Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Foundries
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
PCH framework for IP runtime security verification
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
post-silicon stage
untrusted third-party vendors
untrusted IPs
Trusted Computing
Symbolic Execution
security of data
security
SAT solving methods
runtime formal verification framework
Runtime
Resiliency
resilience
pubcrawl
proof-carrying hardware framework
pre-silicon stage
composability
PCH framework
Microelectronics Security
Metrics
Mathematical model
malicious behavior detection
IP runtime security verification
integrated circuits
high-level security assurance
hardware runtime verification
Hardware design languages
Hardware
Foundries
formal verification
biblio
Introducing TFUE: The Trusted Foundry and Untrusted Employee Model in IC Supply Chain Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
VLSI
trusted foundry and untrusted employee model
Trojan horses
supply chain security
security
Scalability
Resiliency
resilience
double patterning lithography
mask development lines
lithography
Layout
Integrated circuit modeling
IC supply chain security
Human behavior
Foundries
fabrication
biblio
TTLock: Tenacious and traceless logic locking
Submitted by grigby1 on Tue, 01/23/2018 - 3:24pm
IP piracy
TTLock
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Policy
logic locking
IP piracy revention
collaboration
Interference
intellectual property protection technique
intellectual property
industrial property
Foundries
computer science
Computers
Computer crime
composability
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
« first
‹ previous
1
2