Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

logic locking method

biblio

Visible to the public Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection

Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
  • pubcrawl
  • logic locking method
  • malicious circuits
  • million-gate circuits
  • outsourcing
  • PCA-based HT detection methods
  • power analysis-based Trojan detection
  • power consumption
  • power consumption analysis
  • Power demand
  • principal component analysis
  • Process Variations
  • logic locking
  • resilience
  • security
  • semiconductor companies
  • small sub-circuit collection
  • supply chain security
  • Switches
  • system-on-chip
  • trojan horse detection
  • Trojan horses
  • untrustworthy fabs
  • hardware Trojan detection
  • policy-based governance
  • composability
  • IP piracy
  • circuit block extraction
  • circuit power
  • cyber physical systems
  • design for hardware trust
  • fabrication foundries
  • gate level
  • Hardware
  • Hardware Security
  • Resiliency
  • hardware Trojan threat
  • HT activity
  • HT power
  • HT-infected circuits
  • industrial property
  • integrated circuit layout
  • intellectual properties
  • invasive software
  • IPS
  • Logic gates

Terms of Use  |  ©2023. CPS-VO