-
1
-
-
44449083733
-
The hunt for the kill switch
-
Adee, S., The hunt for the kill switch. IEEE Spectr. 45:5 (2008), 34–39.
-
(2008)
IEEE Spectr.
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
2
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, Trojan detection using IC fingerprinting, in: Security and Privacy, 2007. SP ’07. IEEE Symposium on, 2007, pp. 296–310.
-
(2007)
Security and Privacy, 2007. SP ’07. IEEE Symposium on
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
3
-
-
84903160954
-
Fort-NoCs: Mitigating the threat of a compromised NoC
-
D.M. Ancajas, K. Chakraborty, S. Roy, Fort-NoCs: Mitigating the threat of a compromised NoC, in: Proceedings of the the 51st Annual Design Automation Conference on Design Automation Conference, DAC ’14, 2014.
-
(2014)
Proceedings of the the 51st Annual Design Automation Conference on Design Automation Conference, DAC ’14
-
-
Ancajas, D.M.1
Chakraborty, K.2
Roy, S.3
-
4
-
-
84898929519
-
Protection against hardware trojan attacks: Towards a comprehensive solution
-
Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M., Plusquellic, J., Tehranipoor, M., Protection against hardware trojan attacks: Towards a comprehensive solution. IEEE Des. Test 30:3 (2013), 6–17.
-
(2013)
IEEE Des. Test
, vol.30
, Issue.3
, pp. 6-17
-
-
Bhunia, S.1
Abramovici, M.2
Agrawal, D.3
Bradley, P.4
Hsiao, M.5
Plusquellic, J.6
Tehranipoor, M.7
-
5
-
-
84905099969
-
Hardware trojan attacks: Threat analysis and countermeasures
-
Bhunia, S., Hsiao, M., Banga, M., Narasimhan, S., Hardware trojan attacks: Threat analysis and countermeasures. Proc. IEEE, 102(8), 2014, 1229–1247.
-
(2014)
Proc. IEEE
, vol.102
, Issue.8
, pp. 1229-1247
-
-
Bhunia, S.1
Hsiao, M.2
Banga, M.3
Narasimhan, S.4
-
6
-
-
84973621386
-
Packet security with path sensitization for NoCs
-
T. Boraten, A. Kodi, Packet security with path sensitization for NoCs, in: Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), DATE-16, 2016.
-
(2016)
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), DATE-16
-
-
Boraten, T.1
Kodi, A.2
-
7
-
-
34547261834
-
Thousand core chips: a technology perspective
-
ACM New York, NY, USA
-
Borkar, S., Thousand core chips: a technology perspective. Proceedings of the 44th Annual Design Automation Conference, DAC ’07, 2007, ACM, New York, NY, USA, 746–749.
-
(2007)
Proceedings of the 44th Annual Design Automation Conference, DAC ’07
, pp. 746-749
-
-
Borkar, S.1
-
8
-
-
70350583030
-
MERO: A statistical approach for hardware trojan detection
-
R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: A statistical approach for hardware trojan detection, in: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’09, 2009.
-
(2009)
Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ’09
-
-
Chakraborty, R.S.1
Wolff, F.2
Paul, S.3
Papachristou, C.4
Bhunia, S.5
-
9
-
-
84937714298
-
CC-Hunter: Uncovering covert timing channels on shared processor hardware
-
J. Chen, G. Venkataramani, CC-Hunter: Uncovering covert timing channels on shared processor hardware, in: Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-47, 2014, pp. 216–228.
-
(2014)
Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-47
, pp. 216-228
-
-
Chen, J.1
Venkataramani, G.2
-
10
-
-
44449149774
-
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
-
R. Cramer, Y. Dodis, S. Fehr, C. Padró, D. Wichs, Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors, in: Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology, EUROCRYPT'08, 2008, pp. 471–488.
-
(2008)
Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology, EUROCRYPT'08
, pp. 471-488
-
-
Cramer, R.1
Dodis, Y.2
Fehr, S.3
Padró, C.4
Wichs, D.5
-
11
-
-
84893237143
-
Robustness analysis of mesh-based network-on-chip architecture under flooding-based denial of service attacks
-
D. Fang, H. Li, J. Han, X. Zeng, Robustness analysis of mesh-based network-on-chip architecture under flooding-based denial of service attacks, in: Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on, 2013, pp. 178–186.
-
(2013)
Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on
, pp. 178-186
-
-
Fang, D.1
Li, H.2
Han, J.3
Zeng, X.4
-
12
-
-
85026768901
-
-
Challenges and Concerns of the Semiconductor Equipment and Materials Industry, Tech. Rep. Semiconductor Equipment and Materials International
-
Intellectual Property (IP) Challenges and Concerns of the Semiconductor Equipment and Materials Industry, Tech. Rep. Semiconductor Equipment and Materials International, 2008.
-
(2008)
-
-
-
13
-
-
84984611807
-
Runtime detection of a bandwidth denial attack from a rogue network-on-chip
-
Proceedings of the 9th International Symposium on Networks-on-Chip, NOCS ’15, 2015, pp. 8:1–8:8.
