-
1
-
-
77957781457
-
Understanding the propagation of hard errors to software and implications for resilient system design
-
ser. ASPLOS. Seattle, WA: ACM, Mar
-
M.-L. Li, P. Ramachandran, S. K. Sahoo, S. V. Adve, V. S. Adve, and Y. Zhou, "Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design," in International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS. Seattle, WA: ACM, Mar. 2008, pp. 265-276
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 265-276
-
-
Li, M.-L.1
Ramachandran, P.2
Sahoo, S.K.3
Adve, S.V.4
Adve, V.S.5
Zhou, Y.6
-
2
-
-
84939194543
-
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
-
ser. ASPLOS. Istanbul, Turkey: ACM
-
M. Hicks, C. Sturton, S. T. King, and J. M. Smith, "Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs," in Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ser. ASPLOS. Istanbul, Turkey: ACM, 2015, pp. 517-529
-
(2015)
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 517-529
-
-
Hicks, M.1
Sturton, C.2
King, S.T.3
Smith, J.M.4
-
3
-
-
84987613342
-
-
S. S. Technology Oct
-
S. S. Technology. (2012, Oct.) Why node shrinks are no longer offsetting equipment costs. [Online]. Available: http://electroiq.com/blog/2012/10/ why-node-shrinks-are-no-longer-offsetting-equipment-costs
-
(2012)
-
-
-
4
-
-
84890588314
-
Stealthy dopant-level hardware trojans
-
ser. CHES. Berlin, Heidelberg: Springer-Verlag
-
G. T. Becker, F. Regazzoni, C. Paar, and W. P. Burleson, "Stealthy Dopant-level Hardware Trojans," in International Conference on Cryptographic Hardware and Embedded Systems, ser. CHES. Berlin, Heidelberg: Springer-Verlag, 2013, pp. 197-214
-
(2013)
International Conference on Cryptographic Hardware and Embedded Systems
, pp. 197-214
-
-
Becker, G.T.1
Regazzoni, F.2
Paar, C.3
Burleson, W.P.4
-
5
-
-
84920548347
-
Parametric trojans for fault-injection attacks on cryptographic hardware
-
ser. FDT
-
R. Kumar, P. Jovanovic, W. Burleson, and I. Polian, "Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware," in Workshop on Fault Diagnosis and Tolerance in Cryptography, ser. FDT, 2014, pp. 18-28
-
(2014)
Workshop on Fault Diagnosis and Tolerance in Cryptography
, pp. 18-28
-
-
Kumar, R.1
Jovanovic, P.2
Burleson, W.3
Polian, I.4
-
6
-
-
84921441391
-
Reversing stealthy dopant-level circuits
-
ser. CHES. New York, NY: Springer-Verlag
-
T. Sugawara, D. Suzuki, R. Fujii, S. Tawa, R. Hori, M. Shiozaki, and T. Fujino, "Reversing Stealthy Dopant-Level Circuits," in International Conference on Cryptographic Hardware and Embedded Systems, ser. CHES. New York, NY: Springer-Verlag, 2014, pp. 112-126
-
(2014)
International Conference on Cryptographic Hardware and Embedded Systems
, pp. 112-126
-
-
Sugawara, T.1
Suzuki, D.2
Fujii, R.3
Tawa, S.4
Hori, R.5
Shiozaki, M.6
Fujino, T.7
-
7
-
-
34548719905
-
Trojan detection using ic fingerprinting
-
ser. S and P Washington, DC: IEEE Computer Society
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan Detection Using IC Fingerprinting," in Symposium on Security and Privacy, ser. S and P Washington, DC: IEEE Computer Society, 2007, pp. 296-310
-
(2007)
Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
8
-
-
51849095999
-
Hardware trojan detection using path delay fingerprint
-
ser. HOST. Washington, DC: IEEE Computer Society
-
Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," in Hardware-Oriented Security and Trust, ser. HOST. Washington, DC: IEEE Computer Society, 2008, pp. 51-57
-
(2008)
Hardware-Oriented Security and Trust
, pp. 51-57
-
-
Jin, Y.1
Makris, Y.2
-
9
-
-
70350733802
-
