-
1
-
-
44449083733
-
The hunt for the kill switch
-
S. Adee. The hunt for the kill switch. IEEE Spectrum Magazine, 45(5):34-39, 2008.
-
(2008)
IEEE Spectrum Magazine
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
2
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
DOI 10.1109/SP.2007.36, 4223234, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. Trojan detection using ic fingerprinting. In Security and Privacy, 2007. SP '07. IEEE Symposium on, pages 296-310, May 2007. (Pubitemid 47432536)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
56749145922
-
Guided test generation for isolation and detection of embedded trojans in ics
-
New York, NY, USA ACM
-
M. Banga, M. Chandrasekar, L. Fang, and M. S. Hsiao. Guided test generation for isolation and detection of embedded trojans in ics. In GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI, pages 363-366, New York, NY, USA, 2008. ACM.
-
(2008)
GLSVLSI '08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI
, pp. 363-366
-
-
Banga, M.1
Chandrasekar, M.2
Fang, L.3
Hsiao, M.S.4
-
4
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
HOST 2008. IEEE International Workshop on June
-
M. Banga and M. Hsiao. A region based approach for the identification of hardware trojans. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 40-47, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
, pp. 40-47
-
-
Banga, M.1
Hsiao, M.2
-
5
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
HOST '08. IEEE International Workshop on, June
-
M. Banga and M. S. Hsiao. A region based approach for the identification of hardware trojans. In Hardware-Oriented Security and Trust, 2008. HOST '08. IEEE International Workshop on, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
-
-
Banga, M.1
Hsiao, M.S.2
-
7
-
-
51849089785
-
On-demand transparency for improving hardware trojan detectability
-
HOST 2008. IEEE International Workshop on June
-
R. Chakraborty, S. Paul, and S. Bhunia. On-demand transparency for improving hardware trojan detectability. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 48-50, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
, pp. 48-50
-
-
Chakraborty, R.1
Paul, S.2
Bhunia, S.3
-
8
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA ACM Press
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In ACM Conference on Computer and Communications Security, pages 148-160, New York, NY, USA, 2002. ACM Press.
-
(2002)
ACM Conference on Computer and Communications Security
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
9
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
12
-
-
51849095999
-
Hardware trojan detection using path delay fingerpring
-
HOST '08. IEEE International Workshop on, June
-
Y. Jin and Y. Makris. Hardware trojan detection using path delay fingerpring. In Hardware-Oriented Security and Trust, 2008. HOST '08. IEEE International Workshop on, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
-
-
Jin, Y.1
Makris, Y.2
-
13
-
-
85084095841
-
Designing and implementing malicious hardware
-
Berkeley, CA, USA USENIX Association
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou. Designing and implementing malicious hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 5:1-5:8, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-scale Exploits and Emergent Threats
, pp. 51-58
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
14
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication application
-
J. W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication application. In Proceedings of the Symposium on VLSI Circuits, pages 176-159, 2004.
-
(2004)
Proceedings of the Symposium on VLSI Circuits
, pp. 176-159
-
-
Lee, J.W.1
Lim, D.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
15
-
-
51849099113
-
At-speed delay characterization for ic authentication and trojan horse detection
-
HOST 2008. IEEE International Workshop on June
-
J. Li and J. Lach. At-speed delay characterization for ic authentication and trojan horse detection. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 8-14, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
, pp. 8-14
-
-
Li, J.1
Lach, J.2
-
18
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
Piscataway, NJ, USA IEEE Press
-
R. M. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic. Power supply signal calibration techniques for improving detection resolution to hardware trojans. In ICCAD '08: Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, pages 632-639, Piscataway, NJ, USA, 2008. IEEE Press.
-
(2008)
ICCAD '08: Proceedings of the 2008 IEEE/ACM International Conference on Computer-aided Design
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
19
-
-
85177636225
-
The alpha platform
-
2nd Embedded Systems Challenge
-
J. Rajendran. The alpha platform. CSAW Conference. 2nd Embedded Systems Challenge., 2008.
-
(2008)
CSAW Conference
-
-
Rajendran, J.1
-
20
-
-
70449123838
-
New design strategy for improving hardware trojan detection and reducing trojan activation time
-
HOST '09. IEEE International Workshop on july
-
H. Salmani, M. Tehranipoor, and J. Plusquellic. New design strategy for improving hardware trojan detection and reducing trojan activation time. In Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on, pages 66-73, july 2009.
-
(2009)
Hardware-oriented Security and Trust, 2009
, pp. 66-73
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
21
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM Press. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
23
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 207-222, New York, NY, USA, 2003. ACM. (Pubitemid 40929698)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
24
-
-
65249109760
-
Nooks: An architecture for reliable device drivers
-
EW 10 New York, NY, USA ACM
-
M. M. Swift, S. Martin, H. M. Levy, and S. J. Eggers. Nooks: an architecture for reliable device drivers. In Proceedings of the 10th workshop on ACM SIGOPS European workshop, EW 10, pages 102-107, New York, NY, USA, 2002. ACM.
-
(2002)
Proceedings of the 10th Workshop on ACM SIGOPS European Workshop
, pp. 102-107
-
-
Swift, M.M.1
Martin, S.2
Levy, H.M.3
Eggers, S.J.4
-
25
-
-
62649134605
-
-
United Stated Department of Defense February
-
United Stated Department of Defense. High performance microchip supply, February 2005.
-
(2005)
High Performance Microchip Supply
-
-
-
27
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
HOST 2008. IEEE International Workshop on June
-
X. Wang, M. Tehranipoor, and J. Plusquellic. Detecting malicious inclusions in secure hardware: Challenges and solutions. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 15-19, June 2008.
-
(2008)
Hardware-oriented Security and Trust, 2008
, pp. 15-19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
|