-
1
-
-
67649998710
-
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
-
Oct.
-
X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, "Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis," Proceedings of the IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp. 87-95, Oct. 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems
, pp. 87-95
-
-
Wang, X.1
Salmani, H.2
Tehranipoor, M.3
Plusquellic, J.4
-
3
-
-
83455254210
-
SVD-Based Ghost Circuitry Detection
-
M. Nelson, A. Nahapetian, F. Koushanfar, and M. Potkonjak, "SVD-Based Ghost Circuitry Detection," Proceedings of the International Workshop Information Hiding, pp. 190-204, 2009.
-
(2009)
Proceedings of the International Workshop Information Hiding
, pp. 190-204
-
-
Nelson, M.1
Nahapetian, A.2
Koushanfar, F.3
Potkonjak, M.4
-
5
-
-
79959669568
-
Design and analysis of ring oscillator based design-for-trust technique
-
May
-
J. Rajendran, V. Jyothi, O. Sinanoglu, and R. Karri, "Design and analysis of ring oscillator based design-for-trust technique," Proceedings of the IEEE VLSI Test Symposium, pp. 105-110, May 2011.
-
(2011)
Proceedings of the IEEE VLSI Test Symposium
, pp. 105-110
-
-
Rajendran, J.1
Jyothi, V.2
Sinanoglu, O.3
Karri, R.4
-
6
-
-
77958115258
-
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
-
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy Hardware: Identifying and Classifying Hardware Trojans," Proceedings of the IEEE Computer, vol. 43, no. 10, pp. 39-46, oct. 2010.
-
(2010)
Proceedings of the IEEE Computer
, vol.43
, Issue.10
-
-
Karri, R.1
Rajendran, J.2
Rosenfeld, K.3
Tehranipoor, M.4
-
8
-
-
49749134668
-
EPIC: Ending Piracy of Integrated Circuits
-
Mar.
-
J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits," Proceedings of the IEEE/ACM Design, Automation and Test in Europe, pp. 1069-1074, Mar. 2008.
-
(2008)
Proceedings of the IEEE/ACM Design, Automation and Test in Europe
, pp. 1069-1074
-
-
Roy, J.1
Koushanfar, F.2
Markov, I.3
-
10
-
-
83455254213
-
Trustworthy hardware: Trojan detection and design-for-trust challenges
-
to appear in
-
M. Tehranipoor, H. Salmani, X. Zhang, M. Wang, R. Karri, J. Rajendran, and K. Rosenfeld, "Trustworthy hardware: Trojan detection and design-for-trust challenges," to appear in IEEE Computer.
-
IEEE Computer
-
-
Tehranipoor, M.1
Salmani, H.2
Zhang, X.3
Wang, M.4
Karri, R.5
Rajendran, J.6
Rosenfeld, K.7
-
11
-
-
0003999770
-
-
Technical report, Computer Laboratory, University of Cambridge
-
D. J. Wheeler and R. M. Needham, "TEA, a Tiny Encryption Algorithm,"Technical report, Computer Laboratory, University of Cambridge, 1995.
-
(1995)
TEA, A Tiny Encryption Algorithm
-
-
Wheeler, D.J.1
Needham, R.M.2
-
12
-
-
77955766025
-
A large scale characterization of RO-PUF
-
Jun.
-
A. Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF," Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 94-99, Jun. 2010.
-
(2010)
Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust
, pp. 94-99
-
-
Maiti, A.1
Casarona, J.2
McHale, L.3
Schaumont, P.4
-
13
-
-
0142039803
-
Delay defect characteristics and testing strategies
-
Oct.
-
K. S. Kim, S. Mitra, and P. Ryan, "Delay defect characteristics and testing strategies," IEEE Design Test of Computers, vol. 20, no. 5, pp. 8-16, Oct. 2003.
-
(2003)
IEEE Design Test of Computers
, vol.20
, Issue.5
, pp. 8-16
-
-
Kim, K.S.1
Mitra, S.2
Ryan, P.3
|