Author:
Ray Sandip,Basak Abhishek,Bhunia Swarup
Publisher
Springer International Publishing
Reference12 articles.
1. A. Basak, S. Bhunia, S. Ray, A flexible architecture for systematic implementation of SoC security policies, in IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2015), pp. 536–543
2. R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware Trojan detection, in Workshop on Cryptographic Hardware and Embedded Systems (2009)
3. J.A. Goguen, J. Meseguer, Security policies and security models, in Proceedings of 1982 IEEE Symposium on Security and Privacy (1982), pp. 11–20
4. S.J. Greenwald, Discussion topic: what is the old security paradigm, in Workshop on New Security Paradigms (1998), pp. 107–118
5. U. Guin, D. DiMase, M. Tehranipoor, Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J. Electron. Test. 30(1), 25–40 (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ASPIRE: An Intermediate Representation for Abstract Security Policies;2023 36th International Conference on VLSI Design and 2023 22nd International Conference on Embedded Systems (VLSID);2023-01