-
3
-
-
84904977524
-
Inquiry into counterfeit electronic parts in the department of defense supply chain
-
112th Congress
-
112th Congress, Inquiry into counterfeit electronic parts in the department of defense supply chain, Senate Report of the Committee on Armed Services, 2012
-
(2012)
Senate Report of the Committee on Armed Services
-
-
-
6
-
-
84884470487
-
-
Online]. Available
-
A. Huang, Hacking the PIC 18F1320, 2007. [Online]. Available: Http://www. bunniestudios.com/blog/?page-id=40
-
(2007)
Hacking the PIC 18F1320
-
-
Huang, A.1
-
7
-
-
63349107480
-
-
Office of the Under Secretary of Defense For Acquisition, Technology, Logistics Online]. Available
-
Office of the Under Secretary of Defense For Acquisition, Technology, Logistics, Defense Science Board (DSB) study on high performance microchip supply, 2005. [Online]. Available: Www.acq.osd.mil/dsb/ reports/ADA435563.pdf
-
(2005)
Defense Science Board (DSB) Study on High Performance Microchip Supply
-
-
-
8
-
-
77958126199
-
EPIC: Ending piracy of integrated circuits
-
Oct
-
J. Roy, F. Koushanfar, and I. Markov, EPIC: Ending piracy of integrated circuits, IEEE Computer, vol. 43, no. 10, pp. 30-38, Oct. 2010
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 30-38
-
-
Roy, J.1
Koushanfar, F.2
Markov, I.3
-
9
-
-
80052678520
-
The state-of-The-Art in semiconductor reverse engineering
-
R. Torrance and D. James, The state-of-The-Art in semiconductor reverse engineering, in Proc. IEEE/ACM Design Autom. Conf., 2011, pp. 333-338
-
(2011)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 333-338
-
-
Torrance, R.1
James, D.2
-
10
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Adv. Cryptol., pp. 388-397, 1999
-
(1999)
Adv. Cryptol
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
11
-
-
84863550104
-
Can EDA combat the rise of electronic counterfeiting?
-
F. Koushanfar et al., Can EDA combat the rise of electronic counterfeiting? in Proc. IEEE/ACM Design Autom. Conf., 2012, pp. 133-138
-
(2012)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 133-138
-
-
Koushanfar, F.1
-
13
-
-
84893404410
-
Hardware security: Threat models and metrics
-
M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri, Hardware security: Threat models and metrics, in Proc. Int. Conf. Comput.-Aided Design, 2013, pp. 819-823
-
(2013)
Proc. Int. Conf. Comput.-Aided Design
, pp. 819-823
-
-
Rostami, M.1
Koushanfar, F.2
Rajendran, J.3
Karri, R.4
-
14
-
-
79951821310
-
A unified framework for multimodal submodular integrated circuits trojan detection
-
Mar
-
F. Koushanfar and A. Mirhoseini, A unified framework for multimodal submodular integrated circuits trojan detection, IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 162-174, Mar. 2011
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 162-174
-
-
Koushanfar, F.1
Mirhoseini, A.2
-
15
-
-
77958115258
-
Trustworthy hardware: Identifying and classifying hardware trojans
-
Oct
-
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Trustworthy hardware: Identifying and classifying hardware trojans, IEEE Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 39-46
-
-
Karri, R.1
Rajendran, J.2
Rosenfeld, K.3
Tehranipoor, M.4
-
16
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
Jan./Feb
-
M. Tehranipoor and F. Koushanfar, A survey of hardware trojan taxonomy and detection, IEEE Design Test Comput., vol. 27, no. 1, pp. 10-25, Jan./Feb. 2010
-
(2010)
IEEE Design Test Comput
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
17
-
-
84855938090
-
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
-
Mar
-
E. Love, Y. Jin, and Y. Makris, Proof-carrying hardware intellectual property: A pathway to trusted module acquisition, IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 25-40, Mar. 2012
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 25-40
-
-
Love, E.1
Jin, Y.2
Makris, Y.3
-
19
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
M. Hicks, M. Finnicum, S. T. King, M. M. Martin, and J. M. Smith, Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically, in Proc. IEEE Symp. Security Privacy, 2010, pp. 159-172
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 159-172
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.4
Smith, J.M.5
-
20
-
-
80051957441
-
Defeating UCI: Building stealthy and malicious hardware
-
C. Sturton, M. Hicks, D. Wagner, and S. T. King, Defeating UCI: Building stealthy and malicious hardware, in Proc. IEEE Symp. Security Privacy, 2011, pp. 64-77
