-
2
-
-
84947567130
-
Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant?
-
Albright, D., Brannan, P., and Walrond, C. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Institute for Science and International Security 2010.
-
(2010)
Institute for Science and International Security
-
-
Albright, D.1
Brannan, P.2
Walrond, C.3
-
3
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., and Sunar, B. Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, 2007, pp. 296-310.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
4
-
-
56749145922
-
Guided test generation for isolation and detection of embedded Trojans in ics
-
Banga, M., Chandrasekar, M., Fang, L., and Hsiao, M.S. Guided test generation for isolation and detection of embedded Trojans in ics. In: Proceedings of the 18th ACM Great Lakes symposium on VLSI, 2008, pp. 363-366.
-
(2008)
Proceedings of the 18th ACM Great Lakes Symposium on VLSI
, pp. 363-366
-
-
Banga, M.1
Chandrasekar, M.2
Fang, L.3
Hsiao, M.S.4
-
5
-
-
76649097322
-
Hardware Trojan: Threats and emerging solutions
-
Chakraborty, R.S., Narasimhan, S., and Bhunia, S. Hardware Trojan: Threats and emerging solutions. In: High Level Design Validation and Test Workshop, 2009 IEEE International, 2009, pp. 166-171.
-
(2009)
High Level Design Validation and Test Workshop, 2009 IEEE International
, pp. 166-171
-
-
Chakraborty, R.S.1
Narasimhan, S.2
Bhunia, S.3
-
7
-
-
84956793198
-
FBI Director: China Has Hacked Every Big US Company
-
Accessed Oct. 10, 2014
-
Cook, J. (2014). "FBI Director: China Has Hacked Every Big US Company," Business Insider. Accessed Oct. 10, 2014 from http://www.businessinsider.com/fbi-director-china-has-hacked-every-big-us-company-2014-10.
-
(2014)
Business Insider
-
-
Cook, J.1
-
8
-
-
85041615754
-
-
Digital Manufacturing and Design Innovation (DMDI) Institute
-
Digital Manufacturing and Design Innovation (DMDI) Institute (2013). "Overview - Digital Manufacturing and Design Innovation (DMDI) Institute." Retrieved from http://www.manufacturing.gov/docs/dmdi-overview.pdf.
-
(2013)
Overview - Digital Manufacturing and Design Innovation (DMDI) Institute
-
-
-
9
-
-
78049331855
-
Self-referencing: A scalable side channel approach for hardware Trojan detection
-
Du, D., Narasimhan, S., Chakraborty, R.S., and Bhunia, S. Self-referencing: a scalable side channel approach for hardware Trojan detection. In: Cryptographic Hardware and Embedded Systems, CHES, 2010, pp. 173-187.
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES
, pp. 173-187
-
-
Du, D.1
Narasimhan, S.2
Chakraborty, R.S.3
Bhunia, S.4
-
10
-
-
85026311479
-
-
GE Accessed on Jan. 5, 2015
-
GE (2013). "GE jet engine bracket challenge," GE. Accessed on Jan. 5, 2015 from https://grabcad.com/challenges/ge-jet-engine-bracket-challenge.
-
(2013)
GE Jet Engine Bracket Challenge GE
-
-
-
11
-
-
70449134838
-
Experiences in hardware Trojan design and implementation
-
Jin, Y., Kupp, N., and Makris, Y. Experiences in hardware Trojan design and implementation. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2009, pp. 50-57.
-
(2009)
IEEE International Workshop on Hardware-Oriented Security and Trust
, pp. 50-57
-
-
Jin, Y.1
Kupp, N.2
Makris, Y.3
-
12
-
-
0028338103
-
Coupled electromechanical analysis of adaptive material systems - Determination of the actuator power-consumption and system energy-transfer
-
Liang, C., Sun, F.P., and Rogers, C.A. Coupled electromechanical analysis of adaptive material systems - Determination of the actuator power-consumption and system energy-transfer. Journal of Intelligent Material Systems and Structures, 1994, 5: 12-20.
-
(1994)
Journal of Intelligent Material Systems and Structures
, vol.5
, pp. 12-20
-
-
Liang, C.1
Sun, F.P.2
Rogers, C.A.3
-
13
-
-
70449730263
-
Trojan side-channels: Lightweight hardware Trojans through side-channel engineering
-
Lin, L., Kasper, M., Güneysu, T., Paar, C., and Burleson, W. Trojan side-channels: Lightweight hardware Trojans through side-channel engineering. In: Cryptographic Hardware and Embedded Systems-CHES 2009, 2009, pp. 382-39.
