
, Issue.2
, pp. 123-193
-
-
Kern, C.1
Greenstreet, M.R.2
-
21
-
-
70349124652
-
Fighting state space explosion: Review and evaluation
-
R. Pelanek, "Fighting state space explosion: Review and evaluation," Formal Methods for Industrial Critical Systems, vol. 5596, pp. 37-52, 2009.
-
(2009)
Formal Methods for Industrial Critical Systems
, vol.5596
, pp. 37-52
-
-
Pelanek, R.1
-
23
-
-
0025493701
-
Formal verification of a pipelined microprocessor
-
M. Srivas and M. Bickford, "Formal verification of a pipelined microprocessor," Software, IEEE, vol. 7, no. 5, pp. 52-64, 1990.
-
(1990)
Software, IEEE
, vol.7
, Issue.5
, pp. 52-64
-
-
Srivas, M.1
Bickford, M.2
-
25
-
-
84863960247
-
Formal verification of out-of-order execution using incremental flushing
-
Computer Aided Verification
-
J. U. Skakkebaek, R. B. Jones, and D. L. Dill, "Formal verification of out-of-order execution using incremental flushing," in CAV '98: Proceedings of the 10th International Conference on Computer Aided Verification. London, UK: SpringerVerlag, 1998, pp. 98-109. (Pubitemid 128092331)
-
(1998)
Lecture Notes in Computer Science
, Issue.1427
, pp. 98-109
-
-
Skakkebaek, J.U.1
Jones, R.B.2
Dill, D.L.3
-
26
-
-
0033684177
-
Formal verification of superscale microprocessors with multicycle functional units, exception, and branch prediction
-
ACM
-
M. N. Velev and R. E. Bryant, "Formal verification of superscale microprocessors with multicycle functional units, exception, and branch prediction," in DAC '00: Proceedings of the 37th Annual Design Automation Conference. ACM, 2000, pp. 112-117.
-
(2000)
DAC '00: Proceedings of the 37th Annual Design Automation Conference
, pp. 112-117
-
-
Velev, M.N.1
Bryant, R.E.2
-
27
-
-
0041822118
-
Formal verification of a complex pipelined processor
-
R. Hosabettu, G. Gopalakrishnan, and M. Srivas, "Formal verification of a complex pipelined processor," Formal Methods System Design, vol. 23, no. 2, pp. 171-213, 2003.
-
(2003)
Formal Methods System Design
, vol.23
, Issue.2
, pp. 171-213
-
-
Hosabettu, R.1
Gopalakrishnan, G.2
Srivas, M.3
-
28
-
-
70350054739
-
Complete formal verification of TriCore2 and other processors
-
February
-
J. Bormann, S. Beyer, A. Maggiore, M. Siegel, S. Skalberg, T. Blackmore, and F. Bruno, "Complete formal verification of TriCore2 and other processors," in DVCon, February 2007.
-
(2007)
DVCon
-
-
Bormann, J.1
Beyer, S.2
Maggiore, A.3
Siegel, M.4
Skalberg, S.5
Blackmore, T.6
Bruno, F.7
|