-
(2011)
Proc. IEEE Symp. Security Privacy
, pp. 64-77
-
-
Sturton, C.1
Hicks, M.2
Wagner, D.3
King, S.T.4
-
21
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
DOI 10.1109/SP.2007.36, 4223234, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan detection using IC fingerprinting, in Proc. IEEE Symp. Security Privacy, 2007, pp. 296-310 (Pubitemid 47432536)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
22
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware trojans
-
R. M. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic, Power supply signal calibration techniques for improving detection resolution to hardware trojans, in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, 2008, pp. 632-639
-
(2008)
Proc. IEEE/ ACM Int. Conf. Comput.-Aided Design
, pp. 632-639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
24
-
-
70350733802
-
Hardware Trojan horse detection using gate-level characterization
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, Hardware Trojan horse detection using gate-level characterization, in Proc. IEEE/ACM Design Autom. Conf., 2009, pp. 688-693
-
(2009)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
26
-
-
84885663103
-
High-sensitivity hardware trojan detection using multimodal characterization
-
K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar, High-sensitivity hardware trojan detection using multimodal characterization, in Proc. IEEE Design Autom. Test Eur. Conf. Exhibit., 2013, pp. 1271-1276
-
(2013)
Proc. IEEE Design Autom. Test Eur. Conf. Exhibit
, pp. 1271-1276
-
-
Hu, K.1
Nowroz, A.N.2
Reda, S.3
Koushanfar, F.4
-
27
-
-
77955216190
-
HARPOON: An obfuscation-based SoC design methodology for hardware protection
-
Oct
-
R. Chakraborty and S. Bhunia, HARPOON: An obfuscation-based SoC design methodology for hardware protection, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 28, no. 10, pp. 1493-1502, Oct. 2009
-
(2009)
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst
, vol.28
, Issue.10
, pp. 1493-1502
-
-
Chakraborty, R.1
Bhunia, S.2
-
28
-
-
0031619176
-
Watermarking techniques for intellectual property protection
-
A. Kahng et al., Watermarking techniques for intellectual property protection, in Proc. IEEE/ACM Design Autom. Conf., 1998, pp. 776-781
-
(1998)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 776-781
-
-
Kahng, A.1
-
29
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. Alkabani and F. Koushanfar, Active hardware metering for intellectual property protection and security, in Proc. 16th USENIX Security Symp., 2007, pp. 291-306
-
(2007)
Proc. 16th USENIX Security Symp
, pp. 291-306
-
-
Alkabani, Y.1
Koushanfar, F.2
-
30
-
-
33745218297
-
Behavioral synthesis techniques for intellectual property protection
-
DOI 10.1145/1080334.1080338
-
F. Koushanfar, I. Hong, and M. Potkonjak, Behavioral synthesis techniques for intellectual property protection, ACM Trans. Design Autom. Electron. Syst., vol. 10, no. 3, pp. 523-545, 2005 (Pubitemid 43906372)
-
(2005)
ACM Transactions on Design Automation of Electronic Systems
, vol.10
, Issue.3
, pp. 523-545
-
-
Koushanfar, F.1
Hong, I.2
Potkonjak, M.3
-
31
-
-
0031635593
-
Robust IP watermarking methodologies for physical design
-
A. Kahng et al., Robust IP watermarking methodologies for physical design, in Proc. IEEE/ACM Design Autom. Conf., 1998, pp. 782-787
-
(1998)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 782-787
-
-
Kahng, A.1
-
32
-
-
0031633026
-
FPGA fingerprinting techniques for protecting intellectual property
-
J. Lach, W. Mangione-Smith, and M. Potkonjak, FPGA fingerprinting techniques for protecting intellectual property, in Proc. IEEE Custom Integr. Circuits Conf., 1998, pp. 299-302
-
(1998)
Proc. IEEE Custom Integr. Circuits Conf
, pp. 299-302
-
-
Lach, J.1
Mangione-Smith, W.2
Potkonjak, M.3
-
33
-
-
0034841393
-
Watermarking graph partitioning solutions
-
G. Wolfe, J. L. Wong, and M. Potkonjak, Watermarking graph partitioning solutions, in Proc. IEEE/ACM Design Autom. Conf., 2001, pp. 486-489 (Pubitemid 32841002)
-
(2001)
Proceedings - Design Automation Conference
, pp. 486-489
-
-
Wolfe, G.1
Wong, J.L.2
Potkonjak, M.3
-
34
-
-
0029354779
-
Recent directions in netlist partitioning
-
C. Alpert and A. Kahng, Recent directions in netlist partitioning, Integration, VLSI J., vol. 19, no. 1-2, pp. 1-81, 1995
-
(1995)
Integration VLSI J.
