Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware trojan
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
biblio
Intra-Die-Variation-Aware Side Channel Analysis for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Sensitivity
logic testing
Power based Side-channel
Power measurement
probability
process variation levels
Process Variations
pubcrawl
relative power difference
resilience
Resiliency
logic circuits
sequential type Trojans
side channel analysis
spatial correlation
Systematics
test pattern generation
Trojan activation probability
trojan horse detection
Trojan horses
Trojan inserted circuits
hardware trojan
automatic test pattern generation
combinational type Trojans
composability
cyber physical systems
delays
Detection sensitivity
efficient Trojan detection approach
elevated process variations
Hardware
AES-128 circuit
hardware Trojan detection
high detection sensitivity
integrated circuit design
integrated circuit testing
integrated circuits
intra-die-variation
invasive software
ISCAS 89 benchmark
ITC 99 benchmark
biblio
A Novel Hardware Trojan Detection with Chip ID Based on Relative Time Delays
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
pubcrawl
Wires
Trojan horses
trojan horse detection
transient based post-layout simulation
time-delay
side-channel signal
sensor chains
sensor chain
security
RTD
Resiliency
resilience
relative time delays
chip ID
NMOS
Layout
Inverters
Integrated circuit modeling
Integrated circuit interconnections
hardware Trojan detection method
hardware trojan
Hardware
golden chip
delays
cyber physical systems
composability
biblio
Provably-Secure Logic Locking: From Theory To Practice
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
computer theory
trust
boolean satisfiability (sat)
collaboration
composability
design-for-trust
hardware trojan
IP piracy
logic locking
Policy
policy-based governance
pubcrawl
Resiliency
reverse engineering
biblio
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
black box encryption
collaboration
composability
hardware trojan
ip encryption
IP piracy
ip protection
p1735
padding oracle attack
Policy
policy-based governance
pubcrawl
Resiliency
syntax oracle attack
biblio
Hardware security assurance in emerging IoT applications
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
IoT connected devices
Trojan horses
thwart hardware Trojan attack
side-channel analysis attack
Security Assurance
Scalability
Resiliency
Radiation detectors
pubcrawl
network on chip security
network on chip
network-on-chip
low-cost dynamic permutation method
IoT processing unit
accumulated partial guessing entropy
invasive software
Internet-of-Things (IoT)
Internet of Things
hardware trojan
hardware security assurance
Hardware Security
hardware attacks
Hardware
Cryptography
computation power
composability
Cisco
biblio
Secure Model Checkers for Network-on-Chip (NoC) Architectures
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
composability
Hardware Security
hardware trojan
network on chip
network on chip security
Network Security Architecture
network-on-chip
pubcrawl
Resiliency
Scalability
trojan horse detection
biblio
Slack removal for enhanced reliability and trust
Submitted by BrandonB on Wed, 05/06/2015 - 11:34am
Small Delay Defects
mission-critical application
pattern count
reliability enhancement
security of data
security vulnerabilities
security-critical application
slack removal
Slacks
malicious circuitries
test quality
testing
timing slacks
transition fault patterns
Trojan horses
trust enhancement
Wires
fabrication
care bit density intact
Circuit faults
delay defect detection
delay defects
delay unit insertion
delays
design for testability
design technique
At-speed Testing
Hardware
hardware trojan
Hardware Trojans
integrated circuit reliability
logic circuits
Logic gates
logic testing
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
« first
‹ previous
1
2
3
4
5