메뉴 건너뛰기




Volumn , Issue , 2013, Pages 532-539

Temperature tracking: An innovative run-time approach for hardware Trojan detection

Author keywords

[No Author keywords available]

Indexed keywords

FALSE POSITIVE; HARDWARE RESOURCES; HARDWARE TROJAN DETECTION; HARDWARE TROJANS; RUNTIMES; TEMPERATURE TRACKING; THERMAL SENSORS; TROJAN DETECTIONS;

EID: 84893407514     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAD.2013.6691167     Document Type: Conference Paper
Times cited : (120)

References (28)
  • 1
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware trojan taxonomy and detection
    • M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection", IEEE Des. Test, 2010.
    • (2010) IEEE Des. Test
    • Tehranipoor, M.1    Koushanfar, F.2
  • 3
    • 84893405499 scopus 로고    scopus 로고
    • A unified framework for multimodal submodular integrated circuits trojan detection
    • F. Koushanfar and A. Mirhoseini, "A unified framework for multimodal submodular integrated circuits trojan detection", IEEE TIFS, 2011.
    • (2011) IEEE TIFS
    • Koushanfar, F.1    Mirhoseini, A.2
  • 4
    • 84893384573 scopus 로고    scopus 로고
    • A novel technique for improving hardware trojan detection and reducing trojan activation time
    • H. Salmani, M. Tehranipoor, and J. Plusquellic, "A novel technique for improving hardware trojan detection and reducing trojan activation time", IEEE TVLSI, 2012.
    • (2012) IEEE TVLSI
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 5
    • 79952511814 scopus 로고    scopus 로고
    • A layout-aware approach for improving localized switching to detect hardware trojans in integrated circuits
    • -, "A layout-aware approach for improving localized switching to detect hardware trojans in integrated circuits", in Proc. WIFS, 2010.
    • (2010) Proc. WIFS
    • Salmani, H.1    Tehranipoor, M.2    Plusquellic, J.3
  • 6
    • 84863542771 scopus 로고    scopus 로고
    • Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry
    • S. Wei, K. Li, F. Koushanfar, and M. Potkonjak, "Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry", in Proc. DAC, 2012.
    • (2012) Proc. DAC
    • Wei, S.1    Li, K.2    Koushanfar, F.3    Potkonjak, M.4
  • 7
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for ic authentication and trojan horse detection
    • J. Li and J. Lach, "At-speed delay characterization for ic authentication and trojan horse detection", in Proc. HOST, 2008.
    • (2008) Proc. HOST
    • Li, J.1    Lach, J.2
  • 8
    • 84873052856 scopus 로고    scopus 로고
    • Improving ic security against trojan attacks through integration of security monitors
    • S. Narasimhan, W. Yueh, X. Wang, S. Mukhopadhyay, and S. Bhunia, "Improving ic security against trojan attacks through integration of security monitors", IEEE Des. Test, 2012.
    • (2012) IEEE Des. Test
    • Narasimhan, S.1    Yueh, W.2    Wang, X.3    Mukhopadhyay, S.4    Bhunia, S.5
  • 10
    • 77955218749 scopus 로고    scopus 로고
    • Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
    • M. Hicks, M. Finnicum, S. King, M. Martin, and J. Smith, "Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically", in IEEE Symp. Security and Privacy, 2010.
    • (2010) IEEE Symp. Security and Privacy
    • Hicks, M.1    Finnicum, M.2    King, S.3    Martin, M.4    Smith, J.5
  • 11
    • 84885663103 scopus 로고    scopus 로고
    • High-sensitivity hardware trojan detection using multimodal characterization
    • K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar, "High-sensitivity hardware trojan detection using multimodal characterization", in Proc. DATE, 2013.
    • (2013) Proc. DATE
    • Hu, K.1    Nowroz, A.N.2    Reda, S.3    Koushanfar, F.4
  • 12
    • 84893357632 scopus 로고    scopus 로고
