相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching
Masoud Rostami et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2014)
Techniques for Foundry Identification
James B. Wendt et al.
2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2014)
Quantitative Intellectual Property Protection Using Physical-Level Characterization
Sheng Wei et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Simple photonic emission analysis of AES
Alexander Schloesser et al.
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)
Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
Farinaz Koushanfar
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition
Eric Love et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection
Farinaz Koushanfar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Introduction to differential power analysis
Paul Kocher et al.
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2011)
Defeating UCI: Building Stealthy and Malicious Hardware
Cynthia Sturton et al.
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)
Silencing Hardware Backdoors
Adam Waksman et al.
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)
ENDING PIRACY OF INTEGRATED CIRCUITS
Jarrod A. Roy et al.
COMPUTER (2010)
TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS
Ramesh Karri et al.
COMPUTER (2010)
A Survey of Hardware Trojan Taxonomy and Detection
Mohammad Tehranipoor et al.
IEEE DESIGN & TEST OF COMPUTERS (2010)
Preventing IC Piracy Using Reconfigurable Logic Barriers
Alex Baumgarten et al.
IEEE DESIGN & TEST OF COMPUTERS (2010)
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
Rajat Subhra Chakraborty et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2009)
Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
Daniel E. Holcomb et al.
IEEE TRANSACTIONS ON COMPUTERS (2009)
Securing designs against scan-based side-channel attacks
Jeremy Lee et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)
Semiconductor, manufacturers' efforts to improve trust in the electronic part supply chain
Kaushik Chatterjee et al.
IEEE TRANSACTIONS ON COMPONENTS AND PACKAGING TECHNOLOGIES (2007)
Secure scan: A design-for-test architecture for crypto chips
Bo Yang et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2006)
The sorcerer's apprentice guide to fault attacks
H Bar-El et al.
PROCEEDINGS OF THE IEEE (2006)
NBTI degradation: From physical mechanisms to modelling
V Huard et al.
MICROELECTRONICS RELIABILITY (2006)
Behavioral synthesis techniques for intellectual property protection
F Koushanfar et al.
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2005)
Effective iteractive techniques for fingerprinting design IP
AE Caldwell et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2004)
Balanced self-checking asynchronous logic for smart card applications
S Moore et al.
MICROPROCESSORS AND MICROSYSTEMS (2003)
Secure contactless smartcard ASIC with DPA protection
P Rakers et al.
IEEE JOURNAL OF SOLID-STATE CIRCUITS (2001)