메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages

Correctness and security at odds: Post-silicon validation of modern SoC designs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; ECONOMIC AND SOCIAL EFFECTS; SILICON; SYSTEM-ON-CHIP; COMPUTER ARCHITECTURE; DESIGN;

EID: 84944080757     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2744769.2754896     Document Type: Conference Paper
Times cited : (25)

References (17)
  • 1
    • 84944067342 scopus 로고    scopus 로고
    • NIST Technical report, NIST Technology Administration, US Department of Commerce
    • NIST. Computer Security Division 2005 Annual Report. Technical report, NIST Technology Administration, US Department of Commerce, 2005
    • (2005) Computer Security Division 2005 Annual Report
  • 3
    • 51549120034 scopus 로고    scopus 로고
    • Addressing post-silicon validation challenge: Leverage validation and test synergy
    • S. Yerramili. Addressing Post-silicon Validation Challenge: Leverage Validation and Test Synergy. International Test Conference, 2006
    • (2006) International Test Conference
    • Yerramili, S.1
  • 5
    • 84896491283 scopus 로고    scopus 로고
    • Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
    • U. Guin and D. DiMase and M. TehranIPoor. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead. Journal of Electronic Testing, 30(1):25-40, 2014
    • (2014) Journal of Electronic Testing , vol.30 , Issue.1 , pp. 25-40
    • Guin, U.1    DiMase, D.2    TehranIPoor, M.3
  • 7
    • 84964526045 scopus 로고    scopus 로고
    • Discussion topic: What is the old security paradigm
    • S. J. Greenwald. Discussion Topic: What is the Old Security Paradigm. In Workshop on New Security Paradigms, pages 107-118, 1998
    • (1998) Workshop on New Security Paradigms , pp. 107-118
    • Greenwald, S.J.1
  • 8
    • 84857570784 scopus 로고    scopus 로고
    • Efficient combination of trace and scan signals for post-silicon validation and debug
    • K. Basu, P. Mishra, and P. Patra. Efficient Combination of Trace and Scan Signals for Post-silicon Validation and Debug. In International Test Conference, pages 1-8, 2011
    • (2011) International Test Conference , pp. 1-8
    • Basu, K.1    Mishra, P.2    Patra, P.3
  • 11
    • 0003415191 scopus 로고    scopus 로고
    • IEEE standard test access port and boundary scan architecture
    • IEEE Joint Test Action Group. IEEE Standard Test Access Port and Boundary Scan Architecture. IEEE Std., 1149(1), 2001
    • (2001) IEEE Std , vol.1149 , Issue.1
  • 14
    • 85015077828 scopus 로고    scopus 로고
    • IPhone hacks annoy at and t but are unlikely to bruise apple
    • L. Greenemeier. IPhone Hacks Annoy AT and T but Are Unlikely to Bruise Apple. Scientific American, 2007
    • (2007) Scientific American
    • Greenemeier, L.1
  • 15
    • 77955758527 scopus 로고    scopus 로고
    • Anti-tamper jtag tap design enables drm to jtag registers and p1687 on-chIP instruments
    • C. J. Clark. Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chIP instruments. In Hardware-Oriented Security and Trust, pages 19-24, 2010
    • (2010) Hardware-Oriented Security and Trust , pp. 19-24
    • Clark, C.J.1
  • 16
    • 84880048252 scopus 로고    scopus 로고
    • Enhanced secure architecture for joint action test group systems
    • L. Pierce and S. Tragoudas. Enhanced Secure Architecture for Joint Action Test Group Systems. IEEE Transactions on VLSI Systems, 21(7):1342-1345, 2012
    • (2012) IEEE Transactions on VLSI Systems , vol.21 , Issue.7 , pp. 1342-1345
    • Pierce, L.1    Tragoudas, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.