-
1
-
-
34548719905
-
Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy
-
Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310
-
(2007)
pp 296–310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
2
-
-
85067721898
-
Digital integrated circuits analysis and design, 2nd edn. CRC Press
-
Ayers JE (2009) Digital integrated circuits analysis and design, 2nd edn. CRC Press, pp 242–248
-
(2009)
pp 242–248
-
-
Ayers, J.E.1
-
3
-
-
51849107491
-
A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
-
Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 40–47
-
(2008)
pp 40–47
-
-
Banga, M.1
Hsiao, M.S.2
-
5
-
-
51849089785
-
On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
-
Chakraborty RS, Paul S, Bhunia S (2008) On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 48–50
-
(2008)
pp 48–50
-
-
Chakraborty, R.S.1
Paul, S.2
Bhunia, S.3
-
7
-
-
51849095999
-
Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST)
-
Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 51–57
-
(2008)
pp 51–57
-
-
Jin, Y.1
Makris, Y.2
-
8
-
-
58449132326
-
Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE)
-
Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE), pp 117–124
-
(2008)
pp 117–124
-
-
Jha, S.1
Jha, S.K.2
-
9
-
-
0003946510
-
Principal component analysis, 2nd edn
-
Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer
-
(2002)
Springer
-
-
Jolliffe, I.T.1
-
11
-
-
51849099113
-
At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
-
Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 8–14
-
(2008)
pp 8–14
-
-
Li, J.1
Lach, J.2
-
12
-
-
77955753636
-
Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST)
-
Narasimhan S, Du D, Chakraborty RS, Paul S,Wolff F, Papachristou C, Roy K, Bhunia S (2010) Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST), pp 13–18
-
(2010)
pp 13–18
-
-
Narasimhan, S.1
Du, D.2
Chakraborty, R.S.3
-
13
-
-
80051985183
-
Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST)
-
Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011) Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST), pp 71–74
-
(2011)
pp 71–74
-
-
Narasimhan, S.1
Wang, X.2
Du, D.3
Chakraborty, R.S.4
Bhunia, S.5
-
14
-
-
0017453547
-
Convex hulls of finite sets of points in two and three dimensions
-
Preparata FP, Hong SJ (1977) Convex hulls of finite sets of points in two and three dimensions. Commun ACM:87–93
-
(1977)
Commun ACM
, pp. 87-93
-
-
Preparata, F.P.1
Hong, S.J.2
-
15
-
-
70350733802
-
Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC)
-
Potkonjak M, Nahapetian A, Nelson M, Massey T (2009) Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC), pp 688–693
-
(2009)
pp 688–693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
16
-
-
51849084404
-
Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST)
-
Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 3–7
-
(2008)
pp 3–7
-
-
Rad, R.1
Plusquellic, J.2
Tehranipoor, M.3
-
17
-
-
57849119623
-
Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD)
-
Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008) Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD), pp 632–639
-
(2008)
pp 632–639
-
-
Rad, R.M.1
Wang, X.2
Tehranipoor, M.3
Plusquellic, J.4
-
18
-
-
83455210245
-
Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD)
-
Rilling J, Graziano D, Hitchcock J, Meyer T, Wang X, Jones P, Zambreno J (2011) Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD), pp 289–292
-
(2011)
pp 289–292
-
-
Rilling, J.1
Graziano, D.2
Hitchcock, J.3
Meyer, T.4
Wang, X.5
Jones, P.6
Zambreno, J.7
-
19
-
-
18744370342
-
Technical report
-
Report of the defense science board task force on high performace microchip supply (2005) Technical report, US DOD
-
(2005)
US DOD
-
-
-
20
-
-
70449123838
-
New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST)
-
Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 66–73
-
(2009)
pp 66–73
-
-
Salmani, H.1
Tehranipoor, M.2
Plusquellic, J.3
-
21
-
-
84963778768
-
Introduction to hardware security and trust
-
Tehranipoor M, Wang C (2010) Introduction to hardware security and trust. Springer
-
(2010)
Springer
-
-
Tehranipoor, M.1
Wang, C.2
-
23
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST)
-
Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST), pp 15–19
-
(2008)
pp 15–19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
24
-
-
67649998710
-
Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems
-
Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems, pp 87–95
-
(2008)
pp 87–95
-
-
Wang, X.1
Salmani, H.2
Tehranipoor, M.3
Plusquellic, J.4
-
27
-
-
85067711363
-
Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE)
-
Zhang X, Tehranipoor M (2011) Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE), pp 1–6
-
(2011)
pp 1–6
-
-
Zhang, X.1
Tehranipoor, M.2
|