Author:
Ngo Xuan Thuy,Najm Zakaria,Bhasin Shivam,Guilley Sylvain,Danger Jean-Luc
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference13 articles.
1. Abramovici, M., Bradley, P.: Integrated circuit security: new threats and solutions. In: Sheldon, F.T., Peterson, G., Krings, A.W., Abercrombie, R.K., Mili, A. (eds) CSIIRW, pp. 55. ACM (2009)
2. Alkabani, Y., Koushanfar, F.: Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS’07, pp. 20:1–20:16. USENIX Association, Berkeley (2007)
3. Banga, M., Hsiao, M.S.: ODETTE: a non-scan design-for-test methodology for Trojan detection in ICs. In: International Workshop on Hardware-Oriented Security and Trust (HOST), IEEE, pp. 18–23 (2011)
4. Bhasin, S., Danger, J.L., Guilley, S., Ngo, T., Sauvage, L.: Hardware Trojan horses in cryptographic IP cores. In: FDTC, pp. 15–29, August 20, Santa Barbara, CA, USA (2013)
5. Bowman, K.A., Duvall, S.G., Meindl, J.D.: Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration. IEEE J. Solid-State Circuits 37(2), 183–190 (2002)
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献