메뉴 건너뛰기




Volumn 102, Issue 8, 2014, Pages 1283-1295

A primer on hardware security: Models, methods, and metrics

Author keywords

[No Author keywords available]

Indexed keywords

INTEGRATED CIRCUITS; SUPPLY CHAINS;

EID: 84905002818     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2014.2335155     Document Type: Article
Times cited : (631)

References (111)
  • 3
    • 84904977524 scopus 로고    scopus 로고
    • Inquiry into counterfeit electronic parts in the department of defense supply chain
    • 112th Congress
    • 112th Congress, Inquiry into counterfeit electronic parts in the department of defense supply chain, Senate Report of the Committee on Armed Services, 2012
    • (2012) Senate Report of the Committee on Armed Services
  • 6
    • 84884470487 scopus 로고    scopus 로고
    • Online]. Available
    • A. Huang, Hacking the PIC 18F1320, 2007. [Online]. Available: Http://www. bunniestudios.com/blog/?page-id=40
    • (2007) Hacking the PIC 18F1320
    • Huang, A.1
  • 7
    • 63349107480 scopus 로고    scopus 로고
    • Office of the Under Secretary of Defense For Acquisition, Technology, Logistics Online]. Available
    • Office of the Under Secretary of Defense For Acquisition, Technology, Logistics, Defense Science Board (DSB) study on high performance microchip supply, 2005. [Online]. Available: Www.acq.osd.mil/dsb/ reports/ADA435563.pdf
    • (2005) Defense Science Board (DSB) Study on High Performance Microchip Supply
  • 8
    • 77958126199 scopus 로고    scopus 로고
    • EPIC: Ending piracy of integrated circuits
    • Oct
    • J. Roy, F. Koushanfar, and I. Markov, EPIC: Ending piracy of integrated circuits, IEEE Computer, vol. 43, no. 10, pp. 30-38, Oct. 2010
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 30-38
    • Roy, J.1    Koushanfar, F.2    Markov, I.3
  • 9
    • 80052678520 scopus 로고    scopus 로고
    • The state-of-The-Art in semiconductor reverse engineering
    • R. Torrance and D. James, The state-of-The-Art in semiconductor reverse engineering, in Proc. IEEE/ACM Design Autom. Conf., 2011, pp. 333-338
    • (2011) Proc. IEEE/ ACM Design Autom. Conf , pp. 333-338
    • Torrance, R.1    James, D.2
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Adv. Cryptol., pp. 388-397, 1999
    • (1999) Adv. Cryptol , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 11
    • 84863550104 scopus 로고    scopus 로고
    • Can EDA combat the rise of electronic counterfeiting?
    • F. Koushanfar et al., Can EDA combat the rise of electronic counterfeiting? in Proc. IEEE/ACM Design Autom. Conf., 2012, pp. 133-138
    • (2012) Proc. IEEE/ ACM Design Autom. Conf , pp. 133-138
    • Koushanfar, F.1
  • 14
    • 79951821310 scopus 로고    scopus 로고
    • A unified framework for multimodal submodular integrated circuits trojan detection
    • Mar
    • F. Koushanfar and A. Mirhoseini, A unified framework for multimodal submodular integrated circuits trojan detection, IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 162-174, Mar. 2011
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 162-174
    • Koushanfar, F.1    Mirhoseini, A.2
  • 15
    • 77958115258 scopus 로고    scopus 로고
    • Trustworthy hardware: Identifying and classifying hardware trojans
    • Oct
    • R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Trustworthy hardware: Identifying and classifying hardware trojans, IEEE Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 39-46
    • Karri, R.1    Rajendran, J.2    Rosenfeld, K.3    Tehranipoor, M.4
  • 16
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware trojan taxonomy and detection
    • Jan./Feb
    • M. Tehranipoor and F. Koushanfar, A survey of hardware trojan taxonomy and detection, IEEE Design Test Comput., vol. 27, no. 1, pp. 10-25, Jan./Feb. 2010
    • (2010) IEEE Design Test Comput , vol.27 , Issue.1 , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 17
