MERO: A Statistical Approach for Hardware Trojan Detection
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
Security against hardware Trojan through a novel application of design obfuscation
Proceedings of the 2009 International Conference on Computer-Aided Design
MOLES: malicious off-chip leakage enabled by side-channels
Proceedings of the 2009 International Conference on Computer-Aided Design
Security Primitives for Reconfigurable Hardware-Based Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
ACM SIGDA Newsletter
Detecting/preventing information leakage on the memory bus due to malicious hardware
Proceedings of the Conference on Design, Automation and Test in Europe
Self-referencing: a scalable side-channel approach for hardware Trojan detection
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Exploiting the critical infrastructure via nontraditional system inputs
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Securely sealing Multi-FPGA systems
ARC'12 Proceedings of the 8th international conference on Reconfigurable Computing: architectures, tools and applications
VeriTrust: verification for hardware trust
Proceedings of the 50th Annual Design Automation Conference
FANCI: identification of stealthy malicious logic using boolean functional analysis
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation
Proceedings of the International Conference on Computer-Aided Design
Hi-index | 0.09 |
This paper has described the issues on electronic circuits which are made for military equipments.The DoD of U.S. recently launched its most ambitious program yet to verify the integrity of the electronics that will underpin future additions to its arsenal. The Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, and released details about a three-year initiative it calls the Trust in Integrated Circuits program. The findings from the program could give the military and defense contractors who make sensitive microelectronics like the weapons systems for the F-35 a guaranteed method of determining whether their chips have been compromised. The Trust program started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry, though U.S. military consumes only 1% of world's integrated circuits.