-
1
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection", IEEE Des. Test, 2010.
-
(2010)
IEEE Des. Test
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
2
-
-
84892534513
-
Protection against hardware trojan attacks: Towards a comprehensive solution
-
S. Bhunia, M. Abramovici, D. Agrawal, P. Bradley, M. Hsiao, J. Plusquellic, and M. Tehranipoor, "Protection against hardware trojan attacks: Towards a comprehensive solution", IEEE Des. Test, 2012.
-
(2012)
IEEE Des. Test
-
-
Bhunia, S.1
Abramovici, M.2
Agrawal, D.3
Bradley, P.4
Hsiao, M.5
Plusquellic, J.6
Tehranipoor, M.7
-
3
-
-
84893405499
-
A unified framework for multimodal submodular integrated circuits trojan detection
-
F. Koushanfar and A. Mirhoseini, "A unified framework for multimodal submodular integrated circuits trojan detection", IEEE TIFS, 2011.
-
(2011)
IEEE TIFS
-
-
Koushanfar, F.1
Mirhoseini, A.2
-
4
-
-
84893384573
-
A novel technique for improving hardware trojan detection and reducing trojan activation time
-
H. Salmani, M. Tehranipoor, and J. Plusquellic, "A novel technique for improving hardware trojan detection and reducing trojan activation time", IEEE TVLSI, 2012.
-
(2012)
IEEE TVLSI
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
5
-
-
79952511814
-
A layout-aware approach for improving localized switching to detect hardware trojans in integrated circuits
-
-, "A layout-aware approach for improving localized switching to detect hardware trojans in integrated circuits", in Proc. WIFS, 2010.
-
(2010)
Proc. WIFS
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
6
-
-
84863542771
-
Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry
-
S. Wei, K. Li, F. Koushanfar, and M. Potkonjak, "Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry", in Proc. DAC, 2012.
-
(2012)
Proc. DAC
-
-
Wei, S.1
Li, K.2
Koushanfar, F.3
Potkonjak, M.4
-
7
-
-
51849099113
-
At-speed delay characterization for ic authentication and trojan horse detection
-
J. Li and J. Lach, "At-speed delay characterization for ic authentication and trojan horse detection", in Proc. HOST, 2008.
-
(2008)
Proc. HOST
-
-
Li, J.1
Lach, J.2
-
8
-
-
84873052856
-
Improving ic security against trojan attacks through integration of security monitors
-
S. Narasimhan, W. Yueh, X. Wang, S. Mukhopadhyay, and S. Bhunia, "Improving ic security against trojan attacks through integration of security monitors", IEEE Des. Test, 2012.
-
(2012)
IEEE Des. Test
-
-
Narasimhan, S.1
Yueh, W.2
Wang, X.3
Mukhopadhyay, S.4
Bhunia, S.5
-
10
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
M. Hicks, M. Finnicum, S. King, M. Martin, and J. Smith, "Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically", in IEEE Symp. Security and Privacy, 2010.
-
(2010)
IEEE Symp. Security and Privacy
-
-
Hicks, M.1
Finnicum, M.2
King, S.3
Martin, M.4
Smith, J.5
-
11
-
-
84885663103
-
High-sensitivity hardware trojan detection using multimodal characterization
-
K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar, "High-sensitivity hardware trojan detection using multimodal characterization", in Proc. DATE, 2013.
-
(2013)
Proc. DATE
-
-
Hu, K.1
Nowroz, A.N.2
Reda, S.3
Koushanfar, F.4
-
12
-
-
84893357632
-
-
trust HUB.org, http://trust-hub.org/resources/benchmarks.
-
-
-
-
13
-
-
84864139345
-
Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage
-
M. Bilzor, T. Huffmire, C. Irvine, and T. Levin, "Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage", in Proc. HOST, 2012.
-
(2012)
Proc. HOST
-
-
Bilzor, M.1
Huffmire, T.2
Irvine, C.3
Levin, T.4
-
15
-
-
3843091851
-
Temperature-aware microarchitecture: Modeling and implementation
-
K. Skadron, M. Stan, K. Sankaranarayanan, W. Huang, S. Velusamy, and D. Tarjan, "Temperature-aware microarchitecture: Modeling and implementation", ACM TACO, 2004.