    • trust HUB.org, http://trust-hub.org/resources/benchmarks.
  • 13
    • 84864139345 scopus 로고    scopus 로고
    • Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage
    • M. Bilzor, T. Huffmire, C. Irvine, and T. Levin, "Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage", in Proc. HOST, 2012.
    • (2012) Proc. HOST
    • Bilzor, M.1    Huffmire, T.2    Irvine, C.3    Levin, T.4
  • 16
    • 77956210111 scopus 로고    scopus 로고
    • Adaptive and autonomous thermal tracking for high performance computing systems
    • Y. Zhang and A. Srivastava, "Adaptive and autonomous thermal tracking for high performance computing systems", in Proc. DAC, 2010.
    • (2010) Proc. DAC
    • Zhang, Y.1    Srivastava, A.2
  • 17
    • 49749129652 scopus 로고    scopus 로고
    • Accurate temperature estimation for efficient thermal managemen
    • S. Sharifi, C. Liu, and T. Rosing, "Accurate temperature estimation for efficient thermal managemen", Proc. ISQED, 2008.
    • (2008) Proc. ISQED
    • Sharifi, S.1    Liu, C.2    Rosing, T.3
  • 18
    • 84893350026 scopus 로고    scopus 로고
    • On-chip sensor-driven efficient thermal profile estimation algorithms
    • Y. Zhang, A. Srivastava, and M. Zahran, "On-chip sensor-driven efficient thermal profile estimation algorithms", ACM TODAES, 2010.
    • (2010) ACM TODAES
    • Zhang, Y.1    Srivastava, A.2    Zahran, M.3
  • 19
  • 20
    • 0346750528 scopus 로고    scopus 로고
    • Battery modeling for energy aware system design
    • R. Rao, S. Vrudhula, and D. N. Rakhmatov, "Battery modeling for energy aware system design", Computer, 2003.
    • (2003) Computer
    • Rao, R.1    Vrudhula, S.2    Rakhmatov, D.N.3
  • 21
    • 70350728954 scopus 로고    scopus 로고
    • Accurate temperature estimation using noisy thermal sensors
    • Y. Zhang and A. Srivastava, "Accurate temperature estimation using noisy thermal sensors", in Proc. DAC, 2009.
    • (2009) Proc. DAC
    • Zhang, Y.1    Srivastava, A.2
  • 22
    • 77952254015 scopus 로고    scopus 로고
    • A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems
    • Y. Zhang, B. Shi, and A. Srivastava, "A statistical framework for designing on-chip thermal sensing infrastructure in nano-scale systems", in Proc. ISPD, 2010.
    • (2010) Proc. ISPD
    • Zhang, Y.1    Shi, B.2    Srivastava, A.3
  • 23
    • 80053191896 scopus 로고    scopus 로고
    • Statistical characterization of chip power behavior at post-fabrication stage
    • Y. Zhang and A. Srivastava, "Statistical characterization of chip power behavior at post-fabrication stage", in Proc. IGCC, 2011.
    • (2011) Proc. IGCC
    • Zhang, Y.1    Srivastava, A.2
  • 25
    • 77957966770 scopus 로고    scopus 로고
    • Energy and thermal-aware video coding via encoder/decoder workload balancing
    • D. Forte and A. Srivastava, "Energy and thermal-aware video coding via encoder/decoder workload balancing", in Proc. ISLPED, 2010.
    • (2010) Proc. ISLPED
    • Forte, D.1    Srivastava, A.2
  • 26
    • 80053199779 scopus 로고    scopus 로고
    • Leakage-aware kalman filter for accurate temperature tracking
    • Y. Zhang and A. Srivastava, "Leakage-aware kalman filter for accurate temperature tracking", in Proc. IGCC, 2011.
    • (2011) Proc. IGCC
    • Zhang, Y.1    Srivastava, A.2
  • 28
    • 77952141870 scopus 로고    scopus 로고
    • A 1.2 v 10μw npn-based temperature sensor in 65nm cmos with an inaccuracy of ±0.2oc from -70°c to 125°c
    • F. Sebastiano, L. Breems, K. Makinwa, S. Drago, D. Leenaerts, and B. Nauta, "A 1.2 v 10μw npn-based temperature sensor in 65nm cmos with an inaccuracy of ±0.2oc from -70°c to 125°c", in Proc. ISSCC, 2010.
    • (2010) Proc. ISSCC
    • Sebastiano, F.1    Breems, L.2    Makinwa, K.3    Drago, S.4    Leenaerts, D.5    Nauta, B.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.