, vol.19
, Issue.1-2
, pp. 1-81
-
-
Alpert, C.1
Kahng, A.2
-
36
-
-
1242286077
-
Effective iterative techniques for fingerprinting design IP
-
Feb
-
A. Caldwell et al., Effective iterative techniques for fingerprinting design IP, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 23, no. 2, pp. 208-215, Feb. 2004
-
(2004)
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst
, vol.23
, Issue.2
, pp. 208-215
-
-
Caldwell, A.1
-
38
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
Sep
-
D. Holcomb, W. Burleson, and K. Fu, Power-up SRAM state as an identifying fingerprint and source of true random numbers, IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009
-
(2009)
IEEE Trans. Comput
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
39
-
-
84988439150
-
-
Defense Advanced Research Projects Agency (DARPA)), Microsystems Technology Office/MTO Broad Agency Announcement
-
Defense Advanced Research Projects Agency (DARPA), Supply Chain Hardware Integrity for Electronics Defense (SHIELD), Microsystems Technology Office/MTO Broad Agency Announcement, 2014
-
(2014)
Supply Chain Hardware Integrity for Electronics Defense (SHIELD
-
-
-
41
-
-
84904854695
-
Robust and reverse-engineering resilient puf authentication and key-exchange by substring matching
-
Mar
-
M. Rostami, M. Majzoobi, F. Koushanfar, D. Wallach, and S. Devadas, Robust and reverse-engineering resilient puf authentication and key-exchange by substring matching, IEEE Trans. Emerging Topics Comput., vol. 2, no. 1, pp. 37-49, Mar. 2014
-
(2014)
IEEE Trans. Emerging Topics Comput
, vol.2
, Issue.1
, pp. 37-49
-
-
Rostami, M.1
Majzoobi, M.2
Koushanfar, F.3
Wallach, D.4
Devadas, S.5
-
42
-
-
56749170623
-
Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
-
Berlin, Germany: Springer-Verlag
-
Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, Trusted integrated circuits: A nondestructive hidden characteristics extraction approach, Information Hiding, ser. Lecture Notes in Computer Science, Berlin, Germany: Springer-Verlag, 2008, vol. 5284, pp. 102-117
-
(2008)
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.5284
, pp. 102-117
-
-
Alkabani, Y.1
Koushanfar, F.2
Kiyavash, N.3
Potkonjak, M.4
-
43
-
-
84864138410
-
-
New York, NY, USA: Springer-Verlag
-
U. Ruhrmair, S. Devadas, and F. Koushanfar, Security based on physical unclonability and disorder Introduction to Hardware Security and Trust. New York, NY, USA: Springer-Verlag, 2011
-
(2011)
Security Based on Physical Unclonability and Disorder Introduction to Hardware Security and Trust
-
-
Ruhrmair, U.1
Devadas, S.2
Koushanfar, F.3
-
44
-
-
84863542083
-
Security analysis of logic obfuscation
-
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, Security analysis of logic obfuscation, in Proc. IEEE/ACM Design Autom. Conf., 2012, pp. 83-89
-
(2012)
Proc. IEEE/ ACM Design Autom. Conf
, pp. 83-89
-
-
Rajendran, J.1
Pino, Y.2
Sinanoglu, O.3
Karri, R.4
-
45
-
-
76949085013
-
Preventing IC piracy using reconfigurable logic barriers
-
Jan./Feb
-
A. Baumgarten, A. Tyagi, and J. Zambreno, Preventing IC piracy using reconfigurable logic barriers, IEEE Design Test Comput., vol. 27, no. 1, pp. 66-75, Jan./Feb. 2010
-
(2010)
IEEE Design Test Comput
, vol.27
, Issue.1
, pp. 66-75
-
-
Baumgarten, A.1
Tyagi, A.2
Zambreno, J.3
-
46
-
-
49749144533
-
Remote activation of ICs for piracy prevention and digital right management
-