    • 84855938090 scopus 로고    scopus 로고
    • Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
    • Mar
    • E. Love, Y. Jin, and Y. Makris, Proof-carrying hardware intellectual property: A pathway to trusted module acquisition, IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 25-40, Mar. 2012
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 25-40
    • Love, E.1    Jin, Y.2    Makris, Y.3
  • 19
    • 77955218749 scopus 로고    scopus 로고
    • Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
    • M. Hicks, M. Finnicum, S. T. King, M. M. Martin, and J. M. Smith, Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically, in Proc. IEEE Symp. Security Privacy, 2010, pp. 159-172
    • (2010) Proc. IEEE Symp. Security Privacy , pp. 159-172
    • Hicks, M.1    Finnicum, M.2    King, S.T.3    Martin, M.M.4    Smith, J.M.5
  • 27
    • 77955216190 scopus 로고    scopus 로고
    • HARPOON: An obfuscation-based SoC design methodology for hardware protection
    • Oct
    • R. Chakraborty and S. Bhunia, HARPOON: An obfuscation-based SoC design methodology for hardware protection, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 28, no. 10, pp. 1493-1502, Oct. 2009
    • (2009) IEEE Trans. Comput.-Aided Design Integr. Circuits Syst , vol.28 , Issue.10 , pp. 1493-1502
    • Chakraborty, R.1    Bhunia, S.2
  • 28
    • 0031619176 scopus 로고    scopus 로고
    • Watermarking techniques for intellectual property protection
    • A. Kahng et al., Watermarking techniques for intellectual property protection, in Proc. IEEE/ACM Design Autom. Conf., 1998, pp. 776-781
    • (1998) Proc. IEEE/ ACM Design Autom. Conf , pp. 776-781
    • Kahng, A.1
  • 29
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Y. Alkabani and F. Koushanfar, Active hardware metering for intellectual property protection and security, in Proc. 16th USENIX Security Symp., 2007, pp. 291-306
    • (2007) Proc. 16th USENIX Security Symp , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 31
    • 0031635593 scopus 로고    scopus 로고
    • Robust IP watermarking methodologies for physical design
    • A. Kahng et al., Robust IP watermarking methodologies for physical design, in Proc. IEEE/ACM Design Autom. Conf., 1998, pp. 782-787
    • (1998) Proc. IEEE/ ACM Design Autom. Conf , pp. 782-787
    • Kahng, A.1
  • 34
    • 0029354779 scopus 로고
    • Recent directions in netlist partitioning
    • C. Alpert and A. Kahng, Recent directions in netlist partitioning, Integration, VLSI J., vol. 19, no. 1-2, pp. 1-81, 1995
    • (1995) Integration VLSI J. , vol.19 , Issue.1-2 , pp. 1-81
    • Alpert, C.1    Kahng, A.2
  • 36
    • 1242286077 scopus 로고    scopus 로고
    • Effective iterative techniques for fingerprinting design IP
    • Feb
    • A. Caldwell et al., Effective iterative techniques for fingerprinting design IP, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 23, no. 2, pp. 208-215, Feb. 2004
    • (2004) IEEE Trans. Comput.-Aided Design Integr. Circuits Syst , vol.23 , Issue.2 , pp. 208-215
    • Caldwell, A.1
  • 38
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true random numbers
    • Sep
    • D. Holcomb, W. Burleson, and K. Fu, Power-up SRAM state as an identifying fingerprint and source of true random numbers, IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009
    • (2009) IEEE Trans. Comput , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.1    Burleson, W.2    Fu, K.3
  • 39
    • 84988439150 scopus 로고    scopus 로고
    • Defense Advanced Research Projects Agency (DARPA)), Microsystems Technology Office/MTO Broad Agency Announcement
    • Defense Advanced Research Projects Agency (DARPA), Supply Chain Hardware Integrity for Electronics Defense (SHIELD), Microsystems Technology Office/MTO Broad Agency Announcement, 2014
    • (2014) Supply Chain Hardware Integrity for Electronics Defense (SHIELD
  • 41
    • 84904854695 scopus 로고    scopus 로고
