-
2
-
-
44449083733
-
The hunt for the kill switch
-
may
-
ADEE, S. The hunt for the kill switch. IEEE Spectrum 45, 5 (may 2008), 34-39.
-
(2008)
IEEE Spectrum
, vol.45
, Issue.5
, pp. 34-39
-
-
Adee, S.1
-
3
-
-
34548719905
-
Trojan detection using IC fingerprinting
-
AGRAWAL, D., BAKTIR, S., KARAKOYUNLU, D., ROHATGI, P., and SUNAR, B. Trojan detection using IC fingerprinting. In Proceedings of the IEEE Symposium on Security and Privacy (2007), IEEE, pp. 296-310.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
6
-
-
33747566850
-
3-D ICs: A novel chip design for improving deep-submicrometer interconnect performance and systems-on-chip integration
-
BANERJEE, K., and SOURI., S. J., KAPUR, P., and SARASWAT, K. C. 3-D ICs: A novel chip design for improving deep-submicrometer interconnect performance and systems-on-chip integration. Proceedings of the IEEE 89, 5 (2001), 602-633.
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.5
, pp. 602-633
-
-
Banerjee, K.1
Souri, S.J.2
Kapur, P.3
Saraswat, K.C.4
-
7
-
-
84893143614
-
3D execution monitor (3D-EM): Using 3D circuits to detect hardware Malicious inclusions in general purpose processors
-
Academic Conferences Limited, p
-
BILZOR, M. 3D execution monitor (3D-EM): Using 3D circuits to detect hardware malicious inclusions in general purpose processors. In Proceedings of the 6th International Conference on Information Warfare and Security (2011), Academic Conferences Limited, p. 288.
-
(2011)
Proceedings of the 6th International Conference on Information Warfare and Security
, pp. 288
-
-
Bilzor, M.1
-
9
-
-
0003130498
-
On the importance of checking cryptographic protocols for faults
-
Springer
-
BONEH, D., DEMILLO, R., and LIPTON, R. On the importance of checking cryptographic protocols for faults. In Advances in Cryptology - EUROCRYPT (1997), Springer, pp. 37-51.
-
(1997)
Advances in Cryptology - EUROCRYPT
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
11
-
-
76649097322
-
Hardware trojan: Threats and emerging solutions
-
CHAKRABORTY, R. S., NARASIMHAN, S., and BHUNIA, S. Hardware trojan: Threats and emerging solutions. In Proceedings of the IEEE International Workshop on High Level Design Validation and Test (HLDVT) (2009), IEEE, pp. 166-171.
-
(2009)
Proceedings of the IEEE International Workshop on High Level Design Validation and Test (HLDVT)
, pp. 166-171
-
-
Chakraborty, R.S.1
Narasimhan, S.2
Bhunia, S.3
-
12
-
-
84890410415
-
Performance evaluation of the vf graph matching algorithm
-
CORDELLA, L. P., FOGGIA, P., SANSONE, C., and VENTO, M. Performance evaluation of the vf graph matching algorithm. In Proceedings of the International Conference on Image Analysis and Processing (1999), IEEE, pp. 1172-1177.
-
(1999)
Proceedings of the International Conference on Image Analysis and Processing
, pp. 1172-1177
-
-
Cordella, L.P.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
13
-
-
28344452134
-
Demystifying 3D ICs: The pros and cons of going vertical
-
DAVIS, W. R., WILSON, J., MICK, S., XU, J., HUA, H., MI-NEO, C., SULE, A. M., STEER, M., and FRANZON, P. D. Demystifying 3D ICs: the pros and cons of going vertical. Design & Test of Computers, IEEE 22, 6 (2005), 498-510.
-
(2005)
Design & Test of Computers, IEEE
, vol.22
, Issue.6
, pp. 498-510
-
-
Davis, W.R.1
Wilson, J.2
Mick, S.3
Xu, J.4
Hua, H.5
Mi-Neo, C.6
Sule, A.M.7
Steer, M.8
Franzon, P.D.9
-
15
-
-
0345766984
-
A performance comparison of five algorithms for graph isomorphism
-
FOGGIA, P., SANSONE, C., and VENTO, M. A performance comparison of five algorithms for graph isomorphism. In Proceedings of the 3rd IAPR TC-15 Workshop on Graph-based Representations in Pattern Recognition (2001), pp. 188-199.