Y. Alkabani, F. Koushanfar, and M. Potkonjak, Remote activation of ICs for piracy prevention and digital right management, in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, 2007, pp. 674-677
-
(2007)
Proc. IEEE/ ACM Int. Conf. Comput.-Aided Design
, pp. 674-677
-
-
Alkabani, Y.1
Koushanfar, F.2
Potkonjak, M.3
-
47
-
-
77950007695
-
RTL hardware IP protection using key-based control and data flow obfuscation
-
R. Chakraborty and S. Bhunia, RTL hardware IP protection using key-based control and data flow obfuscation, in Proc. IEEE Int. Conf. VLSI Design, 2010, pp. 405-410
-
(2010)
Proc. IEEE Int. Conf. VLSI Design
, pp. 405-410
-
-
Chakraborty, R.1
Bhunia, S.2
-
49
-
-
76349087817
-
Security against hardware trojan through a novel application of design obfuscation
-
R. Chakraborty and S. Bhunia, Security against hardware trojan through a novel application of design obfuscation, in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, 2009, pp. 113-116
-
(2009)
Proc. IEEE/ ACM Int. Conf. Comput.-Aided Design
, pp. 113-116
-
-
Chakraborty, R.1
Bhunia, S.2
-
51
-
-
84855943309
-
Provably secure active IC metering techniques for piracy avoidance and digital rights management
-
Feb
-
F. Koushanfar, Provably secure active IC metering techniques for piracy avoidance and digital rights management, IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 51-63, Feb. 2012
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 51-63
-
-
Koushanfar, F.1
-
52
-
-
84947210876
-
Intellectual property metering
-
Information Hiding
-
F. Koushanfar, G. Qu, and M. Potkonjak, Intellectual property metering, in Proc. Inf. Hiding Workshop, 2001, pp. 81-95 (Pubitemid 33367660)
-
(2001)
Lecture Notes In Computer Science
, Issue.2137
, pp. 81-95
-
-
Koushanfar, F.1
Qu, G.2
Potkonjak, M.3
-
53
-
-
84904958141
-
-
Intelligence Advanced Research Projects Activity (IARPA). [Online]. Available
-
Intelligence Advanced Research Projects Activity (IARPA), Trusted integrated circuits program, 2011. [Online]. Available: Https://www.fbo.gov/ utils/view?id= b8be3d2c5d5babbdffc6975c370247a6
-
(2011)
Trusted Integrated Circuits Program
-
-
-
55
-
-
84892644407
-
A split-foundry asynchronous FPGA
-
DOI: 10.1109/CICC.2013.6658536
-
B. Hill, R. Karmazin, C. Otero, J. Tse, and R. Manohar, A split-foundry asynchronous FPGA, in Proc. IEEE Custom Integr. Circuits Conf., 2013, DOI: 10.1109/CICC.2013.6658536
-
(2013)
Proc. IEEE Custom Integr. Circuits Conf
-
-
Hill, B.1
Karmazin, R.2
Otero, C.3
Tse, J.4
Manohar, R.5
-
57
-
-
84862094399
-
Logic encryption: A fault analysis perspective
-
J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri, Logic encryption: A fault analysis perspective, in Proc. IEEE Design Autom. Test Eur. Conf. Exhibit., 2012, pp. 953-958
-
(2012)
Proc. IEEE Design Autom. Test Eur. Conf. Exhibit
, pp. 953-958
-
-
Rajendran, J.1
Pino, Y.2
Sinanoglu, O.3
Karri, R.4
-
58
-
-
84889039676
-
-
Chipworks. [Online]. Available
-
Chipworks, Intels 22-nm tri-gate transistors exposed, 2012. [Online]. Available: Http://www.chipworks.com/blog/ technologyblog/2012/04/23/intels-22- nmtri-gate-Transistors-exposed/.
-
(2012)
Intels 22-nm Tri-gate Transistors Exposed
-
-
-
59
-
-
84885628242
-
-
Defense Advanced Research Projects Agency (DARPA) [Online]. Available
-
Defense Advanced Research Projects Agency (DARPA), Integrity and reliability of integrated circuits (IRIS), 2012. [Online]. Available: Http://www.darpa.mil/Our- Work/MTO/Programs/Integrity-and- ReliabilityofI ntegratedCircuits-.