    • Robust and reverse-engineering resilient puf authentication and key-exchange by substring matching
    • Mar
    • M. Rostami, M. Majzoobi, F. Koushanfar, D. Wallach, and S. Devadas, Robust and reverse-engineering resilient puf authentication and key-exchange by substring matching, IEEE Trans. Emerging Topics Comput., vol. 2, no. 1, pp. 37-49, Mar. 2014
    • (2014) IEEE Trans. Emerging Topics Comput , vol.2 , Issue.1 , pp. 37-49
    • Rostami, M.1    Majzoobi, M.2    Koushanfar, F.3    Wallach, D.4    Devadas, S.5
  • 42
    • 56749170623 scopus 로고    scopus 로고
    • Trusted integrated circuits: A nondestructive hidden characteristics extraction approach
    • Berlin, Germany: Springer-Verlag
    • Y. Alkabani, F. Koushanfar, N. Kiyavash, and M. Potkonjak, Trusted integrated circuits: A nondestructive hidden characteristics extraction approach, Information Hiding, ser. Lecture Notes in Computer Science, Berlin, Germany: Springer-Verlag, 2008, vol. 5284, pp. 102-117
    • (2008) Information Hiding, Ser. Lecture Notes in Computer Science , vol.5284 , pp. 102-117
    • Alkabani, Y.1    Koushanfar, F.2    Kiyavash, N.3    Potkonjak, M.4
  • 45
    • 76949085013 scopus 로고    scopus 로고
    • Preventing IC piracy using reconfigurable logic barriers
    • Jan./Feb
    • A. Baumgarten, A. Tyagi, and J. Zambreno, Preventing IC piracy using reconfigurable logic barriers, IEEE Design Test Comput., vol. 27, no. 1, pp. 66-75, Jan./Feb. 2010
    • (2010) IEEE Design Test Comput , vol.27 , Issue.1 , pp. 66-75
    • Baumgarten, A.1    Tyagi, A.2    Zambreno, J.3
  • 47
    • 77950007695 scopus 로고    scopus 로고
    • RTL hardware IP protection using key-based control and data flow obfuscation
    • R. Chakraborty and S. Bhunia, RTL hardware IP protection using key-based control and data flow obfuscation, in Proc. IEEE Int. Conf. VLSI Design, 2010, pp. 405-410
    • (2010) Proc. IEEE Int. Conf. VLSI Design , pp. 405-410
    • Chakraborty, R.1    Bhunia, S.2
  • 49
    • 76349087817 scopus 로고    scopus 로고
    • Security against hardware trojan through a novel application of design obfuscation
    • R. Chakraborty and S. Bhunia, Security against hardware trojan through a novel application of design obfuscation, in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, 2009, pp. 113-116
    • (2009) Proc. IEEE/ ACM Int. Conf. Comput.-Aided Design , pp. 113-116
    • Chakraborty, R.1    Bhunia, S.2
  • 51
    • 84855943309 scopus 로고    scopus 로고
    • Provably secure active IC metering techniques for piracy avoidance and digital rights management
    • Feb
    • F. Koushanfar, Provably secure active IC metering techniques for piracy avoidance and digital rights management, IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 51-63, Feb. 2012
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 51-63
    • Koushanfar, F.1
  • 53
    • 84904958141 scopus 로고    scopus 로고
    • Intelligence Advanced Research Projects Activity (IARPA). [Online]. Available
    • Intelligence Advanced Research Projects Activity (IARPA), Trusted integrated circuits program, 2011. [Online]. Available: Https://www.fbo.gov/ utils/view?id= b8be3d2c5d5babbdffc6975c370247a6
    • (2011) Trusted Integrated Circuits Program
  • 58
    • 84889039676 scopus 로고    scopus 로고
    • Chipworks. [Online]. Available
    • Chipworks, Intels 22-nm tri-gate transistors exposed, 2012. [Online]. Available: Http://www.chipworks.com/blog/ technologyblog/2012/04/23/intels-22- nmtri-gate-Transistors-exposed/.
    • (2012) Intels 22-nm Tri-gate Transistors Exposed
  • 59
    • 84885628242 scopus 로고    scopus 로고
    • Defense Advanced Research Projects Agency (DARPA) [Online]. Available
    • Defense Advanced Research Projects Agency (DARPA), Integrity and reliability of integrated circuits (IRIS), 2012. [Online]. Available: Http://www.darpa.mil/Our- Work/MTO/Programs/Integrity-and- ReliabilityofI ntegratedCircuits-.
