-
1
-
-
84889039676
-
-
Chipworks, "Intel's 22-nm Tri-gate Transistors Exposed," http://www.chipworks.com/blog/technologyblog/2012/04/23/intels-22-nm-tri-gate- transistors-exposed/, 2012.
-
(2012)
Intel's 22-nm Tri-gate Transistors Exposed
-
-
-
5
-
-
84889036860
-
-
Chipworks, "Reverse engineering software," http://www. chipworks.com/en/technical-competitive-analysis/resources/reerse-engineering- software.
-
Reverse Engineering Software
-
-
-
6
-
-
84889049339
-
-
Degate, http://www.degate.org/documentation/.
-
-
-
-
9
-
-
84889045731
-
Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing
-
US Patent no. 20120139582
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, and B. J. Wang, "Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing," US Patent no. 20120139582, 2012.
-
(2012)
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Wang, B.J.4
-
10
-
-
84889036301
-
Building block for a secure cmos logic cell library
-
US Patent no. 8111089
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, "Building block for a secure cmos logic cell library," US Patent no. 8111089, 2012.
-
(2012)
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Ouyang, P.4
Wang, B.J.5
-
11
-
-
84889044600
-
Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide
-
US Patent no. 20020096776
-
J. P. Baukus, L. W. Chow, and W. Clark, "Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide," US Patent no. 20020096776, 2002.
-
(2002)
-
-
Baukus, J.P.1
Chow, L.W.2
Clark, W.3
-
13
-
-
84888995535
-
Camouflaging a standard cell based integrated circuit
-
US Patent no. 8151235
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, "Camouflaging a standard cell based integrated circuit," US Patent no. 8151235, 2012.
-
(2012)
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Ouyang, P.4
Wang, B.J.5
-
14
-
-
84889049565
-
Conductive channel pseudo block process and circuit to inhibit reverse engineering
-
US Patent no. 8258583
-
J. P. Baukus, L.-W. Chow, J. W. M. Clark, and G. J. Harbison, "Conductive channel pseudo block process and circuit to inhibit reverse engineering," US Patent no. 8258583, 2012.
-
(2012)
-
-
Baukus, J.P.1
Chow, L.-W.2
Clark, J.W.M.3
Harbison, G.J.4
-
15
-
-
0003906698
-
-
Kluwer Academic Publishers, Boston
-
M. L. Bushnell and V. D. Agrawal, "Essentials of Electronic Testing for Digital, Memory, and Mixed-Signal VLSI Circuits," Kluwer Academic Publishers, Boston, 2000.
-
(2000)
Essentials of Electronic Testing for Digital, Memory, and Mixed-Signal VLSI Circuits
-
-
Bushnell, M.L.1
Agrawal, V.D.2
-
17
-
-
0033359923
-
Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
-
M. Hansen, H. Yalcin, and J. Hayes, "Unveiling the ISCAS-85 benchmarks: a case study in reverse engineering," IEEE Design Test of Computers, vol. 16, no. 3, pp. 72-80, 1999.
-
(1999)
IEEE Design Test of Computers
, vol.16
, Issue.3
, pp. 72-80
-
-
Hansen, M.1
Yalcin, H.2
Hayes, J.3
-
18
-
-
0030246695
-
HOPE: An Efficient Parallel Fault Simulator for Synchronous Sequential Circuits
-
H. Lee and D. S. Ha, "HOPE: An Efficient Parallel Fault Simulator for Synchronous Sequential Circuits," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 15, no. 9, pp. 1048-1058, 1996.
-
(1996)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.15
, Issue.9
, pp. 1048-1058
-
-
Lee, H.1
Ha, D.S.2
-
19
-
-
84888984254
-
-
Cadence, "RTL Compiler," www.cadence.com/products/ld/rtl- compiler.
-
RTL Compiler
-
-
-
21
-
-
84889075389
-
Practical, lightweight secure inclusion of third-party intellectual property
-
A. Waksman, J. Eum, and S. Sethumadhavan, "Practical, lightweight secure inclusion of third-party intellectual property," IEEE Design & Test, no. 99, pp. 1-1, 2013.
-
(2013)
IEEE Design & Test
, Issue.99
, pp. 1-1
-
-
Waksman, A.1
Eum, J.2
Sethumadhavan, S.3
-
22
-
-
84889072332
-
-
Oracle, "Opensparc internals," http://www.oracle.com/ technetwork/systems/opensparc/opensparc-internals-book-1500271.pdf.
-
Opensparc Internals
-
-
-
23
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. Alkabani and F. Koushanfar, "Active hardware metering for intellectual property protection and security," in the Proc. of USENIX security, pp. 291-306, 2007.
-
(2007)
Proc. of USENIX Security
, pp. 291-306
-
-
Alkabani, Y.1
Koushanfar, F.2
-
24
-
-
78149236064
-
Avalanche characteristics of substitution-permutation encryption networks
-
H. Heys and S. Tavares, "Avalanche characteristics of substitution-permutation encryption networks," IEEE Transactions on Computers, vol. 44, no. 9, pp. 1131-1139, 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.9
, pp. 1131-1139
-
-
Heys, H.1
Tavares, S.2
-
26
-
-
84888998162
-
Method of recovering a gate-level netlist from a transistor-level
-
US Patent no. 6190433
-
W. M. V. Fleet and M. R. Dransfield, "Method of recovering a gate-level netlist from a transistor-level," US Patent no. 6190433, 1998.