-
(2012)
Integrity and Reliability of Integrated Circuits (IRIS)
-
-
-
61
-
-
84889036860
-
-
Chipworks. [Online]. Available
-
Chipworks, Reverse engineering software. [Online]. Available: Http://www.chipworks. com/en/technical-competitive-Analysis/ resources/reverse-engineering-software
-
Reverse Engineering Software
-
-
-
62
-
-
84904977519
-
-
Online]. Available
-
Degate. [Online]. Available: Http://www. degate.org/documentation/
-
Degate
-
-
-
64
-
-
0033359923
-
Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
-
DOI 10.1109/54.785838
-
M. Hansen, H. Yalcin, and J. Hayes, Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering, IEEE Design Test Comput., vol. 16, no. 3, pp. 72-80, May/Jun. 1999 (Pubitemid 30497933)
-
(1999)
IEEE Design and Test of Computers
, vol.16
, Issue.3
, pp. 72-80
-
-
Hansen, M.C.1
Yalcin, H.2
Hayes, J.P.3
-
65
-
-
84864117075
-
Reverse engineering circuits using behavioral pattern mining
-
W. Li, Z. Wasson, and S. Seshia, Reverse engineering circuits using behavioral pattern mining, in Proc. IEEE Int. Symp. Hardware-Oriented Security Trust, 2012, pp. 83-88
-
(2012)
Proc. IEEE Int. Symp. Hardware-Oriented Security Trust
, pp. 83-88
-
-
Li, W.1
Wasson, Z.2
Seshia, S.3
-
66
-
-
84885590301
-
Reverse engineering digital circuits using functional analysis
-
P. Subramanyan et al., Reverse engineering digital circuits using functional analysis, in Proc. IEEE Design Autom. Test Eur. Conf. Exhibit., 2013, pp. 1277-1280
-
(2013)
Proc. IEEE Design Autom. Test Eur. Conf. Exhibit
, pp. 1277-1280
-
-
Subramanyan, P.1
-
68
-
-
84889045731
-
-
U.S. Patent 2012 0 139 582
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, and B. J. Wang, Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing, U.S. Patent 2012 0 139 582, 2012
-
(2012)
Method and Apparatus for Camouflaging A Standard Cell Based Integrated Circuit with Micro Circuits and Post Processing
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Wang, B.J.4
-
69
-
-
84889036301
-
-
U.S. Patent 8 111 089
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, Building block for a secure CMOS logic cell library, U.S. Patent 8 111 089, 2012
-
(2012)
Building Block for A Secure CMOS Logic Cell Library
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Ouyang, P.4
Wang, B.J.5
-
71
-
-
84888995535
-
-
U.S. Patent 8fvn1 151 235
-
J. P. Baukus, L. W. Chow, R. P. Cocchi, P. Ouyang, and B. J. Wang, Camouflaging a standard cell based integrated circuit, U.S. Patent 8 151 235, 2012
-
(2012)
Camouflaging A Standard Cell Based Integrated Circuit
-
-
Baukus, J.P.1
Chow, L.W.2
Cocchi, R.P.3
Ouyang, P.4
Wang, B.J.5
-
72
-
-
84889058172
-
Security analysis of integrated circuit camouflaging
-
J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, Security analysis of integrated circuit camouflaging, in Proc. ACM Conf. Comput. Commun. Security, 2013, pp. 709-720
-
(2013)
Proc. ACM Conf. Comput. Commun. Security
, pp. 709-720
-
-
Rajendran, J.1
Sam, M.2
Sinanoglu, O.3
Karri, R.4
-
73
-
-
84891544717
-
VLSI testing based security metric for IC camouflaging
-
DOI: 10.1109/TEST.2013.6651879
-
J. Rajendran, O. Sinanoglu, and R. Karri, VLSI testing based security metric for IC camouflaging, in Proc. IEEE Int. Test Conf., 2013, DOI: 10.1109/TEST.2013.6651879
-
(2013)
Proc. IEEE Int. Test Conf
-
-
Rajendran, J.1
Sinanoglu, O.2
Karri, R.3
-
74
-
-
84879411386
-
-
New York, NY, USA: Springer-Verlag
-
P. Rohatgi, Improved techniques for side-channel analysis, Cryptographic Engineering. New York, NY, USA: Springer-Verlag, 2009, pp. 381-406
-
(2009)
Improved Techniques for Side-channel Analysis, Cryptographic Engineering
, pp. 381-406
-
-
Rohatgi, P.1
-
76
-
-
77957992139
-
A tutorial on physical security and side-channel attacks
-
Berlin Germany: Springer-Verlag
-
F. Koeune and F.-X. Standaert, A tutorial on physical security and side-channel attacks Foundations of Security Analysis and Design III. Berlin, Germany: Springer-Verlag, 2005, pp. 78-108
