메뉴 건너뛰기




Volumn 2015-Septmber, Issue , 2015, Pages 246-251

Electromagnetic circuit fingerprints for Hardware Trojan detection

Author keywords

[No Author keywords available]

Indexed keywords

ELECTROMAGNETIC COMPATIBILITY; EMBEDDED SYSTEMS; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); HARDWARE; INTEGRATED CIRCUITS; MALWARE; PALMPRINT RECOGNITION; RECONFIGURABLE HARDWARE;

EID: 84953855392     PISSN: 10774076     EISSN: 21581118     Source Type: Conference Proceeding    
DOI: 10.1109/ISEMC.2015.7256167     Document Type: Conference Paper
Times cited : (79)

References (23)
  • 8
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware trojan taxonomy and detection
    • M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
    • (2010) IEEE Design & Test of Computers , vol.27 , Issue.1 , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 9
    • 80052678520 scopus 로고    scopus 로고
    • The state-of-the-art in semiconductor reverse engineering
    • L. Stok, N. D. Dutt, and S. Hassoun, Eds. ACM
    • R. Torrance and D. James, "The state-of-the-art in semiconductor reverse engineering," in Design Automation Conference-DAC 2011, L. Stok, N. D. Dutt, and S. Hassoun, Eds. ACM, 2011, pp. 333-338.
    • (2011) Design Automation Conference-DAC 2011 , pp. 333-338
    • Torrance, R.1    James, D.2
  • 12
    • 78049331855 scopus 로고    scopus 로고
    • Selfreferencing: A scalable side-channel approach for hardware trojan detection
    • S. Mangard and F. Standaert, Eds. Springer
    • D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, "Selfreferencing: A scalable side-channel approach for hardware trojan detection," in Cryptographic Hardware and Embedded Systems-CHES 2010, ser. LNCS, S. Mangard and F. Standaert, Eds., vol. 6225. Springer, 2010, pp. 173-187.
    • (2010) Cryptographic Hardware and Embedded Systems-CHES 2010, Ser. LNCS , vol.6225 , pp. 173-187
    • Du, D.1    Narasimhan, S.2    Chakraborty, R.S.3    Bhunia, S.4
  • 17
    • 51849107491 scopus 로고    scopus 로고
    • A region based approach for the identification of hardware trojans
    • M. Tehranipoor and J. Plusquellic, Eds. IEEE Computer Society
    • M. Banga and M. S. Hsiao, "A region based approach for the identification of hardware trojans," in Hardware-Oriented Security and Trust-HOST 2008, M. Tehranipoor and J. Plusquellic, Eds. IEEE Computer Society, 2008, pp. 40-47.
    • (2008) Hardware-Oriented Security and Trust-HOST 2008 , pp. 40-47
    • Banga, M.1    Hsiao, M.S.2
  • 23
    • 84970888642 scopus 로고    scopus 로고
    • Side-channel attack standard evaluation board (sasebo-g)
    • "Side-channel Attack Standard Evaluation Board (SASEBO-G)," RCIS-AIST. [Online]. Available: http://www.rcis.aist.go.jp/special/SASEBO/SASEBO-G-en.html
    • RCIS-AIST


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.