Author:
Islam Sheikh Ariful,Katkoori Srinivas
Publisher
Springer International Publishing
Reference36 articles.
1. Deloitte: Semiconductors - the Next Wave. https://www2.deloitte.com/content/dam/Deloitte/cn/Documents/technology-media-telecommunications/deloitte-cn-tmt-semiconductors-the-next-wave-en-190422.pdf (2019)
2. Liu, B., Wang, B.: Embedded Reconfigurable Logic for ASIC Design Obfuscation Against Supply Chain Attacks. In: 2014 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1–6 (2014). https://doi.org/10.7873/DATE.2014.256
3. Guin, U., Huang, K., DiMase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain. Proceedings of the IEEE 102(8), 1207–1228 (2014). https://doi.org/10.1109/JPROC.2014.2332291
4. Rostami, M., Koushanfar, F., Karri, R.: A Primer on Hardware Security: Models, Methods, and Metrics. Proceedings of the IEEE 102(8), 1283–1295 (2014). https://doi.org/10.1109/JPROC.2014.2335155
5. Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.: Hardware Trojans: Lessons Learned After One Decade of Research. ACM Transactions on Design Automation of Electronic Systems 22(1), 6:1–6:23 (2016). https://doi.org/10.1145/2906147