A case study in hardware Trojan design and implementation
- 3 September 2010
- journal article
- Published by Springer Science and Business Media LLC in International Journal of Information Security
- Vol. 10 (1), 1-14
- https://doi.org/10.1007/s10207-010-0115-0
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Experiences in Hardware Trojan design and implementationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- EPIC: Ending Piracy of Integrated CircuitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A 1.6pJ/bit 96% Stable Chip-ID Generating Circuit using Process VariationsIEEE International Solid-State Circuits Conference, 2007
- AES-Based Security Coprocessor IC in 0.18-$muhbox m$CMOS With Resistance to Differential Power Analysis Side-Channel AttacksIEEE Journal of Solid-State Circuits, 2006
- Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random FunctionsACM SIGARCH Computer Architecture News, 2005
- Effective Iterative Techniques for Fingerprinting Design IPIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2004
- An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTsIEEE Transactions on Electron Devices, 2003
- Constraint-based watermarking techniques for design IP protectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2001
- Techniques for the creation of digital watermarks in sequential circuit designsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2001
- Fingerprinting Digital Circuits on Programmable HardwareLecture Notes in Computer Science, 1998