-
(2005)
Foundations of Security Analysis and Design III
, pp. 78-108
-
-
Koeune, F.1
Standaert, F.-X.2
-
77
-
-
84872320834
-
Electromagnetic attacks and countermeasures
-
Berlin Germany: Springer-Verlag
-
P. Rohatgi, Electromagnetic attacks and countermeasures, Cryptographic Engineering. Berlin, Germany: Springer-Verlag, 2009, pp. 407-430
-
(2009)
Cryptographic Engineering
, pp. 407-430
-
-
Rohatgi, P.1
-
78
-
-
84883678715
-
Simple photonic emission analysis of AES
-
A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, and J.-P. Seifert, Simple photonic emission analysis of AES, J. Cryptogr. Eng., vol. 3, no. 1, pp. 3-15, 2013
-
(2013)
J. Cryptogr. Eng
, vol.3
, Issue.1
, pp. 3-15
-
-
Schlösser, A.1
Nedospasov, D.2
Krämer, J.3
Orlic, S.4
Seifert, J.-P.5
-
80
-
-
31344443130
-
The sorcerer's apprentice guide to fault attacks
-
DOI 10.1109/JPROC.2005.862424
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The sorcerers apprentice guide to fault attacks, Proc. IEEE, vol. 94, no. 2, pp. 370-382, Feb. 2006 (Pubitemid 43145991)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 370-382
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
81
-
-
18144420462
-
Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard
-
12.2, Proceedings - International Test Conference 2004
-
B. Yang, K. Wu, and R. Karri, Scan based side channel attack on dedicated hardware implementations of data encryption standard, in Proc. Int. Test Conf., 2004, pp. 339-344 (Pubitemid 40610032)
-
(2004)
Proceedings - International Test Conference
, pp. 339-344
-
-
Yang, B.1
Wu, K.2
Karri, R.3
-
82
-
-
36248952114
-
Securing designs against scan-based side-channel attacks
-
DOI 10.1109/TDSC.2007.70215
-
J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, Securing designs against scan-based side-channel attacks, IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 325-336, Oct.-Dec. 2007 (Pubitemid 350125897)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 325-336
-
-
Lee, J.1
Tehranipoor, M.2
Patel, C.3
Plusquellic, J.4
-
83
-
-
58549091532
-
Scan based side channel attacks on stream ciphers and their counter-measures
-
M. Agrawal, S. Karmakar, D. Saha, and D. Mukhopadhyay, Scan based side channel attacks on stream ciphers and their counter-measures, in Proc. INDOCRYPT, 2008, pp. 226-238
-
(2008)
Proc. INDOCRYPT
, pp. 226-238
-
-
Agrawal, M.1
Karmakar, S.2
Saha, D.3
Mukhopadhyay, D.4
-
84
-
-
85037371734
-
Side-channel analysis of PUFs and fuzzy extractors
-
New York NY USA: Springer-Verlag
-
D. Merli, D. Schuster, F. Stumpf, and G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, Trust and Trustworthy Computing. New York, NY, USA: Springer-Verlag, 2011, pp. 33-47
-
(2011)
Trust and Trustworthy Computing
, pp. 33-47
-
-
Merli, D.1
Schuster, D.2
Stumpf, F.3
Sigl, G.4
-
85
-
-
84899905957
-
Power and timing side channels for PUFs and their efficient exploitation
-
U. Rührmair et al., Power and timing side channels for PUFs and their efficient exploitation, Cryptology ePrint Archive, Rep. 2013/851, 2013
-
(2013)
Cryptology EPrint Archive Rep. 2013/851
-
-
Rührmair, U.1
-
86
-
-
79952517250
-
Differential template attacks on PUF enabled cryptographic devices
-
DOI: 10.1109/WIFS.2010.5711445
-
D. Karakoyunlu and B. Sunar, Differential template attacks on PUF enabled cryptographic devices, in Proc. Int. Workshop Inf. Forensics Security, 2010, DOI: 10.1109/WIFS.2010.5711445
-
(2010)
Proc. Int. Workshop Inf. Forensics Security
-
-
Karakoyunlu, D.1
Sunar, B.2
-
87
-
-
84899934434
-
Combined modeling and side channel attacks on strong PUFs
-
[Online]. Available
-
A. Mahmoud, U. Rührmair, M. Majzoobi, and F. Koushanfar, Combined modeling and side channel attacks on strong PUFs, Cryptology ePrint Archivetx, Rep. 2013/632, 2013. [Online]. Available: Http://eprint.iacr.org/.
