Author:
Xie Yang,Bao Chongxi,Srivastava Ankur
Publisher
Springer International Publishing
Reference48 articles.
1. Bao C, Forte D, Srivastava A (2014) On application of one-class SVM to reverse engineering-based hardware trojan detection. In: 2014 15th International symposium on quality electronic design (ISQED). IEEE, New York, pp 47–54
2. Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Trans Comput-Aided Des Integr Circuits Syst 34(10):1577–1585
3. Baumgarten A, Tyagi A, Zambreno J (2010) Preventing ic piracy using reconfigurable logic barriers. IEEE Des Test Comput 27(1):66–75
4. Bilzor M (2011) 3D execution monitor (3D-EM): using 3D circuits to detect hardware malicious inclusions in general purpose processors. In: Proceedings of the 6th international conference on information warfare and security, Academic Conferences Limited, p 288
5. Bobba S, Chakraborty A, Thomas O, Batude P, Pavlidis VF, De Micheli G (2010) Performance analysis of 3-D monolithic integrated circuits. In: IEEE international 3D systems integration conference (3DIC), 2010, IEEE, pp 1–4
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. System technology co-optimization for advanced integration;Nature Reviews Electrical Engineering;2024-09-02
2. Defenses Against Design Constraint Based Attacks;Split Manufacturing of Integrated Circuits for Hardware Security and Trust;2021
3. Split Manufacturing Methods;Split Manufacturing of Integrated Circuits for Hardware Security and Trust;2021
4. Practical Split Manufacturing Optimization;A Synergistic Framework for Hardware IP Privacy and Integrity Protection;2020