    • (2012) Integrity and Reliability of Integrated Circuits (IRIS)
  • 61
    • 84889036860 scopus 로고    scopus 로고
    • Chipworks. [Online]. Available
    • Chipworks, Reverse engineering software. [Online]. Available: Http://www.chipworks. com/en/technical-competitive-Analysis/ resources/reverse-engineering-software
    • Reverse Engineering Software
  • 62
    • 84904977519 scopus 로고    scopus 로고
    • Online]. Available
    • Degate. [Online]. Available: Http://www. degate.org/documentation/
    • Degate
  • 64
    • 0033359923 scopus 로고    scopus 로고
    • Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
    • DOI 10.1109/54.785838
    • M. Hansen, H. Yalcin, and J. Hayes, Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering, IEEE Design Test Comput., vol. 16, no. 3, pp. 72-80, May/Jun. 1999 (Pubitemid 30497933)
    • (1999) IEEE Design and Test of Computers , vol.16 , Issue.3 , pp. 72-80
    • Hansen, M.C.1    Yalcin, H.2    Hayes, J.P.3
  • 66
    • 84885590301 scopus 로고    scopus 로고
    • Reverse engineering digital circuits using functional analysis
    • P. Subramanyan et al., Reverse engineering digital circuits using functional analysis, in Proc. IEEE Design Autom. Test Eur. Conf. Exhibit., 2013, pp. 1277-1280
    • (2013) Proc. IEEE Design Autom. Test Eur. Conf. Exhibit , pp. 1277-1280
    • Subramanyan, P.1
  • 73
    • 84891544717 scopus 로고    scopus 로고
    • VLSI testing based security metric for IC camouflaging
    • DOI: 10.1109/TEST.2013.6651879
    • J. Rajendran, O. Sinanoglu, and R. Karri, VLSI testing based security metric for IC camouflaging, in Proc. IEEE Int. Test Conf., 2013, DOI: 10.1109/TEST.2013.6651879
    • (2013) Proc. IEEE Int. Test Conf
    • Rajendran, J.1    Sinanoglu, O.2    Karri, R.3
  • 76
    • 77957992139 scopus 로고    scopus 로고
    • A tutorial on physical security and side-channel attacks
    • Berlin Germany: Springer-Verlag
    • F. Koeune and F.-X. Standaert, A tutorial on physical security and side-channel attacks Foundations of Security Analysis and Design III. Berlin, Germany: Springer-Verlag, 2005, pp. 78-108
    • (2005) Foundations of Security Analysis and Design III , pp. 78-108
    • Koeune, F.1    Standaert, F.-X.2
  • 77
    • 84872320834 scopus 로고    scopus 로고
    • Electromagnetic attacks and countermeasures
    • Berlin Germany: Springer-Verlag
    • P. Rohatgi, Electromagnetic attacks and countermeasures, Cryptographic Engineering. Berlin, Germany: Springer-Verlag, 2009, pp. 407-430
    • (2009) Cryptographic Engineering , pp. 407-430
    • Rohatgi, P.1
  • 80
    • 31344443130 scopus 로고    scopus 로고
    • The sorcerer's apprentice guide to fault attacks
    • DOI 10.1109/JPROC.2005.862424
    • H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The sorcerers apprentice guide to fault attacks, Proc. IEEE, vol. 94, no. 2, pp. 370-382, Feb. 2006 (Pubitemid 43145991)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 370-382
    • Bar-El, H.1    Choukri, H.2    Naccache, D.3    Tunstall, M.4    Whelan, C.5
  • 81
    • 18144420462 scopus 로고    scopus 로고
    • Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard
    • 12.2, Proceedings - International Test Conference 2004
    • B. Yang, K. Wu, and R. Karri, Scan based side channel attack on dedicated hardware implementations of data encryption standard, in Proc. Int. Test Conf., 2004, pp. 339-344 (Pubitemid 40610032)
    • (2004) Proceedings - International Test Conference , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 83
    • 58549091532 scopus 로고    scopus 로고
    • Scan based side channel attacks on stream ciphers and their counter-measures
    • M. Agrawal, S. Karmakar, D. Saha, and D. Mukhopadhyay, Scan based side channel attacks on stream ciphers and their counter-measures, in Proc. INDOCRYPT, 2008, pp. 226-238
    • (2008) Proc. INDOCRYPT , pp. 226-238
    • Agrawal, M.1    Karmakar, S.2    Saha, D.3    Mukhopadhyay, D.4
  • 84
    • 85037371734 scopus 로고    scopus 로고
    • Side-channel analysis of PUFs and fuzzy extractors
    • New York NY USA: Springer-Verlag
    • D. Merli, D. Schuster, F. Stumpf, and G. Sigl, Side-channel analysis of PUFs and fuzzy extractors, Trust and Trustworthy Computing. New York, NY, USA: Springer-Verlag, 2011, pp. 33-47
    • (2011) Trust and Trustworthy Computing , pp. 33-47
    • Merli, D.1    Schuster, D.2    Stumpf, F.3    Sigl, G.4
  • 85
    • 84899905957 scopus 로고    scopus 로고
    • Power and timing side channels for PUFs and their efficient exploitation
    • U. Rührmair et al., Power and timing side channels for PUFs and their efficient exploitation, Cryptology ePrint Archive, Rep. 2013/851, 2013
    • (2013) Cryptology EPrint Archive Rep. 2013/851
    • Rührmair, U.1
  • 86
    • 79952517250 scopus 로고    scopus 로고
    • Differential template attacks on PUF enabled cryptographic devices
    • DOI: 10.1109/WIFS.2010.5711445
    • D. Karakoyunlu and B. Sunar, Differential template attacks on PUF enabled cryptographic devices, in Proc. Int. Workshop Inf. Forensics Security, 2010, DOI: 10.1109/WIFS.2010.5711445
    • (2010) Proc. Int. Workshop Inf. Forensics Security
    • Karakoyunlu, D.1    Sunar, B.2
  • 88
    • 67650696756 scopus 로고    scopus 로고
    • An information-Theoretic model for adaptive side-channel attacks
    • B. Kopf and D. Basin, An information-Theoretic model for adaptive side-channel attacks, in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 286-296
    • (2007) Proc. ACM Conf. Comput. Commun. Security , pp. 286-296
    • Kopf, B.1    Basin, D.2
  • 89
    • 0035275354 scopus 로고    scopus 로고
    • Secure contactless smartcard ASIC with DPA protection
    • DOI 10.1109/4.910496, PII S0018920001014408
    • P. Rakers, L. Connell, T. Collins, and D. Russell, Secure contactless smartcard ASIC with DPA protection, J. Solid-State Circuits, vol. 36, no. 3, pp. 559-565, Mar. 2001 (Pubitemid 32302998)
    • (2001) IEEE Journal of Solid-State Circuits , vol.36 , Issue.3 , pp. 559-565
    • Rakers, P.1    Connell, L.2    Collins, T.3    Russell, D.4
  • 90
    • 84893732023 scopus 로고    scopus 로고
    • A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
    • K. Tiri, M. Akmal, and I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Proc. Eur. Solid-State Circuits Conf., 2002, pp. 403-406
    • (2002) Proc. Eur. Solid-State Circuits Conf , pp. 403-406
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 91
    • 0041325255 scopus 로고    scopus 로고
    • Balanced self-checking asynchronous logic for smart card applications
    • S. Moore, R. Anderson, R. Mullins, G. Taylor, and J. J. Fournier, Balanced self-checking asynchronous logic for smart card applications, Microprocess. Microsyst., vol. 27, no. 9, pp. 421-430, 2003
    • (2003) Microprocess. Microsyst , vol.27 , Issue.9 , pp. 421-430
    • Moore, S.1    Anderson, R.2    Mullins, R.3    Taylor, G.4    Fournier, J.J.5
  • 94
    • 84893402156 scopus 로고    scopus 로고
    • Basics of side-channel analysis
    • Berlin Germany: Springer-Verlag
    • M. Joye, Basics of side-channel analysis, Cryptographic Engineering. Berlin, Germany: Springer-Verlag, 2009, pp.365-380
    • (2009) Cryptographic Engineering , pp. 365-380
    • Joye, M.1
  • 95
    • 84859464971 scopus 로고    scopus 로고
    • Introduction to differential power analysis
    • P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, Introduction to differential power analysis, J. Cryptogr. Eng., vol. 1, no. 1, pp. 5-27, 2011
    • (2011) J. Cryptogr. Eng , vol.1 , Issue.1 , pp. 5-27
    • Kocher, P.1    Jaffe, J.2    Jun, B.3    Rohatgi, P.4
  • 96
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • C. Clavier, J.-S. Coron, and N. Dabbous, Differential power analysis in the presence of hardware countermeasures, Cryptographic Hardware and Embedded Systems, vol. 1965. Berlin, Germany: Springer-Verlag, 2000, pp. 252-263, ser. Lecture Notes in Computer Science (Pubitemid 33213973)
    • (2000) Lecture Notes In Computer Science , Issue.1965 , pp. 252-263
    • Clavier, C.1    Coron, J.-S.2    Dabbous, N.3
  • 99
    • 72449205531 scopus 로고    scopus 로고