-
(1998)
-
-
Fleet, W.M.V.1
Dransfield, M.R.2
-
27
-
-
84864117075
-
Reverse engineering circuits using behavioral pattern mining
-
W. Li, Z. Wasson, and S. Seshia, "Reverse engineering circuits using behavioral pattern mining," in the Proc. of IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 83-88, 2012.
-
(2012)
Proc. of IEEE International Symposium on Hardware-Oriented Security and Trust
, pp. 83-88
-
-
Li, W.1
Wasson, Z.2
Seshia, S.3
-
28
-
-
84885590301
-
Reverse engineering digital circuits using functional analysis
-
P. Subramanyan, N. Tsiskaridze, K. Pasricha, D. Reisman, A. Susnea, and S. Malik, "Reverse engineering digital circuits using functional analysis," in the Proc. of IEEE/ACM Design Automation and Test in Europe, 2013.
-
Proc. of IEEE/ACM Design Automation and Test in Europe, 2013
-
-
Subramanyan, P.1
Tsiskaridze, N.2
Pasricha, K.3
Reisman, D.4
Susnea, A.5
Malik, S.6
-
29
-
-
77955216190
-
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
-
R. Chakraborty and S. Bhunia, "HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493-1502, 2009.
-
(2009)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.28
, Issue.10
, pp. 1493-1502
-
-
Chakraborty, R.1
Bhunia, S.2
-
30
-
-
77958126199
-
EPIC: Ending Piracy of Integrated Circuits
-
J. Roy, F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits," IEEE Computer, vol. 43, no. 10, pp. 30-38, 2010.
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 30-38
-
-
Roy, J.1
Koushanfar, F.2
Markov, I.3
-
31
-
-
84863542083
-
Security analysis of logic obfuscation
-
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, "Security analysis of logic obfuscation," in the Proc. of IEEE/ACM Design Automation Conference, pp. 83-89, 2012.
-
(2012)
Proc. of IEEE/ACM Design Automation Conference
, pp. 83-89
-
-
Rajendran, J.1
Pino, Y.2
Sinanoglu, O.3
Karri, R.4
-
32
-
-
84862094399
-
Logic encryption: A fault analysis perspective
-
-, "Logic encryption: A fault analysis perspective," IEEE Design, Automation Test in Europe, pp. 953-958, 2012.
-
(2012)
IEEE Design, Automation Test in Europe,.
, pp. 953-958
-
-
Rajendran, J.1
Pino, Y.2
Sinanoglu, O.3
Karri, R.4
-
33
-
-
76949085013
-
Preventing IC Piracy Using Reconfigurable Logic Barriers
-
A. Baumgarten, A. Tyagi, and J. Zambreno, "Preventing IC Piracy Using Reconfigurable Logic Barriers," IEEE Design and Test of Computers, vol. 27, no. 1, pp. 66-75, 2010.
-
(2010)
IEEE Design and Test of Computers
, vol.27
, Issue.1
, pp. 66-75
-
-
Baumgarten, A.1
Tyagi, A.2
Zambreno, J.3
-
34
-
-
0031619176
-
Watermarking techniques for intellectual property protection
-
A. Kahng, J. Lach, W. Mangione-Smith, S. Mantik, I. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, "Watermarking techniques for intellectual property protection," in the Proc. of IEEE/ACM Design Automation Conference, pp. 776-781, 1998.
-
(1998)
Proc. of IEEE/ACM Design Automation Conference
, pp. 776-781
-
-
Kahng, A.1
Lach, J.2
Mangione-Smith, W.3
Mantik, S.4
Markov, I.5
Potkonjak, M.6
Tucker, P.7
Wang, H.8
Wolfe, G.9
-
35
-
-
33745218297
-
Behavioral synthesis techniques for intellectual property protection
-
F. Koushanfar, I. Hong, and M. Potkonjak, "Behavioral synthesis techniques for intellectual property protection," ACM Transactions on Design Automation of Electronic Systems, vol. 10, no. 3, pp. 523-545, 2005.
-
(2005)
ACM Transactions on Design Automation of Electronic Systems
, vol.10
, Issue.3
, pp. 523-545
-
-
Koushanfar, F.1
Hong, I.2
Potkonjak, M.3
-
36
-
-
0031635593
-
Robust IP watermarking methodologies for physical design
-
A. Kahng, S. Mantik, I. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, "Robust IP watermarking methodologies for physical design," in the Proc. of IEEE/ACM Design Automation Conference, pp. 782-787, 1998.
-
(1998)
Proc. of IEEE/ACM Design Automation Conference
, pp. 782-787
-
-
Kahng, A.1
Mantik, S.2
Markov, I.3
Potkonjak, M.4
Tucker, P.5
Wang, H.6
Wolfe, G.7
-
37
-
-
34547307341
-
Physical Unclonable Functions for Device Authentication and Secret Key Generation
-
G. Suh and S. Devadas, "Physical Unclonable Functions for Device Authentication and Secret Key Generation," in the Proc. of the IEEE/ACM Design Automation Conference, pp. 9-14, 2007.
-
(2007)
Proc. of the IEEE/ACM Design Automation Conference
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
38
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
J. Lee, D. Lim, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "A technique to build a secret key in integrated circuits for identification and authentication applications," in the Proc. of IEEE Internationall Symposium on VLSI Circuits, pp. 176-179, 2004.
-
(2004)
Proc. of IEEE Internationall Symposium on VLSI Circuits
, pp. 176-179
-
-
Lee, J.1
Lim, D.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
39
-
-
34047189028
-
-
Cadence, "SoC Encounter," http://www.cadence.com/products/di/ soc-encounter/ pages/default.aspx.
-
SoC Encounter
-
-
|