-
1
-
-
84855970539
-
-
Defense Science Board (DSB) Study on High Performance Microchip Supply [Online]. Available
-
Defense Science Board (DSB) Study on High Performance Microchip Supply [Online]. Available: http://www.acq.osd.mil/dsb/reports/2005-02-hpms-report- final.pdf
-
-
-
-
2
-
-
33646472901
-
Bogus! electronic manufacturing and consumers confront a rising tide of counterfeit electronics
-
May
-
M. Pecht and S. Tiku, "Bogus! electronic manufacturing and consumers confront a rising tide of counterfeit electronics," IEEE Spectrum, vol. 43, no. 5, pp. 37-46, May 2006.
-
(2006)
IEEE Spectrum
, vol.43
, Issue.5
, pp. 37-46
-
-
Pecht, M.1
Tiku, S.2
-
3
-
-
41349119868
-
Trusted integrated circuit strategy
-
Mar.
-
S. Pope, "Trusted integrated circuit strategy," IEEE Trans. Compon. Packag. Technol., vol. 31, no. 1, pp. 230-235, Mar. 2008.
-
(2008)
IEEE Trans. Compon. Packag. Technol.
, vol.31
, Issue.1
, pp. 230-235
-
-
Pope, S.1
-
4
-
-
84855978815
-
-
Managing the Risks of Counterfeiting in the Information Technology Industry. A White Paper by KPMG and the Alliance for Gray Market and Counterfeit Abatement (AGMA)
-
Managing the Risks of Counterfeiting in the Information Technology Industry. A White Paper by KPMG and the Alliance for Gray Market and Counterfeit Abatement (AGMA).
-
-
-
-
5
-
-
84855970540
-
-
Defense Industrial Base Assessment: Counterfeit Electronics, 2010, A Report by Bureau of Industry and Security's (BIS) Office of Technology Evaluation (OTE) [Online]. Available
-
Defense Industrial Base Assessment: Counterfeit Electronics, 2010. A Report by Bureau of Industry and Security's (BIS) Office of Technology Evaluation (OTE) [Online]. Available: http://www.agmaglobal. org
-
-
-
-
6
-
-
84947210876
-
Intellectual property metering
-
Information Hiding
-
F. Koushanfar, G. Qu, and M. Potkonjak, "Intellectual property metering," in Proc. Int. Workshop on Information Hiding (IH), 2001, pp. 81-95. (Pubitemid 33367660)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 81-95
-
-
Koushanfar, F.1
Qu, G.2
Potkonjak, M.3
-
8
-
-
34547252533
-
CAD-based security, cryptography, and digital rights management
-
DOI 10.1109/DAC.2007.375167, 4261186, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
F. Koushanfar and M. Potkonjak, "CAD-based security, cryptography, and digital rights management," in Proc. Design Automation Conf. (DAC), 2007, pp. 268-269. (Pubitemid 47129968)
-
(2007)
Proceedings - Design Automation Conference
, pp. 268-269
-
-
Koushanfar, F.1
Potkonjak, M.2
-
9
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in Proc. USENIX Security Symp., 2007, pp. 291-306.
-
(2007)
Proc. USENIX Security Symp.
, pp. 291-306
-
-
Alkabani, Y.1
Koushanfar, F.2
-
11
-
-
49749134668
-
EPIC: Ending piracy of integrated circuits
-
J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending piracy of integrated circuits," in Design Automation and Test in Europe (DATE), 2008, pp. 1069-1074.
-
(2008)
Design Automation and Test in Europe (DATE)
, pp. 1069-1074
-
-
Roy, J.1
Koushanfar, F.2
Markov, I.3
-
12
-
-
51549097800
-
Protecting bus-based hardware ip by secret sharing
-
J. Roy, F. Koushanfar, and I. Markov, "Protecting bus-based hardware ip by secret sharing," in Proc. Design Automation Conf. (DAC), 2008, pp. 846-851.
-
(2008)
Proc. Design Automation Conf. (DAC)
, pp. 846-851
-
-
Roy, J.1
Koushanfar, F.2
Markov, I.3
-
13
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, "Trusted integrated circuits: A nondestructive hidden characteristics extraction approach," in Proc. Information Hiding Conf. (IH), 2008, pp. 102-117.
-
(2008)
Proc. Information Hiding Conf. (IH)
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
15
-
-
84855802262
-
Robust passive hardware metering
-
A. Wei, M. Nahapetian, and M. Potkonjak, "Robust passive hardware metering," in Proc. Int. Conf. Computer-Aided Design (ICCAD), 2011, pp. 802-809.
