메뉴 건너뛰기




Volumn , Issue , 2011, Pages 49-63

Silencing hardware backdoors

Author keywords

Backdoors; Hardware; Performance; Security; Triggers

Indexed keywords

HARDWARE SECURITY;

EID: 80051995886     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.27     Document Type: Conference Paper
Times cited : (125)

References (28)
  • 1
    • 44449083733 scopus 로고    scopus 로고
    • The hunt for the kill switch
    • S. Adee. The hunt for the kill switch. IEEE Spectrum Magazine, 45(5):34-39, 2008.
    • (2008) IEEE Spectrum Magazine , vol.45 , Issue.5 , pp. 34-39
    • Adee, S.1
  • 4
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • HOST 2008. IEEE International Workshop on June
    • M. Banga and M. Hsiao. A region based approach for the identification of hardware trojans. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 40-47, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008 , pp. 40-47
    • Banga, M.1    Hsiao, M.2
  • 5
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • HOST '08. IEEE International Workshop on, June
    • M. Banga and M. S. Hsiao. A region based approach for the identification of hardware trojans. In Hardware-Oriented Security and Trust, 2008. HOST '08. IEEE International Workshop on, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008
    • Banga, M.1    Hsiao, M.S.2
  • 7
    • 51849089785 scopus 로고    scopus 로고
    • On-demand transparency for improving hardware trojan detectability
    • HOST 2008. IEEE International Workshop on June
    • R. Chakraborty, S. Paul, and S. Bhunia. On-demand transparency for improving hardware trojan detectability. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 48-50, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008 , pp. 48-50
    • Chakraborty, R.1    Paul, S.2    Bhunia, S.3
  • 9
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97-105, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 12
    • 51849095999 scopus 로고    scopus 로고
    • Hardware trojan detection using path delay fingerpring
    • HOST '08. IEEE International Workshop on, June
    • Y. Jin and Y. Makris. Hardware trojan detection using path delay fingerpring. In Hardware-Oriented Security and Trust, 2008. HOST '08. IEEE International Workshop on, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008
    • Jin, Y.1    Makris, Y.2
  • 15
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for ic authentication and trojan horse detection
    • HOST 2008. IEEE International Workshop on June
    • J. Li and J. Lach. At-speed delay characterization for ic authentication and trojan horse detection. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 8-14, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008 , pp. 8-14
    • Li, J.1    Lach, J.2
  • 19
    • 85177636225 scopus 로고    scopus 로고
    • The alpha platform
    • 2nd Embedded Systems Challenge
    • J. Rajendran. The alpha platform. CSAW Conference. 2nd Embedded Systems Challenge., 2008.
    • (2008) CSAW Conference
    • Rajendran, J.1
  • 20
    • 70449123838 scopus 로고    scopus 로고
    • New design strategy for improving hardware trojan detection and reducing trojan activation time
    • HOST '09. IEEE International Workshop on july
    • H. Salmani, M. Tehranipoor, and J. Plusquellic. New design strategy for improving hardware trojan detection and reducing trojan activation time. In Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on, pages 66-73, july 2009.
    • (2009) Hardware-oriented Security and Trust, 2009 , pp. 66-73
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 21
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM Press. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 23
    • 21644451622 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP '03, pages 207-222, New York, NY, USA, 2003. ACM. (Pubitemid 40929698)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 207-222
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 25
    • 62649134605 scopus 로고    scopus 로고
    • United Stated Department of Defense February
    • United Stated Department of Defense. High performance microchip supply, February 2005.
    • (2005) High Performance Microchip Supply
  • 27
    • 51849111151 scopus 로고    scopus 로고
    • Detecting malicious inclusions in secure hardware: Challenges and solutions
    • HOST 2008. IEEE International Workshop on June
    • X. Wang, M. Tehranipoor, and J. Plusquellic. Detecting malicious inclusions in secure hardware: Challenges and solutions. In Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on, pages 15-19, June 2008.
    • (2008) Hardware-oriented Security and Trust, 2008 , pp. 15-19
    • Wang, X.1    Tehranipoor, M.2    Plusquellic, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.