    • Signature schemes with bounded leakage resilience
    • Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
    • J. Katz and V. Vaikuntanathan, Signature schemes with bounded leakage resilience, Advances in Cryptology, vol. 5912. Berlin, Germany: Springer-Verlag, 2009, pp. 703-720, ser. Lecture Notes in Computer Science
    • (2009) Advances in Cryptology , vol.5912 , pp. 703-720
    • Katz, J.1    Vaikuntanathan, V.2
  • 101
  • 102
    • 33748329638 scopus 로고    scopus 로고
    • Secure scan: A design-for-Test architecture for crypto chips
    • Oct
    • B. Yang, K. Wu, and R. Karri, Secure scan: A design-for-Test architecture for crypto chips, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10, pp. 2287-2293, Oct. 2006
    • (2006) IEEE Trans. Comput.-Aided Design Integr. Circuits Syst , vol.25 , Issue.10 , pp. 2287-2293
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 103
    • 84905015030 scopus 로고    scopus 로고
    • [Online]. Available
    • D. Boneh, Cryptography I, 2013. [Online]. Available: Https://class. coursera.org/ crypto-007/class/index
    • (2013) Cryptography i
    • Boneh, D.1
  • 104
    • 78649252382 scopus 로고    scopus 로고
    • A predictive model for cache-based side channels in multicore and multithreaded microprocessors
    • Berlin, Germany: Springer-Verlag ser. Lecture Notes in Computer Science
    • L. Domnitser, N. Abu-Ghazaleh, and D. Ponomarev, A predictive model for cache-based side channels in multicore and multithreaded microprocessors, Computer Network Security, vol. 6258. Berlin, Germany: Springer-Verlag, 2010, pp. 70-85, ser. Lecture Notes in Computer Science
    • (2010) Computer Network Security , vol.6258 , pp. 70-85
    • Domnitser, L.1    Abu-Ghazaleh, N.2    Ponomarev, D.3
  • 105
    • 84944319704 scopus 로고    scopus 로고
    • Statistics and secret leakage
    • Financial Cryptography
    • J.-S. Coron, P. Kocher, and D. Naccache, Statistics and secret leakage, Financial Cryptography, vol. 1962. Berlin, Germany: Springer-Verlag, 2001, pp. 157-173, ser. Lecture Notes in Computer Science (Pubitemid 33359604)
    • (2001) Lecture Notes In Computer Science , Issue.1962 , pp. 157-173
    • Coron, J.-S.1    Kocher, P.2    Naccache, D.3
  • 106
    • 85077688405 scopus 로고    scopus 로고
    • Active hardware metering for intellectual property protection and security
    • Y. Alkabani and F. Koushanfar, Active hardware metering for intellectual property protection and security, in Proc. USENIX Security Symp., 2007, pp. 291-306
    • (2007) Proc. USENIX Security Symp , pp. 291-306
    • Alkabani, Y.1    Koushanfar, F.2
  • 107
    • 28844506128 scopus 로고    scopus 로고
    • NBTI degradation: From physical mechanisms to modelling
    • DOI 10.1016/j.microrel.2005.02.001, PII S0026271405000351
    • V. Huard, M. Denais, and C. Parthasarathy, NBTI degradation: From physical mechanisms to modelling, Microelectron. Reliab., vol. 46, no. 1, pp. 1-23, 2006 (Pubitemid 41774239)
    • (2006) Microelectronics Reliability , vol.46 , Issue.1 , pp. 1-23
    • Huard, V.1    Denais, M.2    Parthasarathy, C.3
  • 108
    • 41349121509 scopus 로고    scopus 로고
    • Semiconductor manufacturers efforts to improve trust in the electronic part supply chain
    • Sep
    • K. Chatterjee and D. Das, Semiconductor manufacturers efforts to improve trust in the electronic part supply chain, IEEE Trans. Compon. Packag. Technol., vol. 30, no. 3, pp. 547-549, Sep. 2007
    • (2007) IEEE Trans. Compon. Packag. Technol , vol.30 , Issue.3 , pp. 547-549
    • Chatterjee, K.1    Das, D.2
  • 109
    • 84885133571 scopus 로고    scopus 로고
    • Quantitative intellectual property protection using physical-level characterization
    • Nov
    • S. Wei, A. Nahapetian, and M. Potkonjak, Quantitative intellectual property protection using physical-level characterization, IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1722-1730, Nov. 2013
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1722-1730
    • Wei, S.1    Nahapetian, A.2    Potkonjak, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.