-
(2013)
Cryptology EPrint Archivetx Rep. 2013/632
-
-
Mahmoud, A.1
Rührmair, U.2
Majzoobi, M.3
Koushanfar, F.4
-
88
-
-
67650696756
-
An information-Theoretic model for adaptive side-channel attacks
-
B. Kopf and D. Basin, An information-Theoretic model for adaptive side-channel attacks, in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 286-296
-
(2007)
Proc. ACM Conf. Comput. Commun. Security
, pp. 286-296
-
-
Kopf, B.1
Basin, D.2
-
89
-
-
0035275354
-
Secure contactless smartcard ASIC with DPA protection
-
DOI 10.1109/4.910496, PII S0018920001014408
-
P. Rakers, L. Connell, T. Collins, and D. Russell, Secure contactless smartcard ASIC with DPA protection, J. Solid-State Circuits, vol. 36, no. 3, pp. 559-565, Mar. 2001 (Pubitemid 32302998)
-
(2001)
IEEE Journal of Solid-State Circuits
, vol.36
, Issue.3
, pp. 559-565
-
-
Rakers, P.1
Connell, L.2
Collins, T.3
Russell, D.4
-
90
-
-
84893732023
-
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
-
K. Tiri, M. Akmal, and I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Proc. Eur. Solid-State Circuits Conf., 2002, pp. 403-406
-
(2002)
Proc. Eur. Solid-State Circuits Conf
, pp. 403-406
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
91
-
-
0041325255
-
Balanced self-checking asynchronous logic for smart card applications
-
S. Moore, R. Anderson, R. Mullins, G. Taylor, and J. J. Fournier, Balanced self-checking asynchronous logic for smart card applications, Microprocess. Microsyst., vol. 27, no. 9, pp. 421-430, 2003
-
(2003)
Microprocess. Microsyst
, vol.27
, Issue.9
, pp. 421-430
-
-
Moore, S.1
Anderson, R.2
Mullins, R.3
Taylor, G.4
Fournier, J.J.5
-
92
-
-
33646419370
-
A dynamic current mode logic to counteract power analysis attacks
-
F. Mace, F.-X. Standaert, I. Hassoune, J.-D. Legat, and J.-J. Quisquater, A dynamic current mode logic to counteract power analysis attacks, in Proc. Int. Conf. Design Circuits Integr. Syst., 2004, pp. 186-191
-
(2004)
Proc. Int. Conf. Design Circuits Integr. Syst
, pp. 186-191
-
-
Mace, F.1
Standaert, F.-X.2
Hassoune, I.3
Legat, J.-D.4
Quisquater, J.-J.5
-
94
-
-
84893402156
-
Basics of side-channel analysis
-
Berlin Germany: Springer-Verlag
-
M. Joye, Basics of side-channel analysis, Cryptographic Engineering. Berlin, Germany: Springer-Verlag, 2009, pp.365-380
-
(2009)
Cryptographic Engineering
, pp. 365-380
-
-
Joye, M.1
-
95
-
-
84859464971
-
Introduction to differential power analysis
-
P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, Introduction to differential power analysis, J. Cryptogr. Eng., vol. 1, no. 1, pp. 5-27, 2011
-
(2011)
J. Cryptogr. Eng
, vol.1
, Issue.1
, pp. 5-27
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
Rohatgi, P.4
-
96
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
C. Clavier, J.-S. Coron, and N. Dabbous, Differential power analysis in the presence of hardware countermeasures, Cryptographic Hardware and Embedded Systems, vol. 1965. Berlin, Germany: Springer-Verlag, 2000, pp. 252-263, ser. Lecture Notes in Computer Science (Pubitemid 33213973)
-
(2000)
Lecture Notes In Computer Science
, Issue.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
98
-
-
84864833517
-
Side-channel vulnerability factor: A metric for measuring information leakage
-
J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, Side-channel vulnerability factor: A metric for measuring information leakage, in Proc. IEEE Int. Symp. Comput. Architect., 2012, pp. 106-117
-
(2012)
Proc. IEEE Int. Symp. Comput. Architect
, pp. 106-117
-
-
Demme, J.1
Martin, R.2
Waksman, A.3
Sethumadhavan, S.4
-
99
-
-
72449205531
-
Signature schemes with bounded leakage resilience
-
Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
-
J. Katz and V. Vaikuntanathan, Signature schemes with bounded leakage resilience, Advances in Cryptology, vol. 5912. Berlin, Germany: Springer-Verlag, 2009, pp. 703-720, ser. Lecture Notes in Computer Science
-
(2009)
Advances in Cryptology
, vol.5912
, pp. 703-720
-
-
Katz, J.1
Vaikuntanathan, V.2
-
100
-
-
78650013814
-
Practical leakage-resilient pseudorandom generators
-
Y. Yu, F.-X. Standaert, O. Pereira, and M. Yung, Practical leakage-resilient pseudorandom generators, in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 141-151
-
(2010)
Proc. ACM Conf. Comput. Commun. Security
, pp. 141-151
-
-
Yu, Y.1
Standaert, F.-X.2
Pereira, O.3
Yung, M.4
-
101
-
-
84998557355
-
Leakage resilient cryptography in practice
-
