-
6
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in IEEE Symposium on Security and Privacy-IEEE S&P 2007. IEEE Computer Society, 2007, pp. 296-310.
-
(2007)
IEEE Symposium on Security and Privacy-IEEE S&P 2007. IEEE Computer Society
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
7
-
-
49749105556
-
Towards trojan-free trusted ics: Problem analysis and detection scheme
-
F. G. Wolff, C. A. Papachristou, S. Bhunia, and R. S. Chakraborty, "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme," in Design, Automation and Test in Europe-DATE 2008. IEEE, 2008, pp. 1362-1365.
-
(2008)
Design, Automation and Test in Europe-DATE 2008. IEEE
, pp. 1362-1365
-
-
Wolff, F.G.1
Papachristou, C.A.2
Bhunia, S.3
Chakraborty, R.S.4
-
8
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
-
(2010)
IEEE Design & Test of Computers
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
9
-
-
80052678520
-
The state-of-the-art in semiconductor reverse engineering
-
L. Stok, N. D. Dutt, and S. Hassoun, Eds. ACM
-
R. Torrance and D. James, "The state-of-the-art in semiconductor reverse engineering," in Design Automation Conference-DAC 2011, L. Stok, N. D. Dutt, and S. Hassoun, Eds. ACM, 2011, pp. 333-338.
-
(2011)
Design Automation Conference-DAC 2011
, pp. 333-338
-
-
Torrance, R.1
James, D.2
-
10
-
-
84899474606
-
On application of one-class SVM to reverse engineering-based hardware trojan detection
-
C. Bao, D. Forte, and A. Srivastava, "On application of one-class SVM to reverse engineering-based hardware trojan detection," in International Symposium on Quality Electronic Design-ISQED 2014. IEEE, 2014, pp. 47-54.
-
(2014)
International Symposium on Quality Electronic Design-ISQED 2014. IEEE
, pp. 47-54
-
-
Bao, C.1
Forte, D.2
Srivastava, A.3
-
11
-
-
70350583030
-
MERO: A statistical approach for hardware trojan detection
-
C. Clavier and K. Gaj, Eds. Springer
-
R. S. Chakraborty, F. G. Wolff, S. Paul, C. A. Papachristou, and S. Bhunia, "MERO: A statistical approach for hardware trojan detection," in Cryptographic Hardware and Embedded Systems-CHES 2009, ser. LNCS, C. Clavier and K. Gaj, Eds., vol. 5747. Springer, 2009, pp. 396-410.
-
(2009)
Cryptographic Hardware and Embedded Systems-CHES 2009, Ser. LNCS
, vol.5747
, pp. 396-410
-
-
Chakraborty, R.S.1
Wolff, F.G.2
Paul, S.3
Papachristou, C.A.4
Bhunia, S.5
-
12
-
-
78049331855
-
Selfreferencing: A scalable side-channel approach for hardware trojan detection
-
S. Mangard and F. Standaert, Eds. Springer
-
D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, "Selfreferencing: A scalable side-channel approach for hardware trojan detection," in Cryptographic Hardware and Embedded Systems-CHES 2010, ser. LNCS, S. Mangard and F. Standaert, Eds., vol. 6225. Springer, 2010, pp. 173-187.
-
(2010)
Cryptographic Hardware and Embedded Systems-CHES 2010, Ser. LNCS
, vol.6225
, pp. 173-187
-
-
Du, D.1
Narasimhan, S.2
Chakraborty, R.S.3
Bhunia, S.4
-
15
-
-
84864115288
-
HTOutlier: Hardware Trojan detection with side-channel signature outlier identification
-
J. Zhang, H. Yu, and Q. Xu, "HTOutlier: Hardware Trojan detection with side-channel signature outlier identification," in Hardware-Oriented Security and Trust-HOST 2012. IEEE Computer Society, 2012, pp. 55-58.
-
(2012)
Hardware-Oriented Security and Trust-HOST 2012. IEEE Computer Society
, pp. 55-58
-
-
Zhang, J.1
Yu, H.2
Xu, Q.3
-
16
-
-
78649399066
-
Detecting trojans through leakage current analysis using multiple supply pad iddq s
-
J. Aarestad, D. Acharyya, R. M. Rad, and J. Plusquellic, "Detecting trojans through leakage current analysis using multiple supply pad iddq s," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 893-904, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.4
, pp. 893-904
-
-
Aarestad, J.1
Acharyya, D.2
Rad, R.M.3
Plusquellic, J.4
-
17
-
-
51849107491
-
A region based approach for the identification of hardware trojans
-
M. Tehranipoor and J. Plusquellic, Eds. IEEE Computer Society
-
M. Banga and M. S. Hsiao, "A region based approach for the identification of hardware trojans," in Hardware-Oriented Security and Trust-HOST 2008, M. Tehranipoor and J. Plusquellic, Eds. IEEE Computer Society, 2008, pp. 40-47.
-
(2008)
Hardware-Oriented Security and Trust-HOST 2008
, pp. 40-47
-
-
Banga, M.1
Hsiao, M.S.2
-
18
-
-
77955753636
-
Multiple-parameter sidechannel analysis: A non-invasive hardware trojan detection approach
-
J. Plusquellic and K. Mai, Eds. IEEE Computer Society
-
S. Narasimhan, R. S. Chakraborty, D. Du, S. Paul, F. G. Wolff, C. A. Papachristou, K. Roy, and S. Bhunia, "Multiple-parameter sidechannel analysis: A non-invasive hardware trojan detection approach," in Hardware-Oriented Security and Trust-HOST 2010, J. Plusquellic and K. Mai, Eds. IEEE Computer Society, 2010, pp. 13-18.
-
(2010)
Hardware-Oriented Security and Trust-HOST 2010
, pp. 13-18
-
-
Narasimhan, S.1
Chakraborty, R.S.2
Du, D.3
Paul, S.4
Wolff, F.G.5
Papachristou, C.A.6
Roy, K.7
Bhunia, S.8
-
19
-
-
80051985183
-
TeSR: A robust temporal self-referencing approach for hardware trojan detection
-
S. Narasimhan, X. Wang, D. Du, R. S. Chakraborty, and S. Bhunia, "TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection," in Hardware-Oriented Security and Trust-HOST 2011. IEEE Computer Society, 2011, pp. 71-74.
-
(2011)
Hardware-Oriented Security and Trust-HOST 2011. IEEE Computer Society
, pp. 71-74
-
-
Narasimhan, S.1
Wang, X.2
Du, D.3
Chakraborty, R.S.4
Bhunia, S.5
-
21
-
-
84953860011
-
Red team vs. Blue team hardware trojan analysis: Detection of a hardware trojan on an actual ASIC
-
R. B. Lee and W. Shi, Eds. ACM
-
M. Muehlberghuber, F. K. Gürkaynak, T. Korak, P. Dunst, and M. Hutter, "Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC," in Hardware and Architectural Support for Security and Privacy-HASP 2013, R. B. Lee and W. Shi, Eds. ACM, 2013, p. 1.
-
(2013)
Hardware and Architectural Support for Security and Privacy-HASP 2013
, pp. 1
-
-
Muehlberghuber, M.1
Gürkaynak, F.K.2
Korak, T.3
Dunst, P.4
Hutter, M.5
-
23
-
-
84970888642
-
Side-channel attack standard evaluation board (sasebo-g)
-
"Side-channel Attack Standard Evaluation Board (SASEBO-G)," RCIS-AIST. [Online]. Available: http://www.rcis.aist.go.jp/special/SASEBO/SASEBO-G-en.html
-
RCIS-AIST
-
-
|