Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
HOST
2008
IEEE
10 years 4 months ago
The Butterfly PUF: Protecting IP on every FPGA
Sandeep S. Kumar, Jorge Guajardo, Roel Maes, Geert...
HOST
2008
IEEE
10 years 10 months ago
Trustworthy System Security through 3-D Integrated Hardware
Ted Huffmire, Jonathan Valamehr, Timothy Sherwood,...
HOST
2008
IEEE
10 years 10 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
HOST
2008
IEEE
10 years 10 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
HOST
2008
IEEE
10 years 10 months ago
Slicing Up a Perfect Hardware Masking Scheme
—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the power dissipation of a circuit. Masking is only effective on the condition that the in...
Zhimin Chen, Patrick Schaumont
HOST
2008
IEEE
10 years 10 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
HOST
2008
IEEE
10 years 10 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
HOST
2008
IEEE
10 years 10 months ago
Circuit CAD Tools as a Security Threat
Abstract: Circuit CAD Tools as a Security Threat Jarrod A. Roy†, Farinaz Koushanfar‡ and Igor L. Markov† †The University of Michigan, Department of EECS, 2260 Hayward Ave.,...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
books