-
(2011)
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, pp. 802-809
-
-
Wei, A.1
Nahapetian, M.2
Potkonjak, M.3
-
17
-
-
79957728907
-
Integrated circuits metering for piracy protection and digital rights management: An overview
-
F. Koushanfar, "Integrated circuits metering for piracy protection and digital rights management: An overview," in Proc. Great Lakes Symp. VLSI (GLSVLSI), 2011, pp. 449-454.
-
(2011)
Proc. Great Lakes Symp. VLSI (GLSVLSI)
, pp. 449-454
-
-
Koushanfar, F.1
-
18
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions," in Proc. Conf. Computer and Communications Security (CCS), 2002, pp. 148-160.
-
(2002)
Proc. Conf. Computer and Communications Security (CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
19
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. Design Automation Conf. (DAC), 2007, pp. 9-14. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
21
-
-
49749144533
-
Remote activation of ICs for piracy prevention and digital right management
-
Y. Alkabani, F. Koushanfar, and M. Potkonjak, "Remote activation of ICs for piracy prevention and digital right management," in Proc. Int. Conf. Computer-Aided Design (ICCAD), 2007, pp. 674-677.
-
(2007)
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, pp. 674-677
-
-
Alkabani, Y.1
Koushanfar, F.2
Potkonjak, M.3
-
24
-
-
34047233176
-
Future fab: How software is helping intel go nano-and beyond
-
Mar.
-
C. Mouli and W. Carriker, "Future fab: How software is helping intel go nano-and beyond," IEEE Spectrum, vol. 44, no. 3, pp. 38-43, Mar. 2007.
-
(2007)
IEEE Spectrum
, vol.44
, Issue.3
, pp. 38-43
-
-
Mouli, C.1
Carriker, W.2
-
25
-
-
49749102498
-
Plans for next-gen chips imperiled
-
Aug.
-
B. Santo, "Plans for next-gen chips imperiled," IEEE Spectrum, vol. 44, no. 8, pp. 12-14, Aug. 2007.
-
(2007)
IEEE Spectrum
, vol.44
, Issue.8
, pp. 12-14
-
-
Santo, B.1
-
26
-
-
76949095784
-
Secure and robust error correction for physical unclonable functions
-
Jan./Feb.
-
M. Yu and S. Devadas, "Secure and robust error correction for physical unclonable functions," IEEE Des. Test Comput., vol. 27, no. 1, pp. 48-65, Jan./Feb. 2010.
-
(2010)
IEEE Des. Test Comput.
, vol.27
, Issue.1
, pp. 48-65
-
-
Yu, M.1
Devadas, S.2
-
27
-
-
76949093125
-
Techniques for design and implementation of secure reconfigurable pufs
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable pufs," ACM Trans. Reconfig. Technol. Syst. (TRETS), vol. 2, no. 1, pp. 5:1-5:33, 2009.
-
(2009)
ACM Trans. Reconfig. Technol. Syst. (TRETS)
, vol.2
, Issue.1
, pp. 51-533
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
28
-
-
0035440030
-
Techniques for the creation of digital watermarks in sequential circuit designs
-
DOI 10.1109/43.945306, PII S0278007001068907
-
A. Oliveira, "Techniques for the creation of digital watermarks in sequential circuit designs," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 20, no. 9, pp. 1101-1117, Sep. 2001. (Pubitemid 32945721)
-
(2001)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.20
, Issue.9
, pp. 1101-1117
-
-
Oliveira, A.L.1
-
29
-
-
41349121509
-
Semiconductor manufacturers' efforts to improve trust in the electronic part supply chain
-
Sep.
-
K. Chatterjee and D. Das, "Semiconductor manufacturers' efforts to improve trust in the electronic part supply chain," IEEE Trans. Compon. Packag. Technol., vol. 3, no. 3, pp. 547-549, Sep. 2007.
-
(2007)
IEEE Trans. Compon. Packag. Technol.
, vol.3
, Issue.3
, pp. 547-549
-
-
Chatterjee, K.1
Das, D.2
-
30
-
-
85014332650
-
Security in embedded systems: Design challenges
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Trans. Embedded Comput. Syst. (TECS), vol. 3, no. 3, pp. 461-491, 2004.
-
(2004)
ACM Trans. Embedded Comput. Syst. (TECS)
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
31
-
-
0032320166
-
Intellectual property protection by watermarking combinational logic synthesis solutions
-
D. Kirovski, Y.-Y. Hwang, M. Potkonjak, and J. Cong, "Intellectual property protection by watermarking combinational logic synthesis solutions," in Proc. Int. Conf. Computer-Aided Design (ICCAD), 1998, pp. 194-198.
