메뉴 건너뛰기




Volumn , Issue , 2011, Pages 802-809

Robust passive hardware metering

Author keywords

gate level characterization; Passive hardware metering; usage metering

Indexed keywords

COST-EFFECTIVE APPROACH; DELETERIOUS EFFECTS; HARDWARE METERING; LARGE DESIGNS; PASSIVE HARDWARE METERING; PHYSICAL LEVEL; SUPPLY VOLTAGES; USAGE METERING;

EID: 84855802262     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAD.2011.6105421     Document Type: Conference Paper
Times cited : (24)

References (24)
  • 1
    • 34547252533 scopus 로고    scopus 로고
    • CAD-based security, cryptography and digital rights management
    • F. Koushanfar, M. Potkonjak. CAD-based Security, Cryptography, and Digital Rights Management. DAC 2007, pp. 268-269.
    • (2007) DAC , pp. 268-269
    • Koushanfar, F.1    Potkonjak, M.2
  • 2
    • 76349111305 scopus 로고    scopus 로고
    • A comprehensive framework for predictive modeling of negative bias temperature instability
    • April
    • S. Chakravarthi, et al. A Comprehensive Framework for Predictive Modeling of Negative Bias Temperature Instability. IEEE International Reliability Physics Symposium April 2004, pp. 273- 282.
    • (2004) IEEE International Reliability Physics Symposium , pp. 273-282
    • Chakravarthi, S.1
  • 3
    • 56749170623 scopus 로고    scopus 로고
    • Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
    • Y. Alkabani, et al. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Information Hiding 2008, pp. 102-117.
    • (2008) Information Hiding , pp. 102-117
    • Alkabani, Y.1
  • 4
    • 1242286077 scopus 로고    scopus 로고
    • Effective iterative techniques for fingerprinting design IP
    • A. Caldwell, et al. Effective Iterative Techniques for Fingerprinting Design IP. IEEE Transactions on CAD, Vol. 23, No. 2, 2004. pp. 208-215.
    • (2004) IEEE Transactions on CAD , vol.23 , Issue.2 , pp. 208-215
    • Caldwell, A.1
  • 5
  • 6
    • 78650884368 scopus 로고    scopus 로고
    • Scalable segmentation-based malicious circuitry detection and diagnosis
    • S. Wei, M. Potkonjak. Scalable Segmentation-Based Malicious Circuitry Detection and Diagnosis. ICCAD 2010. pp. 483-486.
    • (2010) ICCAD , pp. 483-486
    • Wei, S.1    Potkonjak, M.2
  • 8
    • 41549090501 scopus 로고    scopus 로고
    • Analysis and modeling of CD variation for statistical static timing
    • B. Cline, et al. Analysis and Modeling of CD Variation for Statistical Static Timing. ICCAD 2006, pp. 60-66.
    • (2006) ICCAD , pp. 60-66
    • Cline, B.1
  • 9
    • 0032320827 scopus 로고    scopus 로고
    • Random dopant induced threshold voltage lowering and fluctuations in sub-0.1 um MOSFET's: A 3-D atomistic simulation study
    • A. Asenov. Random Dopant Induced Threshold Voltage Lowering and Fluctuations in Sub-0.1 um MOSFET's: A 3-D Atomistic Simulation Study. IEEE Transactions on Electron Devices, Vol. 45, No. 12, 1998, pp. 2505-2513.
    • (1998) IEEE Transactions on Electron Devices , vol.45 , Issue.12 , pp. 2505-2513
    • Asenov, A.1
  • 10
    • 70350733802 scopus 로고    scopus 로고
    • Hardware trojan horse detection using gate-level characterization
    • M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey. Hardware Trojan horse detection using gate-level characterization. DAC 2009, pp. 688-693.
    • (2009) DAC , pp. 688-693
    • Potkonjak, M.1    Nahapetian, A.2    Nelson, M.3    Massey, T.4
  • 12
    • 84855821363 scopus 로고    scopus 로고
    • NI PXI-4130 Power SMU
    • NI PXI-4130 Power SMU: http://sine.ni.com/nips/cds/view/p/lang/en/nid/ 204239.
  • 14
    • 77956221000 scopus 로고    scopus 로고
    • Gate-level characterization: Foundations and hardware security applications
    • S. Wei, S. Meguerdichian, M. Potkonjak, Gate-Level Characterization: Foundations and Hardware Security Applications, DAC 2010, pp. 222-227.
    • (2010) DAC , pp. 222-227
    • Wei, S.1    Meguerdichian, S.2    Potkonjak, M.3
  • 15
    • 80052656400 scopus 로고    scopus 로고
    • Integrated circuit security techniques using variable supply voltage
    • S. Wei, M. Potkonjak, Integrated Circuit Security Techniques Using Variable Supply Voltage, DAC 2011, pp. 248-253.
    • (2011) DAC , pp. 248-253
    • Wei, S.1    Potkonjak, M.2
  • 18
    • 80052681348 scopus 로고    scopus 로고
    • Differential public physically unclonable functions: Architecture and applications
    • M. Potkonjak, S. Meguerdichian, A. Nahapetian, S. Wei. Differential Public Physically Unclonable Functions: Architecture and Applications. DAC 2011.
    • (2011) DAC
    • Potkonjak, M.1    Meguerdichian, S.2    Nahapetian, A.3    Wei, S.4
  • 20
    • 70350068434 scopus 로고    scopus 로고
    • Hardware aging-based software metering
    • F. Dabiri, M. Potkonjak, Hardware aging-based software metering, DATE 2009, pp. 460-465.
    • (2009) DATE , pp. 460-465
    • Dabiri, F.1    Potkonjak, M.2
  • 21
    • 80052670809 scopus 로고    scopus 로고
    • A first step towards automatic application of power analysis countermeasures
    • A. G. Bayrak, F. Regazzoni, P. Brisk, F-X. Standaert, and P. Ienne, A First Step Towards Automatic Application of Power Analysis Countermeasures. DAC 2011.
    • (2011) DAC
    • Bayrak, A.G.1    Regazzoni, F.2    Brisk, P.3    Standaert, F.-X.4    Ienne, P.5
  • 23
    • 38249007777 scopus 로고
    • Birthday paradox, coupon collectors, caching algorithms and self-organizing search
    • P. Flajolet, D. Gardy, L. Thimonier. Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-organizing search. Discrete Applied Mathematics, Vol. 39, No. 3, 1992. pp. 207-229.
    • (1992) Discrete Applied Mathematics , vol.39 , Issue.3 , pp. 207-229
    • Flajolet, P.1    Gardy, D.2    Thimonier, L.3
  • 24
    • 75649141765 scopus 로고    scopus 로고
    • Ultralow-power design in near-threshold region
    • D. Markovic, et al, Ultralow-Power Design in Near-Threshold Region, Proceedings of the IEEE, Vol. 98, No.2, 2010. pp. 237-252.
    • (2010) Proceedings of the IEEE , vol.98 , Issue.2 , pp. 237-252
    • Markovic, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.