-
(2004)
ACM TACO
-
-
Skadron, K.1
Stan, M.2
Sankaranarayanan, K.3
Huang, W.4
Velusamy, S.5
Tarjan, D.6
-
16
-
-
77956210111
-
Adaptive and autonomous thermal tracking for high performance computing systems
-
Y. Zhang and A. Srivastava, "Adaptive and autonomous thermal tracking for high performance computing systems", in Proc. DAC, 2010.
-
(2010)
Proc. DAC
-
-
Zhang, Y.1
Srivastava, A.2
-
17
-
-
49749129652
-
Accurate temperature estimation for efficient thermal managemen
-
S. Sharifi, C. Liu, and T. Rosing, "Accurate temperature estimation for efficient thermal managemen", Proc. ISQED, 2008.
-
(2008)
Proc. ISQED
-
-
Sharifi, S.1
Liu, C.2
Rosing, T.3
-
18
-
-
84893350026
-
On-chip sensor-driven efficient thermal profile estimation algorithms
-
Y. Zhang, A. Srivastava, and M. Zahran, "On-chip sensor-driven efficient thermal profile estimation algorithms", ACM TODAES, 2010.
-
(2010)
ACM TODAES
-
-
Zhang, Y.1
Srivastava, A.2
Zahran, M.3
-
19
-
-
30344461960
-
The impact of technology scaling on lifetime reliability
-
J. Srinivasan, S. V. Adve, P. Bose, and J. A. Rivers, "The impact of technology scaling on lifetime reliability", in Proc. DNS, 2004.
-
(2004)
Proc. DNS
-
-
Srinivasan, J.1
Adve, S.V.2
Bose, P.3
Rivers, J.A.4
-
21
-
-
70350728954
-
Accurate temperature estimation using noisy thermal sensors
-
Y. Zhang and A. Srivastava, "Accurate temperature estimation using noisy thermal sensors", in Proc. DAC, 2009.
-
(2009)
Proc. DAC
-
-
Zhang, Y.1
Srivastava, A.2
-
22
-
-
77952254015
-
A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems
-
Y. Zhang, B. Shi, and A. Srivastava, "A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems", in Proc. ISPD, 2010.
-
(2010)
Proc. ISPD
-
-
Zhang, Y.1
Shi, B.2
Srivastava, A.3
-
23
-
-
80053191896
-
Statistical characterization of chip power behavior at post-fabrication stage
-
Y. Zhang and A. Srivastava, "Statistical characterization of chip power behavior at post-fabrication stage", in Proc. IGCC, 2011.
-
(2011)
Proc. IGCC
-
-
Zhang, Y.1
Srivastava, A.2
-
25
-
-
77957966770
-
Energy and thermal-aware video coding via encoder/decoder workload balancing
-
D. Forte and A. Srivastava, "Energy and thermal-aware video coding via encoder/decoder workload balancing", in Proc. ISLPED, 2010.
-
(2010)
Proc. ISLPED
-
-
Forte, D.1
Srivastava, A.2
-
26
-
-
80053199779
-
Leakage-aware kalman filter for accurate temperature tracking
-
Y. Zhang and A. Srivastava, "Leakage-aware kalman filter for accurate temperature tracking", in Proc. IGCC, 2011.
-
(2011)
Proc. IGCC
-
-
Zhang, Y.1
Srivastava, A.2
-
28
-
-
77952141870
-
A 1.2 v 10μw npn-based temperature sensor in 65nm cmos with an inaccuracy of ±0.2oc from -70°c to 125°c
-
F. Sebastiano, L. Breems, K. Makinwa, S. Drago, D. Leenaerts, and B. Nauta, "A 1.2 v 10μw npn-based temperature sensor in 65nm cmos with an inaccuracy of ±0.2oc from -70°c to 125°c", in Proc. ISSCC, 2010.
-
(2010)
Proc. ISSCC
-
-
Sebastiano, F.1
Breems, L.2
Makinwa, K.3
Drago, S.4
Leenaerts, D.5
Nauta, B.6
|