메뉴 건너뛰기




Volumn , Issue , 2016, Pages 18-37

A2: Analog Malicious Hardware

Author keywords

analog; attack; malicious hardware; security; Trojan

Indexed keywords

DESIGN; FLIP FLOP CIRCUITS; HARDWARE; INTEGRATED CIRCUIT DESIGN; PULSE ANALYZING CIRCUITS; RECONFIGURABLE HARDWARE;

EID: 84987642016     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2016.10     Document Type: Conference Paper
Times cited : (230)

References (32)
  • 3
    • 84987613342 scopus 로고    scopus 로고
    • S. S. Technology Oct
    • S. S. Technology. (2012, Oct.) Why node shrinks are no longer offsetting equipment costs. [Online]. Available: http://electroiq.com/blog/2012/10/ why-node-shrinks-are-no-longer-offsetting-equipment-costs
    • (2012)
  • 8
    • 51849095999 scopus 로고    scopus 로고
    • Hardware trojan detection using path delay fingerprint
    • ser. HOST. Washington, DC: IEEE Computer Society
    • Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," in Hardware-Oriented Security and Trust, ser. HOST. Washington, DC: IEEE Computer Society, 2008, pp. 51-57
    • (2008) Hardware-Oriented Security and Trust , pp. 51-57
    • Jin, Y.1    Makris, Y.2
  • 9
    • 70350733802 scopus 로고    scopus 로고
    • Hardware Trojan horse detection using gate-level characterization
    • ser. DAC
    • M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, "Hardware Trojan horse detection using gate-level characterization," in Design Automation Conference, ser. DAC, vol. 46, 2009, pp. 688-693
    • (2009) Design Automation Conference , vol.46 , pp. 688-693
    • Potkonjak, M.1    Nahapetian, A.2    Nelson, M.3    Massey, T.4
  • 10
    • 80051985183 scopus 로고    scopus 로고
    • TeSR: A robust temporal self-referencing approach for hardware trojan detection
    • ser. HOST. San Diego, CA: IEEE Computer Society, Jun
    • S. Narasimhan, X. Wang, D. Du, R. S. Chakraborty, and S. Bhunia, "TeSR: A Robust Temporal Self-Referencing Approach for Hardware Trojan Detection," in Hardware-Oriented Security and Trust, ser. HOST. San Diego, CA: IEEE Computer Society, Jun. 2011, pp. 71-74
    • (2011) Hardware-Oriented Security and Trust , pp. 71-74
    • Narasimhan, S.1    Wang, X.2    Du, D.3    Chakraborty, R.S.4    Bhunia, S.5
  • 11
    • 51849099113 scopus 로고    scopus 로고
    • At-speed delay characterization for IC authentication and trojan horse detection
    • ser. HOST. Washington, DC: IEEE Computer Society
    • J. Li and J. Lach, "At-speed Delay Characterization for IC Authentication and Trojan Horse Detection," in Hardware-Oriented Security and Trust, ser. HOST. Washington, DC: IEEE Computer Society, 2008, pp. 8-14
    • (2008) Hardware-Oriented Security and Trust , pp. 8-14
    • Li, J.1    Lach, J.2
  • 12
    • 84893407514 scopus 로고    scopus 로고
    • Temperature tracking: An innovative run-time approach for hardware trojan detection
    • ser. ICCAD. IEEE
    • D. Forte, C. Bao, and A. Srivastava, "Temperature Tracking: An Innovative Run-time Approach for Hardware Trojan Detection," in International Conference on Computer-Aided Design, ser. ICCAD. IEEE, 2013, pp. 532-539
    • (2013) International Conference on Computer-Aided Design , pp. 532-539
    • Forte, D.1    Bao, C.2    Srivastava, A.3
  • 13
    • 84925483377 scopus 로고    scopus 로고
    • Detecting hardware trojans using on-chip sensors in an ASIC design
    • Feb
    • S. Kelly, X. Zhang, M. Tehranipoor, and A. Ferraiuolo, "Detecting Hardware Trojans Using On-chip Sensors in an ASIC Design," Journal of Electronic Testing, vol. 31, no. 1, pp. 11-26, Feb. 2015
    • (2015) Journal of Electronic Testing , vol.31 , Issue.1 , pp. 11-26
    • Kelly, S.1    Zhang, X.2    Tehranipoor, M.3    Ferraiuolo, A.4
  • 14
    • 80051995886 scopus 로고    scopus 로고
    • Silencing hardware backdoors
    • ser. S and P Oakland, CA: IEEE Computer Society, May
    • A. Waksman and S. Sethumadhavan, "Silencing Hardware Backdoors," in IEEE Security and Privacy, ser. S and P Oakland, CA: IEEE Computer Society, May 2011
    • (2011) IEEE Security and Privacy
    • Waksman, A.1    Sethumadhavan, S.2
  • 16
    • 84939177821 scopus 로고    scopus 로고
    • OpenCores.org. OpenRISC OR1200 processor. [Online]. Available: http://opencores.org/or1k/OR1200\ OpenRISC\ Processor
    • OpenRISC OR1200 Processor
  • 20
    • 84987607262 scopus 로고    scopus 로고
    • Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
    • Dec
    • M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith, "Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically," USENIX ;login, vol. 35, no. 6, pp. 31-41, Dec. 2010
    • (2010) USENIX ;Login , vol.35 , Issue.6 , pp. 31-41
    • Hicks, M.1    Finnicum, M.2    King, S.T.3    Martin, M.M.K.4    Smith, J.M.5
  • 23
    • 84903192618 scopus 로고    scopus 로고
    • Detecting reliability attacks during split fabrication using test-only BEOL stack
    • ser. DAC,IEEE, Jun
    • K. Vaidyanathan, B. Das, and L. Pileggi, "Detecting reliability attacks during split fabrication using test-only BEOL stack," in Design Automation Conference, ser. DAC, vol. 51. IEEE, Jun. 2014, pp. 1-6
    • (2014) Design Automation Conference , vol.51 , pp. 1-6
    • Vaidyanathan, K.1    Das, B.2    Pileggi, L.3
  • 26
    • 85050526631 scopus 로고    scopus 로고
    • Securing computer hardware using 3d integrated circuit (IC) technology and split manufacturing for obfuscation
    • ser. Security. USENIX Association
    • F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara, "Securing Computer Hardware Using 3d Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation," in Conference on Security, ser. Security. USENIX Association, 2013, pp. 495-510
    • (2013) Conference on Security , pp. 495-510
    • Imeson, F.1    Emtenan, A.2    Garg, S.3    Tripunitara, M.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.