4.7 Article

A Primer on Hardware Security: Models, Methods, and Metrics

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

Masoud Rostami et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2014)

Proceedings Paper Automation & Control Systems

Techniques for Foundry Identification

James B. Wendt et al.

2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2014)

Article Computer Science, Theory & Methods

Quantitative Intellectual Property Protection Using Physical-Level Characterization

Sheng Wei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

Simple photonic emission analysis of AES

Alexander Schloesser et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)

Article Computer Science, Theory & Methods

Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management

Farinaz Koushanfar

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition

Eric Love et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection

Farinaz Koushanfar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Theory & Methods

Introduction to differential power analysis

Paul Kocher et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2011)

Proceedings Paper Computer Science, Information Systems

Defeating UCI: Building Stealthy and Malicious Hardware

Cynthia Sturton et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)

Proceedings Paper Computer Science, Information Systems

Silencing Hardware Backdoors

Adam Waksman et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)

Article Computer Science, Hardware & Architecture

ENDING PIRACY OF INTEGRATED CIRCUITS

Jarrod A. Roy et al.

COMPUTER (2010)

Article Computer Science, Hardware & Architecture

TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS

Ramesh Karri et al.

COMPUTER (2010)

Article Computer Science, Hardware & Architecture

A Survey of Hardware Trojan Taxonomy and Detection

Mohammad Tehranipoor et al.

IEEE DESIGN & TEST OF COMPUTERS (2010)

Article Computer Science, Hardware & Architecture

Preventing IC Piracy Using Reconfigurable Logic Barriers

Alex Baumgarten et al.

IEEE DESIGN & TEST OF COMPUTERS (2010)

Article Computer Science, Hardware & Architecture

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

Rajat Subhra Chakraborty et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2009)

Article Computer Science, Hardware & Architecture

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers

Daniel E. Holcomb et al.

IEEE TRANSACTIONS ON COMPUTERS (2009)

Article Computer Science, Hardware & Architecture

Securing designs against scan-based side-channel attacks

Jeremy Lee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)

Article Engineering, Manufacturing

Semiconductor, manufacturers' efforts to improve trust in the electronic part supply chain

Kaushik Chatterjee et al.

IEEE TRANSACTIONS ON COMPONENTS AND PACKAGING TECHNOLOGIES (2007)

Article Computer Science, Hardware & Architecture

Secure scan: A design-for-test architecture for crypto chips

Bo Yang et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2006)

Article Engineering, Electrical & Electronic

The sorcerer's apprentice guide to fault attacks

H Bar-El et al.

PROCEEDINGS OF THE IEEE (2006)

Article Engineering, Electrical & Electronic

NBTI degradation: From physical mechanisms to modelling

V Huard et al.

MICROELECTRONICS RELIABILITY (2006)

Article Computer Science, Hardware & Architecture

Behavioral synthesis techniques for intellectual property protection

F Koushanfar et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2005)

Article Computer Science, Hardware & Architecture

Effective iteractive techniques for fingerprinting design IP

AE Caldwell et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2004)

Article Computer Science, Hardware & Architecture

Balanced self-checking asynchronous logic for smart card applications

S Moore et al.

MICROPROCESSORS AND MICROSYSTEMS (2003)

Article Engineering, Electrical & Electronic

Secure contactless smartcard ASIC with DPA protection

P Rakers et al.

IEEE JOURNAL OF SOLID-STATE CIRCUITS (2001)