Hardware Trojan horse detection using gate-level characterization
-
ser. DAC
-
M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, "Hardware Trojan horse detection using gate-level characterization," in Design Automation Conference, ser. DAC, vol. 46, 2009, pp. 688-693
-
(2009)
Design Automation Conference
, vol.46
, pp. 688-693
-
-
Potkonjak, M.1
Nahapetian, A.2
Nelson, M.3
Massey, T.4
-
10
-
-
80051985183
-
TeSR: A robust temporal self-referencing approach for hardware trojan detection
-
ser. HOST. San Diego, CA: IEEE Computer Society, Jun
-
S. Narasimhan, X. Wang, D. Du, R. S. Chakraborty, and S. Bhunia, "TeSR: A Robust Temporal Self-Referencing Approach for Hardware Trojan Detection," in Hardware-Oriented Security and Trust, ser. HOST. San Diego, CA: IEEE Computer Society, Jun. 2011, pp. 71-74
-
(2011)
Hardware-Oriented Security and Trust
, pp. 71-74
-
-
Narasimhan, S.1
Wang, X.2
Du, D.3
Chakraborty, R.S.4
Bhunia, S.5
-
11
-
-
51849099113
-
At-speed delay characterization for IC authentication and trojan horse detection
-
ser. HOST. Washington, DC: IEEE Computer Society
-
J. Li and J. Lach, "At-speed Delay Characterization for IC Authentication and Trojan Horse Detection," in Hardware-Oriented Security and Trust, ser. HOST. Washington, DC: IEEE Computer Society, 2008, pp. 8-14
-
(2008)
Hardware-Oriented Security and Trust
, pp. 8-14
-
-
Li, J.1
Lach, J.2
-
12
-
-
84893407514
-
Temperature tracking: An innovative run-time approach for hardware trojan detection
-
ser. ICCAD. IEEE
-
D. Forte, C. Bao, and A. Srivastava, "Temperature Tracking: An Innovative Run-time Approach for Hardware Trojan Detection," in International Conference on Computer-Aided Design, ser. ICCAD. IEEE, 2013, pp. 532-539
-
(2013)
International Conference on Computer-Aided Design
, pp. 532-539
-
-
Forte, D.1
Bao, C.2
Srivastava, A.3
-
13
-
-
84925483377
-
Detecting hardware trojans using on-chip sensors in an ASIC design
-
Feb
-
S. Kelly, X. Zhang, M. Tehranipoor, and A. Ferraiuolo, "Detecting Hardware Trojans Using On-chip Sensors in an ASIC Design," Journal of Electronic Testing, vol. 31, no. 1, pp. 11-26, Feb. 2015
-
(2015)
Journal of Electronic Testing
, vol.31
, Issue.1
, pp. 11-26
-
-
Kelly, S.1
Zhang, X.2
Tehranipoor, M.3
Ferraiuolo, A.4
-
14
-
-
80051995886
-
Silencing hardware backdoors
-
ser. S and P Oakland, CA: IEEE Computer Society, May
-
A. Waksman and S. Sethumadhavan, "Silencing Hardware Backdoors," in IEEE Security and Privacy, ser. S and P Oakland, CA: IEEE Computer Society, May 2011
-
(2011)
IEEE Security and Privacy
-
-
Waksman, A.1
Sethumadhavan, S.2
-
15
-
-
83455219934
-
Sequential hardware trojan: Side-channel aware design and placement
-
Oct
-
X. Wang, S. Narasimhan, A. Krishna, T. Mal-Sarkar, and S. Bhunia, "Sequential hardware trojan: Side-channel aware design and placement," in Computer Design (ICCD), 2011 IEEE 29th International Conference on, Oct 2011, pp. 297-300
-
(2011)
Computer Design (ICCD), 2011 IEEE 29th International Conference on
, pp. 297-300
-
-
Wang, X.1
Narasimhan, S.2
Krishna, A.3
Mal-Sarkar, T.4
Bhunia, S.5
-
16
-
-
84939177821
-
-
OpenCores.org. OpenRISC OR1200 processor. [Online]. Available: http://opencores.org/or1k/OR1200\ OpenRISC\ Processor
-
OpenRISC OR1200 Processor
-
-
-
17
-
-
84962779213
-
MiBench: A free, commercially representative embedded benchmark suite
-
Washington, DC: IEEE Computer Society
-
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown, "MiBench: A free, commercially representative embedded benchmark suite," in Workshop on Workload Characterization. Washington, DC: IEEE Computer Society, 2001, pp. 3-14
