Gate-level characterization
- 13 June 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 222-227
- https://doi.org/10.1145/1837274.1837332
Abstract
No abstract availableKeywords
Funding Information
- Division of Computing and Communication Foundations (CCF-0926127)
This publication has 15 references indexed in Scilit:
- A Survey of Hardware Trojan Taxonomy and DetectionIEEE Design & Test of Computers, 2010
- Consistency-based characterization for IC Trojan detectionPublished by Association for Computing Machinery (ACM) ,2009
- Hardware Trojan horse detection using gate-level characterizationPublished by Association for Computing Machinery (ACM) ,2009
- Techniques for Design and Implementation of Secure Reconfigurable PUFsACM Transactions on Reconfigurable Technology and Systems, 2009
- SVD-Based Ghost Circuitry DetectionLecture Notes in Computer Science, 2009
- Hardware-Based Public-Key Cryptography with Public Physically Unclonable FunctionsLecture Notes in Computer Science, 2009
- At-speed delay characterization for IC authentication and Trojan Horse detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction ApproachLecture Notes in Computer Science, 2008
- A combined gate replacement and input vector control approach for leakage current reductionIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2006
- Modeling Within-Die Spatial Correlation Effects for Process-Design Co-OptimizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005