Berlin Germany: Springer-Verlag, ser. Information Security and Cryptography
-
F.-X. Standaert, O. Pereira, Y. Yu, J.-J. Quisquater, M. Yung, and E. Oswald, Leakage resilient cryptography in practice, Towards Hardware-Intrinsic Security. Berlin, Germany: Springer-Verlag, 2010, pp. 99-134, ser. Information Security and Cryptography
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 99-134
-
-
Standaert, F.-X.1
Pereira, O.2
Yu, Y.3
Quisquater, J.-J.4
Yung, M.5
Oswald, E.6
-
102
-
-
33748329638
-
Secure scan: A design-for-Test architecture for crypto chips
-
Oct
-
B. Yang, K. Wu, and R. Karri, Secure scan: A design-for-Test architecture for crypto chips, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10, pp. 2287-2293, Oct. 2006
-
(2006)
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst
, vol.25
, Issue.10
, pp. 2287-2293
-
-
Yang, B.1
Wu, K.2
Karri, R.3
-
103
-
-
84905015030
-
-
[Online]. Available
-
D. Boneh, Cryptography I, 2013. [Online]. Available: Https://class. coursera.org/ crypto-007/class/index
-
(2013)
Cryptography i
-
-
Boneh, D.1
-
104
-
-
78649252382
-
A predictive model for cache-based side channels in multicore and multithreaded microprocessors
-
Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
-
L. Domnitser, N. Abu-Ghazaleh, and D. Ponomarev, A predictive model for cache-based side channels in multicore and multithreaded microprocessors, Computer Network Security, vol. 6258. Berlin, Germany: Springer-Verlag, 2010, pp. 70-85, ser. Lecture Notes in Computer Science
-
(2010)
Computer Network Security
, vol.6258
, pp. 70-85
-
-
Domnitser, L.1
Abu-Ghazaleh, N.2
Ponomarev, D.3
-
105
-
-
84944319704
-
Statistics and secret leakage
-
Financial Cryptography
-
J.-S. Coron, P. Kocher, and D. Naccache, Statistics and secret leakage, Financial Cryptography, vol. 1962. Berlin, Germany: Springer-Verlag, 2001, pp. 157-173, ser. Lecture Notes in Computer Science (Pubitemid 33359604)
-
(2001)
Lecture Notes In Computer Science
, Issue.1962
, pp. 157-173
-
-
Coron, J.-S.1
Kocher, P.2
Naccache, D.3
-
106
-
-
85077688405
-
Active hardware metering for intellectual property protection and security
-
Y. Alkabani and F. Koushanfar, Active hardware metering for intellectual property protection and security, in Proc. USENIX Security Symp., 2007, pp. 291-306
-
(2007)
Proc. USENIX Security Symp
, pp. 291-306
-
-
Alkabani, Y.1
Koushanfar, F.2
-
107
-
-
28844506128
-
NBTI degradation: From physical mechanisms to modelling
-
DOI 10.1016/j.microrel.2005.02.001, PII S0026271405000351
-
V. Huard, M. Denais, and C. Parthasarathy, NBTI degradation: From physical mechanisms to modelling, Microelectron. Reliab., vol. 46, no. 1, pp. 1-23, 2006 (Pubitemid 41774239)
-
(2006)
Microelectronics Reliability
, vol.46
, Issue.1
, pp. 1-23
-
-
Huard, V.1
Denais, M.2
Parthasarathy, C.3
-
108
-
-
41349121509
-
Semiconductor manufacturers efforts to improve trust in the electronic part supply chain
-
Sep
-
K. Chatterjee and D. Das, Semiconductor manufacturers efforts to improve trust in the electronic part supply chain, IEEE Trans. Compon. Packag. Technol., vol. 30, no. 3, pp. 547-549, Sep. 2007
-
(2007)
IEEE Trans. Compon. Packag. Technol
, vol.30
, Issue.3
, pp. 547-549
-
-
Chatterjee, K.1
Das, D.2
-
109
-
-
84885133571
-
Quantitative intellectual property protection using physical-level characterization
-
Nov
-
S. Wei, A. Nahapetian, and M. Potkonjak, Quantitative intellectual property protection using physical-level characterization, IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1722-1730, Nov. 2013
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1722-1730
-
-
Wei, S.1
Nahapetian, A.2
Potkonjak, M.3
-
110
-
-
84872332147
-
Parametric counterfeit IC detection via support vector machines
-
K. Huang, J. Carulli, and Y. Makris, Parametric counterfeit IC detection via support vector machines, in Proc. IEEE Int. Symp. Defect Fault Tolerance VLSI Nanotechnol. Syst., 2012, pp. 7-12
-
(2012)
Proc. IEEE Int. Symp. Defect Fault Tolerance VLSI Nanotechnol. Syst
, pp. 7-12
-
-
Huang, K.1
Carulli, J.2
Makris, Y.3
-
111
-
-
84872347934
-
Path-delay fingerprinting for identification of recovered ICs
-
X. Zhang, K. Xiao, and M. Tehranipoor, Path-delay fingerprinting for identification of recovered ICs, in Proc. IEEE Int. Symp. Defect Fault Tolerance VLSI Nanotechnol. Syst., 2012, pp. 13-18
-
(2012)
Proc. IEEE Int. Symp. Defect Fault Tolerance VLSI Nanotechnol. Syst.
, pp. 13-18
-
-
Zhang, X.1
Xiao, K.2
Tehranipoor, M.3
|