-
(2001)
Workshop on Workload Characterization
, pp. 3-14
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
-
18
-
-
84987607248
-
-
K. Yang, M. Hicks, Q. Dong, T. Austin, and D. Sylvester, "A2: Analog malicious hardware," https://github.com/impedimentToProgress/A2, 2016
-
(2016)
A2: Analog Malicious Hardware
-
-
Yang, K.1
Hicks, M.2
Dong, Q.3
Austin, T.4
Sylvester, D.5
-
19
-
-
84893404410
-
Hardware security: Threat models and metrics
-
ser. ICCAD '13. San Jose, CA: IEEE Press
-
M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri, "Hardware security: Threat models and metrics," in Proceedings of the International Conference on Computer-Aided Design, ser. ICCAD '13. San Jose, CA: IEEE Press, 2013, pp. 819-823
-
(2013)
Proceedings of the International Conference on Computer-Aided Design
, pp. 819-823
-
-
Rostami, M.1
Koushanfar, F.2
Rajendran, J.3
Karri, R.4
-
20
-
-
84987607262
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
Dec
-
M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith, "Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically," USENIX ;login, vol. 35, no. 6, pp. 31-41, Dec. 2010
-
(2010)
USENIX ;Login
, vol.35
, Issue.6
, pp. 31-41
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.K.4
Smith, J.M.5
-
21
-
-
85084095841
-
Designing and implementing malicious hardware
-
Apr
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. n. Jiang, and Y. Zhou, "Designing and implementing malicious hardware," in Workshop on Large-Scale Exploits and Emergent Threats, ser. LEET, vol. 1, Apr. 2008
-
(2008)
Workshop on Large-Scale Exploits and Emergent Threats, Ser. LEET
, vol.1
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang W, N.5
Zhou, Y.6
-
22
-
-
84885675324
-
Is split manufacturing secure?
-
ser. DATE
-
J. Rajendran, O. Sinanoglu, and R. Karri, "Is split manufacturing secure?" in Design, Automation and Test in Europe, ser. DATE, 2013, pp. 1259-1264
-
(2013)
Design, Automation and Test in Europe
, pp. 1259-1264
-
-
Rajendran, J.1
Sinanoglu, O.2
Karri, R.3
-
23
-
-
84903192618
-
Detecting reliability attacks during split fabrication using test-only BEOL stack
-
ser. DAC,IEEE, Jun
-
K. Vaidyanathan, B. Das, and L. Pileggi, "Detecting reliability attacks during split fabrication using test-only BEOL stack," in Design Automation Conference, ser. DAC, vol. 51. IEEE, Jun. 2014, pp. 1-6
-
(2014)
Design Automation Conference
, vol.51
, pp. 1-6
-
-
Vaidyanathan, K.1
Das, B.2
Pileggi, L.3
-
24
-
-
84905991814
-
Building trusted ICs using split fabrication
-
ser. HOST. IEEE Computer Society
-
K. Vaidyanathan, B. Das, E. Sumbul, R. Liu, and L. Pileggi, "Building trusted ICs using split fabrication," in International Symposium on Hardware-Oriented Security and Trust, ser. HOST. IEEE Computer Society, 2014, pp. 1-6
-
(2014)
International Symposium on Hardware-Oriented Security and Trust
, pp. 1-6
-
-
Vaidyanathan, K.1
Das, B.2
Sumbul, E.3
Liu, R.4
Pileggi, L.5
-
25
-
-
84905981297
-
Efficient and secure intellectual property (IP) design with split fabrication
-
ser. HOST. IEEE Computer Society
-
K. Vaidyanathan, R. Liu, E. Sumbul, Q. Zhu, F. Franchetti, and L. Pileggi, "Efficient and secure intellectual property (IP) design with split fabrication," in International Symposium on Hardware-Oriented Security and Trust, ser. HOST. IEEE Computer Society, 2014, pp. 13-18
-
(2014)
International Symposium on Hardware-Oriented Security and Trust
, pp. 13-18
-
-
Vaidyanathan, K.1
Liu, R.2
Sumbul, E.3
Zhu, Q.4
Franchetti, F.5
