-
1
-
-
76949093207
-
A survey of hardware TROJANS: Taxonomy and detection
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware TROJANS: taxonomy and detection," IEEE Design Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
-
(2010)
IEEE Design Test of Computers
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
4
-
-
77957961013
-
Post-silicon power characterization using thermal infrared emissions
-
R. Cochran, A. Nowroz, and S. Reda, "Post-Silicon Power Characterization Using Thermal Infrared Emissions," in International Symposium on Low Power Electronics and Design, 2010, pp. 331-336.
-
(2010)
International Symposium on Low Power Electronics and Design
, pp. 331-336
-
-
Cochran, R.1
Nowroz, A.2
Reda, S.3
-
5
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in IEEE Symposium on Security and Privacy, 2007, pp. 296-310.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
6
-
-
49749105556
-
Towards TROJAN-free trusted ICs: Problem analysis and detection scheme
-
F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty, "Towards TROJAN-free trusted ICs: Problem analysis and detection scheme," in Design, Automation and Test in Europe, 2008, pp. 1362-1365.
-
(2008)
Design, Automation and Test in Europe
, pp. 1362-1365
-
-
Wolff, F.1
Papachristou, C.2
Bhunia, S.3
Chakraborty, R.4
-
7
-
-
51849084404
-
Sensitivity analysis to hardware TROJANS using power supply transient signals
-
R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity analysis to hardware TROJANS using power supply transient signals," in International Workshop on Hardware-Oriented Security and Trust, 2008, pp. 3-7.
-
(2008)
International Workshop on Hardware-Oriented Security and Trust
, pp. 3-7
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
8
-
-
70350733802
-
Hardware TROJAN horse detection using gate-level characterization
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, "Hardware TROJAN horse detection using gate-level characterization," in Design Automation Conference, 2009, pp. 688-693.
-
(2009)
Design Automation Conference
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
9
-
-
79951821310
-
A unified framework for multimodal submodular integrated circuits TROJAN detection
-
F. Koushanfar and A. Mirhoseini, "A unified framework for multimodal submodular integrated circuits TROJAN detection," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162-174, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 162-174
-
-
Koushanfar, F.1
Mirhoseini, A.2
-
10
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
R. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic, "Power supply signal calibration techniques for improving detection resolution to hardware trojans," in International Conference on Computer-Aided Design, 2008, pp. 632-639.
-
(2008)
International Conference on Computer-Aided Design
, pp. 632-639
-
-
Rad, R.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
11
-
-
33746400169
-
HotSpot: A compact thermal modeling methodology for early-stage VLSI design
-
W. Huang, S. Ghosh, S. Velusamy, K. Sankaranarayanan, K. Skadron, and M. Stan, "HotSpot: A Compact Thermal Modeling Methodology for Early-Stage VLSI Design," IEEE Transactions onVery Large Scale Integration Systems, vol. 14, no. 5, pp. 501 - 513, 2006.
-
(2006)
IEEE Transactions OnVery Large Scale Integration Systems
, vol.14
, Issue.5
, pp. 501-513
-
-
Huang, W.1
Ghosh, S.2
Velusamy, S.3
Sankaranarayanan, K.4
Skadron, K.5
Stan, M.6
-
12
-
-
0742268833
-
Two-dimensional pca: A new approach to appearance-based face representation and recognition
-
J. Yang, D. Zhang, A. Frangi, and J. yu Yang, "Two-dimensional pca: a new approach to appearance-based face representation and recognition," Pattern Analysis and Machine Intelligence, vol. 26, no. 1, pp. 131 - 137, 2004.
-
(2004)
Pattern Analysis and Machine Intelligence
, vol.26
, Issue.1
, pp. 131-137
-
-
Yang, J.1
Zhang, D.2
Frangi, A.3
Yu Yang, J.4
-
13
-
-
0141852377
-
Statistical timing analysis using bounds and selective enumeration
-
A. Agarwal, "Statistical timing analysis using bounds and selective enumeration," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 22, no. 9, pp. 1243 - 1261, 2003.
-
(2003)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.22
, Issue.9
, pp. 1243-1261
-
-
Agarwal, A.1
-
14
-
-
0036954781
-
Modeling and analysis of leakage power considering within-die process variations
-
A. Srivastava, R. Bai, D. Blaauw, and D. Sylvester, "Modeling and analysis of leakage power considering within-die process variations," in Low Power Electronics and Design, 2002, pp. 64 - 67.
-
(2002)
Low Power Electronics and Design
, pp. 64-67
-
-
Srivastava, A.1
Bai, R.2
Blaauw, D.3
Sylvester, D.4
|