21 papers:
- DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using
- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
- DATE-2015-CakirM #clustering #correlation #detection #hardware #using
- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
- DATE-2015-CourbonLFT #detection #hardware #performance
- A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
- DATE-2015-DupuisBFNR #hardware #testing
- New testing procedure for finding insertion sites of stealthy hardware trojans (SD, PSB, MLF, GDN, BR), pp. 776–781.
- DATE-2015-FrancqF #detection #hardware
- Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
- DATE-2015-NgoEBDGNRR #detection #hardware #metric
- Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
- DATE-2015-OyaSYT #classification #identification
- A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
- DAC-2014-CuiMSW #detection #hardware #runtime #synthesis
- High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
- DAC-2014-LiuHM #detection #hardware #statistics
- Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
- DAC-2014-RudraDNH #case study #design #logic
- Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study (MRR, NAD, VN, DHKH), p. 4.
- DAC-2014-TsoutsosKM #design #hardware
- Advanced Techniques for Designing Stealthy Hardware Trojans (NGT, CK, MM), p. 4.
- ASPLOS-2014-BanabicCG #distributed
- Finding trojan message vulnerabilities in distributed systems (RB, GC, RG), pp. 113–126.
- DAC-2013-WeiP #detection #hardware
- The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
- DATE-2013-ChaG #approach #detection #effectiveness #metric
- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
- DATE-2013-HuNRK #detection #hardware #multimodal #using
- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
- DAC-2012-WeiLKP #benchmark #hardware #metric
- Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry (SW, KL, FK, MP), pp. 90–95.
- DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
- DATE-2012-LiDT #authentication #detection #framework #hardware #self
- A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
- DATE-2011-ZhangT #detection #hardware #named #network
- RON: An on-chip ring oscillator network for hardware Trojan detection (XZ, MT), pp. 1638–1643.
- DAC-2009-PotkonjakNNM #detection #hardware #using
- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
- DATE-2008-WolffPBC #analysis #detection #problem #towards
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.