-
(2009)
Cryptographic Hardware and Embedded Systems-CHES 2009
, pp. 382-439
-
-
Lin, L.1
-
14
-
-
77955753636
-
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
-
Narasimhan, S., Du, D., Chakraborty, R.S., Paul, S., Wolff, F., Papachristou, C., Roy, K., and Bhunia, S. Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Hardware-Oriented Security and Trust, 2010 IEEE International Symposium, 2010, pp. 13-18.
-
(2010)
Hardware-Oriented Security and Trust, 2010 IEEE International Symposium
, pp. 13-18
-
-
Narasimhan, S.1
Du, D.2
Chakraborty, R.S.3
Paul, S.4
Wolff, F.5
Papachristou, C.6
Roy, K.7
Bhunia, S.8
-
15
-
-
85011003287
-
-
National Defense Industrial Association
-
National Defense Industrial Association (2014). "Cybersecurity for Advanced Manufacturing." Retrieved from http://www.ndia.org/Advocacy/LegislativeandFederalIssuesUpdate/Documents/.Cyber-for-Manufacturing-White-Paper-5May14.pdf.
-
(2014)
Cybersecurity for Advanced Manufacturing
-
-
-
16
-
-
36749063889
-
Frequency Range Selection for Impedance-Based Structural Health Monitoring
-
Peairs, D., M., Tarazaga, P.A., and Inman, D.J. Frequency Range Selection for Impedance-Based Structural Health Monitoring. Journal of Vibration and Acoustics, 2007; 129(6): 701-709.
-
(2007)
Journal of Vibration and Acoustics
, vol.129
, Issue.6
, pp. 701-709
-
-
Peairs, D.M.1
Tarazaga, P.A.2
Inman, D.J.3
-
17
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems (TECS), 2004; 3(3): 461-491.
-
(2004)
ACM Transactions on Embedded Computing Systems (TECS)
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
18
-
-
67349234566
-
Damage detection in assembly fixtures using non-destructive electromechanical impedance sensors and multivariate statistics
-
Rickli, J.L. and Camelio, J.A. Damage detection in assembly fixtures using non-destructive electromechanical impedance sensors and multivariate statistics. The International Journal of Advanced Manufacturing Technology, 2009; 42(9-10): 1005-1015.
-
(2009)
The International Journal of Advanced Manufacturing Technology
, vol.42
, Issue.9-10
, pp. 1005-1015
-
-
Rickli, J.L.1
Camelio, J.A.2
-
20
-
-
85041611744
-
Cyber-physical Vulnerabilities in Additive Manufacturing Systems
-
Austin, TX
-
Strum, L.D., Williams, C B., Camelio, J., White, J., and Parker, R. Cyber-physical Vulnerabilities in Additive Manufacturing Systems. In: International Solid Freeform Fabrication Symposium, 2014, Austin, TX.
-
(2014)
International Solid Freeform Fabrication Symposium
-
-
Strum, L.D.1
Williams, C.B.2
Camelio, J.3
White, J.4
Parker, R.5
-
22
-
-
51849111151
-
Detecting malicious inclusions in secure hardware: Challenges and solutions
-
Wang, X., Tehranipoor, M., and Plusquellic, J. Detecting malicious inclusions in secure hardware: Challenges and solutions. In: Hardware-Oriented Security and Trust, 2008 IEEE International Workshop, 2008, pp. 15-19.
-
(2008)
Hardware-Oriented Security and Trust, 2008 IEEE International Workshop
, pp. 15-19
-
-
Wang, X.1
Tehranipoor, M.2
Plusquellic, J.3
-
23
-
-
84899102995
-
Cyber-Physical Security Challenges in Manufacturing Systems
-
Wells, L.J., Camelio, J.A., Williams, C.B., and White, J. Cyber-Physical Security Challenges in Manufacturing Systems. Manufacturing Letters, 2014; 2(2): 74-77.
-
(2014)
Manufacturing Letters
, vol.2
, Issue.2
, pp. 74-77
-
-
Wells, L.J.1
Camelio, J.A.2
Williams, C.B.3
White, J.4
|