Benchmarking of Hardware Trojans and Maliciously Affected Circuits
Top Cited Papers
- 1 March 2017
- journal article
- Published by Springer Science and Business Media LLC in Journal of Hardware and Systems Security
- Vol. 1 (1), 85-102
- https://doi.org/10.1007/s41635-017-0001-6
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (1513239)
This publication has 32 references indexed in Scilit:
- Pre-silicon security verification and validationPublished by Association for Computing Machinery (ACM) ,2015
- Detecting malicious modifications of data in third-party intellectual property coresPublished by Association for Computing Machinery (ACM) ,2015
- Hardware trojan attacks in FPGA devicesPublished by Association for Computing Machinery (ACM) ,2014
- On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel AnalysisInformation Security Journal: A Global Perspective, 2013
- BISA: Built-in self-authentication for preventing hardware Trojan insertionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Security analysis of integrated circuit camouflagingPublished by Association for Computing Machinery (ACM) ,2013
- FANCIPublished by Association for Computing Machinery (ACM) ,2013
- High-Sensitivity Hardware Trojan Detection Using Multimodal CharacterizationPublished by EDAA ,2013
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009
- MiBench: A free, commercially representative embedded benchmark suitePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005