Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
path delay
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
biblio
On Detecting Delay Anomalies Introduced by Hardware Trojans
Submitted by grigby1 on Fri, 10/27/2017 - 11:23am
composability
hardware Trojan detection
path delay
pubcrawl
Resiliency
trojan horse detection
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
biblio
Detection of hardware Trojan in SEA using path delay
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
HTH detection and insertion
Trojan horses
Trojan circuits
SEA crypto
scalable encryption algorithm crypto
Scalable Encryption Algorithm (SEA)
payload Trojan detection rate
payload Trojan
path delay
Logic gates
logic circuits
layout level Trojan insertions
IP blocks
invasive software
Algorithm design and analysis
hardware Trojan horses insertion
Hardware Trojan horses (HTH)
hardware Trojan detection
Hardware
GDSII hard macros
GDSII
gate level Trojan insertions
fabless design house
encryption
delays
Cryptography
ASIC design flow
application specific integrated circuits