21 papers:
DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DATE-2015-CakirM #clustering #correlation #detection #hardware #using- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
DATE-2015-CourbonLFT #detection #hardware #performance- A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
DATE-2015-DupuisBFNR #hardware #testing- New testing procedure for finding insertion sites of stealthy hardware trojans (SD, PSB, MLF, GDN, BR), pp. 776–781.
DATE-2015-FrancqF #detection #hardware- Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATE-2015-NgoEBDGNRR #detection #hardware #metric- Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
DATE-2015-OyaSYT #classification #identification- A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
DAC-2014-CuiMSW #detection #hardware #runtime #synthesis- High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
DAC-2014-LiuHM #detection #hardware #statistics- Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
DAC-2014-RudraDNH #case study #design #logic- Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study (MRR, NAD, VN, DHKH), p. 4.
DAC-2014-TsoutsosKM #design #hardware- Advanced Techniques for Designing Stealthy Hardware Trojans (NGT, CK, MM), p. 4.
ASPLOS-2014-BanabicCG #distributed- Finding trojan message vulnerabilities in distributed systems (RB, GC, RG), pp. 113–126.
DAC-2013-WeiP #detection #hardware- The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
DATE-2013-ChaG #approach #detection #effectiveness #metric- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATE-2013-HuNRK #detection #hardware #multimodal #using- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DAC-2012-WeiLKP #benchmark #hardware #metric- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATE-2012-LiDT #authentication #detection #framework #hardware #self- A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
DATE-2011-ZhangT #detection #hardware #named #network- RON: An on-chip ring oscillator network for hardware Trojan detection (XZ, MT), pp. 1638–1643.
DAC-2009-PotkonjakNNM #detection #hardware #using- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DATE-2008-WolffPBC #analysis #detection #problem #towards- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.