Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA
- 1 March 2020
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 49 references indexed in Scilit:
- Hardware security and test: Friends or enemies?it - Information Technology, 2014
- A Primer on Hardware Security: Models, Methods, and MetricsProceedings of the IEEE, 2014
- Detection of trojans using a combined ring oscillator network and off-chip transient power analysisACM Journal on Emerging Technologies in Computing Systems, 2013
- Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis AttacksPublished by Springer Science and Business Media LLC ,2012
- CaissonACM SIGPLAN Notices, 2011
- Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$sIEEE Transactions on Information Forensics and Security, 2010
- Random Number Generators for Cryptographic ApplicationsPublished by Springer Science and Business Media LLC ,2009
- MERO: A Statistical Approach for Hardware Trojan DetectionLecture Notes in Computer Science, 2009
- Security evaluation at design time against optical fault injection attacksIEE Proceedings - Information Security, 2006
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004