Affiliation:
1. Shahid Beheshti University, G.C.
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference18 articles.
1. [1] Y. Jin and Y. Makris, “Hardware Trojan detection using path delay fingerprint,” Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST2008), pp.51-57, 2008.
2. [2] M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detection,” IEEE Design and Test of Computers, pp.10-25, 2010.
3. [3] D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, “Trojan detection using IC fingerprinting,” Proc. Symposium on Security and Privacy, pp.296-310, 2007.
4. [4] X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, “Hardware Trojan detection and isolation using current integration and localized current analysis,” Proc. International Symposium on Fault and Defect Tolerance in VLSI Systems (DFT), pp.87-95, 2008.
5. [5] M. Banga and M. Hsiao, “VITAMIN: Voltage inversion technique to ascertain malicious insertion in ICs,” Proc. 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST' 09), pp.104-107, 2009.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献