-
1
-
-
84944067342
-
-
NIST Technical report, NIST Technology Administration, US Department of Commerce
-
NIST. Computer Security Division 2005 Annual Report. Technical report, NIST Technology Administration, US Department of Commerce, 2005
-
(2005)
Computer Security Division 2005 Annual Report
-
-
-
2
-
-
77956195816
-
Bridging pre-silicon verification and post-silicon validation
-
A. Nahir, A. Ziv, R. Galivanche, A. J. Hu, M. Abramovici, A. Camilleri, B. Bentley, H. Foster, V. Bertacco, and S. Kapoor. Bridging Pre-silicon Verification and Post-silicon Validation. 47th Design Automation Conference, pages 94-95, 2010
-
(2010)
47th Design Automation Conference
, pp. 94-95
-
-
Nahir, A.1
Ziv, A.2
Galivanche, R.3
Hu, A.J.4
Abramovici, M.5
Camilleri, A.6
Bentley, B.7
Foster, H.8
Bertacco, V.9
Kapoor, S.10
-
3
-
-
51549120034
-
Addressing post-silicon validation challenge: Leverage validation and test synergy
-
S. Yerramili. Addressing Post-silicon Validation Challenge: Leverage Validation and Test Synergy. International Test Conference, 2006
-
(2006)
International Test Conference
-
-
Yerramili, S.1
-
4
-
-
70350583030
-
MERO: A statistical approach for hardware trojan detection
-
R.S. Chakraborty, F. Woĺ, S. Paul, C. Papachristou, and S. Bhunia. MERO: A Statistical Approach for Hardware Trojan Detection. Cryptographic Hardware and Embedded Systems, pages 396-410, 2009
-
(2009)
Cryptographic Hardware and Embedded Systems
, pp. 396-410
-
-
Chakraborty, R.S.1
Woĺ, F.2
Paul, S.3
Papachristou, C.4
Bhunia, S.5
-
5
-
-
84896491283
-
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
-
U. Guin and D. DiMase and M. TehranIPoor. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead. Journal of Electronic Testing, 30(1):25-40, 2014
-
(2014)
Journal of Electronic Testing
, vol.30
, Issue.1
, pp. 25-40
-
-
Guin, U.1
DiMase, D.2
TehranIPoor, M.3
-
7
-
-
84964526045
-
Discussion topic: What is the old security paradigm
-
S. J. Greenwald. Discussion Topic: What is the Old Security Paradigm. In Workshop on New Security Paradigms, pages 107-118, 1998
-
(1998)
Workshop on New Security Paradigms
, pp. 107-118
-
-
Greenwald, S.J.1
-
8
-
-
84857570784
-
Efficient combination of trace and scan signals for post-silicon validation and debug
-
K. Basu, P. Mishra, and P. Patra. Efficient Combination of Trace and Scan Signals for Post-silicon Validation and Debug. In International Test Conference, pages 1-8, 2011
-
(2011)
International Test Conference
, pp. 1-8
-
-
Basu, K.1
Mishra, P.2
Patra, P.3
-
11
-
-
0003415191
-
IEEE standard test access port and boundary scan architecture
-
IEEE Joint Test Action Group. IEEE Standard Test Access Port and Boundary Scan Architecture. IEEE Std., 1149(1), 2001
-
(2001)
IEEE Std
, vol.1149
, Issue.1
-
-
-
12
-
-
84944121351
-
-
E. Ashfield, I. Field, P. Harrod, S. Houlihane, W. Orme, and S. Woodhouse. Serial Wire Debug and the CoreSightTM Debug and Trace Architecture, 2006
-
(2006)
Serial Wire Debug and the CoreSightTM Debug and Trace Architecture
-
-
Ashfield, E.1
Field, I.2
Harrod, P.3
Houlihane, S.4
Orme, W.5
Woodhouse, S.6
-
14
-
-
85015077828
-
IPhone hacks annoy at and t but are unlikely to bruise apple
-
L. Greenemeier. IPhone Hacks Annoy AT and T but Are Unlikely to Bruise Apple. Scientific American, 2007
-
(2007)
Scientific American
-
-
Greenemeier, L.1
-
15
-
-
77955758527
-
Anti-tamper jtag tap design enables drm to jtag registers and p1687 on-chIP instruments
-
C. J. Clark. Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chIP instruments. In Hardware-Oriented Security and Trust, pages 19-24, 2010
-
(2010)
Hardware-Oriented Security and Trust
, pp. 19-24
-
-
Clark, C.J.1
-
16
-
-
84880048252
-
Enhanced secure architecture for joint action test group systems
-
L. Pierce and S. Tragoudas. Enhanced Secure Architecture for Joint Action Test Group Systems. IEEE Transactions on VLSI Systems, 21(7):1342-1345, 2012
-
(2012)
IEEE Transactions on VLSI Systems
, vol.21
, Issue.7
, pp. 1342-1345
-
-
Pierce, L.1
Tragoudas, S.2
|