Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
Detection, diagnosis, and repair of faults in memristor-based memories
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Memristor
testing
test time
Sneak-paths
sneak-path free crossbar
Resistance
random-access storage
post-silicon recovery
nanoscale fabrication
multiple memory cells testing
memristors
memristor-based memories
memristor failures
Circuit faults
Memory
March testing
maintenance engineering
integrated circuits
hybrid diagnosis scheme
high defect densities
future memory architectures
faulty cell repairs
fault diagnosis
fault detection
crossbar memories
biblio
Reverse Engineering Digital Circuits Using Structural and Functional Analyses
Submitted by BrandonB on Wed, 05/06/2015 - 11:42am
reverse engineering
integrated circuit design
integrated circuits
intellectual property
invasive software
IP theft
IP violation detection
Logic gates
register files
Inference algorithms
SoC design
structural analysis
subtractors
system-on-chip
test circuits
Trojan horses
unstructured netlist
very large highly-optimized system-on-chip design
functional analysis
Algorithm design and analysis
algorithmic reverse engineering digital circuits
combinational elements
computer security
counters
design automation
Digital circuits
formal verification
adders
Globalization
globalized multivendor environment
Hardware
hardware trojans-malware
high-level netlist
ICs
industrial property
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 11:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
Applied formal methods for hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:38am
integrated circuits
verification techniques
Vectors
Trojan horses
Trojan assurance level
silicon structure
model checking
Mathematical model
malicious hardware modifications
invasive software
chip development process
integrated circuit design
Hardware
formal verification
formal methods
formal hardware Trojan detection
Equations
electronic engineering computing
design phase
data structures
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
biblio
On application of one-class SVM to reverse engineering-based hardware Trojan detection
Submitted by BrandonB on Wed, 05/06/2015 - 11:35am
one-class support vector machine
well-studied machine learning method
Trojan-free IC identification
Trojan horses
Training
test-time detection approach
Support vector machines
reverse engineering-based hardware Trojan detection
reverse engineering
one-class SVM
electronic engineering computing
learning (artificial intelligence)
Layout
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit design
golden model
feature extraction
fabrication outsourcing
biblio
Hardware trojan detection by symmetry breaking in path delays
Submitted by BrandonB on Wed, 05/06/2015 - 11:33am
inter-and intra-die variations
Trojan horses
Transistors
symmetry breaking
symmetric paths
subcircuit consistencies
side channel methods
Sensitivity
path delays
path delay
Logic gates
invasive software
benchmark circuits
integrated circuits
IC
HT
hardware Trojan detection
hardware trojan
Hardware
electronic engineering computing
detect modifications
delays
circuit symmetries
biblio
Towards a hardware Trojan detection methodology
Submitted by BrandonB on Wed, 05/06/2015 - 11:31am
delays
detection techniques
Hardware
Integrated circuit modeling
integrated circuits
Power demand
security hardware Trojans horses
Trojan horses
trusted hardware
Vectors
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »