Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Security analysis of logic obfuscation
Proceedings of the 49th Annual Design Automation Conference
Effect of malicious hardware logic on circuit reliability
VDAT'12 Proceedings of the 16th international conference on Progress in VLSI Design and Test
Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC
Proceedings of the International Conference on Computer-Aided Design
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation
Proceedings of the International Conference on Computer-Aided Design
Hardware security: threat models and metrics
Proceedings of the International Conference on Computer-Aided Design
A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment
Journal of Electronic Testing: Theory and Applications
Hi-index | 4.10 |
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats.