120
Voted
DFT
15 years 2 months ago
2008 IEEE
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
113
click to vote
DFT
15 years 2 months ago
2008 IEEE
This paper presents a concurrent error detection technique for the control logic of a modern microprocessor. Our method is based on execution time prediction for each instruction ...
122
click to vote
DFT
15 years 2 months ago
2008 IEEE
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
104
Voted
DFT
15 years 7 months ago
2008 IEEE
It is widely recognized that device and interconnect fabrics at the nanoscale will be characterized by an increased susceptibility to transient faults. This appears to be intrinsi...
106
click to vote
DFT
15 years 7 months ago
2008 IEEE
Integrated circuits (IC) targeting at the streaming applications for tomorrow are becoming a fast growing market. Applications such as beamforming require mass computing capabilit...
|