-
R. JS, D.M. Ancajas, K. Chakraborty, S. Roy, Runtime detection of a bandwidth denial attack from a rogue network-on-chip, in: Proceedings of the 9th International Symposium on Networks-on-Chip, NOCS ’15, 2015, pp. 8:1–8:8.
-
-
-
JS, R.1
Ancajas, D.M.2
Chakraborty, K.3
Roy, S.4
-
14
-
-
0034334788
-
Chip detectives [reverse engineering]
-
Kumagai, J., Chip detectives [reverse engineering]. IEEE Spectr. 37:11 (2000), 43–48.
-
(2000)
IEEE Spectr.
, vol.37
, Issue.11
, pp. 43-48
-
-
Kumagai, J.1
-
16
-
-
84876544326
-
NoCAlert: An on-line and real-time fault detection mechanism for network-on-chip architectures
-
A. Prodromou, A. Panteli, C. Nicopoulos, Y. Sazeides, NoCAlert: An on-line and real-time fault detection mechanism for network-on-chip architectures, in: Microarchitecture (MICRO), 2012 45th Annual IEEE/ACM International Symposium on, 2012, pp. 60–71.
-
(2012)
Microarchitecture (MICRO), 2012 45th Annual IEEE/ACM International Symposium on
, pp. 60-71
-
-
Prodromou, A.1
Panteli, A.2
Nicopoulos, C.3
Sazeides, Y.4
-
17
-
-
85026787282
-
-
Report of the Defense Science Board Task Force on High Performance Microchip Supply, Tech. Rep. Defense ScienceBoard, US DoD
-
Report of the Defense Science Board Task Force on High Performance Microchip Supply, Tech. Rep. Defense ScienceBoard, US DoD, 2005.
-
(2005)
-
-
-
18
-
-
85013384822
-
Cotd: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
-
Salmani, H., Cotd: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12:2 (2017), 338–350.
-
(2017)
IEEE Trans. Inf. Forensics Secur.
, vol.12
, Issue.2
, pp. 338-350
-
-
Salmani, H.1
-
19
-
-
84940426322
-
Trustworthy hardware from untrusted components
-
Sethumadhavan, S., Waksman, A., Suozzo, M., Huang, Y., Eum, J., Trustworthy hardware from untrusted components. Commun. ACM 58:9 (2015), 60–71.
-
(2015)
Commun. ACM
, vol.58
, Issue.9
, pp. 60-71
-
-
Sethumadhavan, S.1
Waksman, A.2
Suozzo, M.3
Huang, Y.4
Eum, J.5
-
20
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
Tehranipoor, M., Koushanfar, F., A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27:1 (2010), 10–25.
-
(2010)
IEEE Des. Test Comput.
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
21
-
-
84889045329
-
FANCI: Identification of stealthy malicious logic using boolean functional analysis
-
ACM
-
Waksman, A., Suozzo, M., Sethumadhavan, S., FANCI: Identification of stealthy malicious logic using boolean functional analysis. Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS ’13, 2013, ACM, 697–708.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS ’13
, pp. 697-708
-
-
Waksman, A.1
Suozzo, M.2
Sethumadhavan, S.3
-
22
-
-
67649998710
-
Hardware Trojan detection and isolation using current integration and localized current analysis
-
X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan detection and isolation using current integration and localized current analysis, in: Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08. IEEE International Symposium on, 2008.
-
(2008)
Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08. IEEE International Symposium on
-
-
Wang, X.1
Salmani, H.2
Tehranipoor, M.3
Plusquellic, J.4
-
24
-
-
84869198775
-
New error detecting codes for the design of hardware resistant to strong fault injection attacks
-
Z. Wang, M. Karpovsky, New error detecting codes for the design of hardware resistant to strong fault injection attacks, in: International Conference on Security and Management, 2012.
-
(2012)
International Conference on Security and Management
-
-
Wang, Z.1
Karpovsky, M.2
-
26
-
-
84881183208
-
SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip
-
Wassel, H.M.G., Gao, Y., Oberg, J.K., Huffmire, T., Kastner, R., Chong, F.T., Sherwood, T., SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip. SIGARCH Comput. Archit. News 41:3 (2013), 583–594.
-
(2013)
SIGARCH Comput. Archit. News
, vol.41
, Issue.3
, pp. 583-594
-
-
Wassel, H.M.G.1
Gao, Y.2
Oberg, J.K.3
Huffmire, T.4
Kastner, R.5
Chong, F.T.6
Sherwood, T.7
-
27
-
-
84891339153
-
Exploiting error control approaches for hardware trojans on Network-on-Chip links
-
Q. Yu, J. Frey, Exploiting error control approaches for hardware trojans on Network-on-Chip links, in: Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT, 2013 IEEE International Symposium on, 2013.
-
(2013)
Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT, 2013 IEEE International Symposium on
-
-
Yu, Q.1
Frey, J.2
|