-
1
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
Jan-Feb
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," Design Test of Computers, IEEE, vol. 27, no. 1, pp. 10-25, Jan-Feb 2010.
-
(2010)
Design Test of Computers IEEE
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
2
-
-
0003765587
-
Common criteria for information technology security evaluation
-
The Common Criteria Recognition Arrangement Sep
-
The Common Criteria Recognition Arrangement, "Common Criteria for Information Technology Security Evaluation," Common Criiteria, Tech. Rep., Sep 2006.
-
(2006)
Common Criiteria, Tech. Rep.
-
-
-
3
-
-
1642355346
-
Covert channels and anonymizing networks
-
I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller, "Covert channels and anonymizing networks," in Proceedings of the 2003 ACM workshop on Privacy in the electronic society, ser. WPES'03. ACM, 2003, pp. 79-88.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Ser. WPES'03. ACM
, pp. 79-88
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
6
-
-
84949175794
-
Trojan taxonomy
-
Springer New York
-
R. Karri, J. Rajendran, and K. Rosenfeld, "Trojan taxonomy," in Introduction to Hardware Security and Trust. Springer New York, 2012, pp. 325-338.
-
(2012)
Introduction to Hardware Security and Trust
, pp. 325-338
-
-
Karri, R.1
Rajendran, J.2
Rosenfeld, K.3
-
7
-
-
70449134838
-
Experiences in hardware trojan design and implementation
-
Y. Jin, N. Kupp, and Y. Makris, "Experiences in hardware trojan design and implementation," in Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE Computer Society, 2009, pp. 50-57.
-
(2009)
Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE Computer Society
, pp. 50-57
-
-
Jin, Y.1
Kupp, N.2
Makris, Y.3
-
8
-
-
78751648253
-
A case study in hardware trojan design and implementation
-
A. Baumgarten, M. Steffen, M. Clausman, and J. Zambreno, "A case study in hardware trojan design and implementation," International Journal of Information Security, vol. 10, pp. 1-14, 2011.
-
(2011)
International Journal of Information Security
, vol.10
, pp. 1-14
-
-
Baumgarten, A.1
Steffen, M.2
Clausman, M.3
Zambreno, J.4
-
9
-
-
79952910567
-
FPGA side-channel receivers
-
J. Sun, R. Bittner, and K. Eguro, "FPGA side-channel receivers," in Proceedings of the 19th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, ser. FPGA'11. ACM, 2011, pp. 267-276.
-
(2011)
Proceedings of the 19th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Ser. FPGA'11. ACM
, pp. 267-276
-
-
Sun, J.1
Bittner, R.2
Eguro, K.3
-
10
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
S. Zander, G. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," Communications Surveys Tutorials, IEEE, vol. 9, no. 3, pp. 44-57, 2007.
-
(2007)
Communications Surveys Tutorials IEEE
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
11
-
-
33750702480
-
Offline hardware/software authentication for reconfigurable platforms
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
E. Simpson and P. Schaumont, "Offline hardware/software authentication for reconfigurable platforms," in Cryptographic Hardware and Embedded Systems-CHES 2006, ser. LNCS. Springer, 2006, vol. 4249, pp. 311-323. (Pubitemid 44700066)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249 LNCS
, pp. 311-323
-
-
Simpson, E.1
Schaumont, P.2
-
13
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Springer
-
J. Guajardo, S. Kumar, G.-J. Schrijen, and P. Tuyls, "FPGA intrinsic PUFs and their use for IP protection," in Cryptographic Hardware and Embedded Systems-CHES 2007, ser. LNCS. Springer, 2007, vol. 4727, pp. 63-80.
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES 2007, Ser. LNCS.
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.-J.3
Tuyls, P.4
-
15
-
-
33751316041
-
Recent advances in high-speed serial I/O trends, standards and techniques
-
DOI 10.1109/CCECE.2005.1557213, 1557213, Canadian Conference on Electrical and Computer Engineering 2005
-
P. Noel, F. Zarkeshvari, and T. Kwasniewski, "Recent advances in highspeed serial I/O trends, standards and techniques," in Electrical and Computer Engineering, 2005. Canadian Conference on, May 2005, pp. 1292-1295. (Pubitemid 44801852)
-
(2005)
Canadian Conference on Electrical and Computer Engineering
, vol.2005
, pp. 1292-1295
-
-
Noel, P.1
Zarkeshvari, F.2
Kwasniewski, T.3
|