-
(1998)
Proc. Int. Conf. Computer-Aided Design (ICCAD)
, pp. 194-198
-
-
Kirovski, D.1
Hwang, Y.-Y.2
Potkonjak, M.3
Cong, J.4
-
33
-
-
33745218297
-
Behavioral synthesis techniques for intellectual property protection
-
DOI 10.1145/1080334.1080338
-
F. Koushanfar, I. Hong, and M. Potkonjak, "Behavioral synthesis techniques for intellectual property protection," ACM Trans. Design Autom. Electron. Syst., vol. 10, no. 3, pp. 523-545, 2005. (Pubitemid 43906372)
-
(2005)
ACM Transactions on Design Automation of Electronic Systems
, vol.10
, Issue.3
, pp. 523-545
-
-
Koushanfar, F.1
Hong, I.2
Potkonjak, M.3
-
35
-
-
67249147207
-
Testing techniques for hardware security
-
M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Testing techniques for hardware security," in Proc. Int. Test Conf. (ITC), 2008, pp. 1-10.
-
(2008)
Proc. Int. Test Conf. (ITC)
, pp. 1-10
-
-
Majzoobi, M.1
Koushanfar, F.2
Potkonjak, M.3
-
36
-
-
78650881413
-
An asymptotic approximation for the birthday problem
-
S. E. Ahmed and R. J. McIntosh, "An asymptotic approximation for the birthday problem," Crux Mathematicorum with Mathematical Mayhem, vol. 26, no. 3, pp. 151-155, 2000.
-
(2000)
Crux Mathematicorum with Mathematical Mayhem
, vol.26
, Issue.3
, pp. 151-155
-
-
Ahmed, S.E.1
McIntosh, R.J.2
-
37
-
-
79251578513
-
On the (Im)possibility of obfuscating programs
-
Advances in Cryptology - CRYPTO 2001
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (im)possibility of obfuscating programs," in Proc. Int. Cryptology Conference (CRYPTO), 2001, pp. 1-18. (Pubitemid 33317905)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
39
-
-
35048895442
-
Positive results and techniques for obfuscation
-
B. Lynn, M. Prabhakaran, and A. Sahai, "Positive results and techniques for obfuscation," in Proc. Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2004, pp. 20-39.
-
(2004)
Proc. Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT)
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
40
-
-
63349086739
-
Active control and digital rightsmanagement of integrated circuit IP cores
-
Y. Alkabani and F. Koushanfar, "Active control and digital rightsmanagement of integrated circuit IP cores," in Proc. Int. Conf. Compilers, Architecture, and Synthesis for Embedded Systems (CASES), 2008, pp. 227-234.
-
(2008)
Proc. Int. Conf. Compilers, Architecture, and Synthesis for Embedded Systems (CASES)
, pp. 227-234
-
-
Alkabani, Y.1
Koushanfar, F.2
-
41
-
-
0004116989
-
-
Cambridge, MA: MIT Press
-
T. Corman, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms. Cambridge, MA: MIT Press, 2001.
-
(2001)
Introduction to Algorithms
-
-
Corman, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
42
-
-
70350469042
-
Hardware-based public-key cryptography with public physically unclonable functions
-
N. Beckmann and M. Potkonjak, "Hardware-based public-key cryptography with public physically unclonable functions," in Proc. Information Hiding Conf. (IH), 2009, pp. 206-220.
-
(2009)
Proc. Information Hiding Conf. (IH)
, pp. 206-220
-
-
Beckmann, N.1
Potkonjak, M.2
-
43
-
-
78650352335
-
Towards electrical, integrated implementations of SIMPL systems
-
U. Rührmair, Q. Chen, M. Stutzmann, P. Lugli, U. Schlichtmann, and G. Csaba, "Towards electrical, integrated implementations of SIMPL systems," Inf. Security Theory Practices, vol. 6033, pp. 277-292, 2010.
-
(2010)
Inf. Security Theory Practices
, vol.6033
, pp. 277-292
-
-
Rührmair, U.1
Chen, Q.2
Stutzmann, M.3
Lugli, P.4
Schlichtmann, U.5
Csaba, G.6
-
44
-
-
80051746634
-
Time-bounded authentication of FPGAS
-
Sep.
-
M. Majzoobi and F. Koushanfar, "Time-bounded authentication of FPGAS," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 2, pp. 1123-1135, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3 PART 2
, pp. 1123-1135
-
-
Majzoobi, M.1
Koushanfar, F.2
-
45
-
-
80052681348
-
Differential public, physically unclonable functions: Architecture and applications
-
M. Potkonjak, S. Meguerdichian, A. Nahapetian, and S. Wei, "Differential public, physically unclonable functions: Architecture and applications," in Proc. Design Automation Conf. (DAC), 2011, pp. 242-247.
-
(2011)
Proc. Design Automation Conf. (DAC)
, pp. 242-247
-
-
Potkonjak, M.1
Meguerdichian, S.2
Nahapetian, A.3
Wei, S.4
|