-
5
-
-
84866649265
-
-
The Free Dictionary. Backdoor, http://www.thefreedictionary.com/backdoor
-
Backdoor
-
-
-
6
-
-
70350599741
-
The State-of-the-Art in IC Reverse Engineering
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Torrance, R., James, D.: The State-of-the-Art in IC Reverse Engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 363-381. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 363-381
-
-
Torrance, R.1
James, D.2
-
9
-
-
49749105556
-
Towards Trojan-free Trusted ICs: Problem Analysis and Detection Scheme
-
Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free Trusted ICs: Problem Analysis and Detection Scheme. In: Design, Automation and Test in Europe, DATE 2008, March 10-14, pp. 1362-1365 (2008)
-
(2008)
Design, Automation and Test in Europe, DATE 2008, March 10-14
, pp. 1362-1365
-
-
Wolff, F.1
Papachristou, C.2
Bhunia, S.3
Chakraborty, R.S.4
-
10
-
-
51849111151
-
Detecting Malicious Inclusions in Secure Hareware: Challenges and Solutions
-
Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting Malicious Inclusions in Secure Hareware: Challenges and Solutions. In: IEEE Int. Hardware-Oriented Security and Trust, HOST (2008)
-
(2008)
IEEE Int. Hardware-Oriented Security and Trust, HOST
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
11
-
-
34548719905
-
Trojan Detection using IC Fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan Detection using IC Fingerprinting. In: IEEE Symp. on Security and Privacy, SP, pp. 296-310 (2007)
-
(2007)
IEEE Symp. on Security and Privacy, SP
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
13
-
-
78049331855
-
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Du, D., Narasimhan, S., Chakraborty, R.S., Bhunia, S.: Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. In:Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 173-187. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 173-187
-
-
Du, D.1
Narasimhan, S.2
Chakraborty, R.S.3
Bhunia, S.4
-
14
-
-
78649519550
-
A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans under Real Process and Environmental Conditions
-
Rad, R., Tehranipoor, M., Plusquellic, J.: A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans under Real Process and Environmental Conditions. IEEE. Trans. in VLSI 18, 1735-1744 (2009)
-
(2009)
IEEE. Trans. in VLSI
, vol.18
, pp. 1735-1744
-
-
Rad, R.1
Tehranipoor, M.2
Plusquellic, J.3
-
15
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
14544277436
-
-
IEEE Std 1149.1-2001
-
JTAG Boundary scan. IEEE Std 1149.1-2001
-
JTAG Boundary Scan
-
-
-
20
-
-
80052010257
-
New security threats against chips containing scan chain structures
-
Da Rolt, J., Di Natale, G., Flottes, M.-L., Rouzeyre, B.: New security threats against chips containing scan chain structures. In: IEEE Int. Workshop on Hardware-Oriented Security and Trust, HOST, pp. 110-115 (2011)
-
(2011)
IEEE Int. Workshop on Hardware-Oriented Security and Trust, HOST
, pp. 110-115
-
-
Da Rolt, J.1
Di Natale, G.2
Flottes, M.-L.3
Rouzeyre, B.4
-
22
-
-
84866649266
-
-
Mountain View, CA 94043-4655 USA
-
ProASIC3 Frequently Asked Questions, Actel Corporation, Mountain View, CA 94043-4655 USA, http://www.actel.com/documents/pa3-faq.html
-
ProASIC3 Frequently Asked Questions
-
-
-
23
-
-
78049325204
-
Flash Memory 'Bumping Attacks
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Skorobogatov, S.: Flash Memory 'Bumping" Attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 158-172. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 158-172
-
-
Skorobogatov, S.1
-
24
-
-
84866701445
-
In the blink of an eye: There goes your AES key
-
ePrint Archive, Report 2012/296
-
Skorobogatov, S., Woods, C.: In the blink of an eye: There goes your AES key. IACR Cryptology ePrint Archive, Report 2012/296 (2012), http://eprint.iacr.org/2012/296
-
(2012)
IACR Cryptology
-
-
Skorobogatov, S.1
Woods, C.2
-
25
-
-
84866640137
-
Integrated Circuit Investigation Method and Apparatus
-
Patent number WO2012/046029 A1
-
Integrated Circuit Investigation Method and Apparatus. Patent number WO2012/046029 A1
-
-
-
-
28
-
-
27244454816
-
Data Remanence in Flash Memory Devices
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Skorobogatov, S.: Data Remanence in Flash Memory Devices. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 339-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 339-353
-
-
Skorobogatov, S.1
|