-
(2001)
Proceedings of the 3rd IAPR TC-15 Workshop on Graph-based Representations in Pattern Recognition
, pp. 188-199
-
-
Foggia, P.1
Sansone, C.2
Vento, M.3
-
17
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing Malicious hardware automatically
-
HICKS, M., FINNICUM, M., KING, S. T., and MARTIN., M. M., and SMITH, J. M. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Proceedings of the IEEE Symposium on Security and Privacy (2010), IEEE, pp. 159-172.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 159-172
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.4
Smith, J.M.5
-
19
-
-
85084095841
-
Designing and implementing Malicious hardware
-
USENIX Association
-
KING, S., TUCEK, J., COZZIE, A., GRIER, C., JIANG, W., and ZHOU, Y. Designing and implementing malicious hardware. In Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (2008), USENIX Association, pp. 1-8.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats
, pp. 1-8
-
-
King, S.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
21
-
-
84866861395
-
TSV interposer: The most cost-effective integrator for 3D IC integration
-
LAU, J. H. TSV interposer: The most cost-effective integrator for 3D IC integration. Chip Scale Review (2011), 23-27.
-
(2011)
Chip Scale Review
, pp. 23-27
-
-
Lau, J.H.1
-
22
-
-
0012524599
-
-
Kluwer Academic Publishers, Boston, Massachusetts, Mar.
-
MICCIANCIO, D., and GOLDWASSER, S. Complexity of Lattice Problems: a cryptographic perspective, Vol. 671 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Boston, Massachusetts, Mar. 2002.
-
(2002)
Complexity of Lattice Problems: A Cryptographic Perspective, Vol. 671 of the Kluwer International Series in Engineering and Computer Science
-
-
Micciancio, D.1
Goldwasser, S.2
-
24
-
-
84863542083
-
Security analysis of logic obfuscation
-
RAJENDRAN, J., PINO, Y., SINANOGLU, O., and KARRI, R. Security analysis of logic obfuscation. In Proceedings of the 49th Annual Design Automation Conference (2012), ACM, pp. 83-89.
-
(2012)
Proceedings of the 49th Annual Design Automation Conference
, pp. 83-89
-
-
Rajendran, J.1
Pino, Y.2
Sinanoglu, O.3
Karri, R.4
-
25
-
-
84885675324
-
Is split manufacturing secure?
-
RAJENDRAN, J., SINANOGLU, O., and KARRI, R. Is split manufacturing secure? In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE) (2013), IEEE, pp. 1259-1264.
-
(2013)
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE)
, pp. 1259-1264
-
-
Rajendran, J.1
Sinanoglu, O.2
Karri, R.3
-
26
-
-
49749134668
-
Epic: Ending piracy of integrated circuits
-
ROY, J. A., KOUSHANFAR, F., and MARKOV, I. L. Epic: Ending piracy of integrated circuits. In Proceedings of the conference on Design, Automation and Test in Europe (2008), ACM, pp. 1069-1074.
-
(2008)
Proceedings of the Conference on Design, Automation and Test in Europe
, pp. 1069-1074
-
-
Roy, J.A.1
Koushanfar, F.2
Markov, I.L.3
-
27
-
-
0003101648
-
Sequential circuit design using synthesis and optimization
-
SENTOVICH, E. M., and SINGH., K. J., MOON, C., SAVOJ, H., BRAYTON, R. K., and SANGIOVANNI-VINCENTELLI, A. Sequential circuit design using synthesis and optimization. In Proceedings of the IEEE International Conference on Computer Design (ICCD) (1992), IEEE, pp. 328-333.
-
(1992)
Proceedings of the IEEE International Conference on Computer Design (ICCD)
, pp. 328-333
-
-
Sentovich, E.M.1
Singh, K.J.2
Moon, C.3
Savoj, H.4
Brayton, R.K.5
Sangiovanni-Vincentelli, A.6
-
29
-
-
34547366652
-
Minisat v1. 13 - A sat solver with conflict-clause minimization
-
SORENSSON, N., and EEN, N. Minisat v1. 13-a sat solver with conflict-clause minimization. SAT 2005 (2005), 53.
-
(2005)
SAT
, vol.2005
, pp. 53
-
-
Sorensson, N.1
Een, N.2
-
31
-
-
76949093207
-
A survey of hardware trojan taxonomy and detection
-
TEHRANIPOOR, M., and KOUSHANFAR, F. A survey of hardware trojan taxonomy and detection. Design & Test of Computers, IEEE 27, 1 (2010), 10-25.
-
(2010)
Design & Test of Computers, IEEE
, vol.27
, Issue.1
, pp. 10-25
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
32
-
-
78650093553
-
Hardware assistance for trustworthy systems through 3-D integration
-
VALAMEHR, J., TIWARI, M., SHERWOOD, T., KASTNER, R., HUFFMIRE, T., IRVINE, C., and LEVIN, T. Hardware assistance for trustworthy systems through 3-D integration. In Proceedings of the 26th Annual Computer Security Applications Conference (2010), ACM, pp. 199-210.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 199-210
-
-
Valamehr, J.1
Tiwari, M.2
Sherwood, T.3
Kastner, R.4
Huffmire, T.5
Irvine, C.6
Levin, T.7
|