Pileggi, L.6
-
26
-
-
85050526631
-
Securing computer hardware using 3d integrated circuit (IC) technology and split manufacturing for obfuscation
-
ser. Security. USENIX Association
-
F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara, "Securing Computer Hardware Using 3d Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation," in Conference on Security, ser. Security. USENIX Association, 2013, pp. 495-510
-
(2013)
Conference on Security
, pp. 495-510
-
-
Imeson, F.1
Emtenan, A.2
Garg, S.3
Tripunitara, M.V.4
-
27
-
-
70449730263
-
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
-
Berlin, Heidelberg: Springer-Verlag
-
L. Lin, M. Kasper, T. Gneysu, C. Paar, and W. Burleson, "Trojan Side-Channels: Lightweight Hardware Trojans Through Side-Channel Engineering," in International Workshop on Cryptographic Hardware and Embedded Systems, ser. CHES, vol. 11. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 382-395
-
(2009)
International Workshop on Cryptographic Hardware and Embedded Systems, Ser. CHES
, vol.11
, pp. 382-395
-
-
Lin, L.1
Kasper, M.2
Gneysu, T.3
Paar, C.4
Burleson, W.5
-
28
-
-
77956948329
-
Process reliability based trojans through NBTI and HCI effects
-
ser. AHS
-
Y. Shiyanovskii, F. Wolff, A. Rajendran, C. Papachristou, D. Weyer, and W. Clay, "Process reliability based trojans through NBTI and HCI effects," in Conference on Adaptive Hardware and Systems, ser. AHS, 2010, pp. 215-222
-
(2010)
Conference on Adaptive Hardware and Systems
, pp. 215-222
-
-
Shiyanovskii, Y.1
Wolff, F.2
Rajendran, A.3
Papachristou, C.4
Weyer, D.5
Clay, W.6
-
29
-
-
77953101933
-
Fault-based attack of rsa authentication
-
March
-
A. Pellegrini, V. Bertacco, and T. Austin, "Fault-based attack of rsa authentication," in Design, Automation Test in Europe Conference Exhibition (DATE), 2010, March 2010, pp. 855-860
-
(2010)
Design, Automation Test in Europe Conference Exhibition (DATE), 2010
, pp. 855-860
-
-
Pellegrini, A.1
Bertacco, V.2
Austin, T.3
-
30
-
-
84953855392
-
Electromagnetic circuit fingerprints for hardware trojan detection
-
Aug
-
J. Balasch, B. Gierlichs, and I. Verbauwhede, "Electromagnetic circuit fingerprints for hardware trojan detection," in Electromagnetic Compatibility (EMC), 2015 IEEE International Symposium on, Aug 2015, pp. 246-251
-
(2015)
Electromagnetic Compatibility (EMC), 2015 IEEE International Symposium on
, pp. 246-251
-
-
Balasch, J.1
Gierlichs, B.2
Verbauwhede, I.3
-
31
-
-
84944408150
-
Razor: A low-power pipeline based on circuit-level timing speculation
-
Dec
-
D. Ernst, N. S. Kim, S. Das, S. Pant, R. Rao, T. Pham, C. Ziesler, D. Blaauw, T. Austin, K. Flautner, and T. Mudge, "Razor: a low-power pipeline based on circuit-level timing speculation," in Microarchitecture, 2003. MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on, Dec 2003, pp. 7-18
-
(2003)
Microarchitecture, 2003. MICRO-36. Proceedings. 36th Annual IEEE/ACM International Symposium on
, pp. 7-18
-
-
Ernst, D.1
Kim, N.S.2
Das, S.3
Pant, S.4
Rao, R.5
Pham, T.6
Ziesler, C.7
Blaauw, D.8
Austin, T.9
Flautner, K.10
Mudge, T.11
-
32
-
-
84913602963
-
A novel built-in self-authentication technique to prevent inserting hardware trojans
-
Dec
-
K. Xiao, D. Forte, and M. Tehranipoor, "A novel built-in self-authentication technique to prevent inserting hardware trojans," Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, vol. 33, no. 12, pp. 1778-1791, Dec 2014
-
(2014)
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on
, vol.33
, Issue.12
, pp. 1778-1791
-
-
Xiao, K.1
Forte, D.2
Tehranipoor, M.3
|