Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467
Consistency-based characterization for IC Trojan detection, Proceedings of the 2009 International Conference on Computer-Aided Design, ICCAD '09, pp.123-127, 2009. ,
DOI : 10.1145/1687399.1687426
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.476.2796
A Novel Sustained Vector Technique for the Detection of Hardware Trojans, 2009 22nd International Conference on VLSI Design, pp.327-332, 2009. ,
DOI : 10.1109/VLSI.Design.2009.22
A case study in hardware Trojan design and implementation, International Journal of Information Security, vol.10, issue.1, pp.1-14, 2011. ,
DOI : 10.1007/s10207-010-0115-0
Implementing hardware Trojans: Experiences from a hardware Trojan challenge, 2011 IEEE 29th International Conference on Computer Design (ICCD), pp.301-304, 2011. ,
DOI : 10.1109/ICCD.2011.6081414
Security against hardware Trojan through a novel application of design obfuscation, Proceedings of the 2009 International Conference on Computer-Aided Design, ICCAD '09, pp.113-116, 2009. ,
DOI : 10.1145/1687399.1687424
On-demand transparency for improving hardware Trojan detectability, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.48-50, 2008. ,
DOI : 10.1109/HST.2008.4559048
MERO: A Statistical Approach for Hardware Trojan Detection, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.396-410, 2009. ,
DOI : 10.1007/978-3-642-04138-9_28
Selfreferencing : A Scalable Side-Channel, International Conference on Cryptographic Hardware and Embedded Systems (CHES'10), pp.173-187, 2010. ,
Experiences in Hardware Trojan design and implementation, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.50-57, 2009. ,
DOI : 10.1109/HST.2009.5224971
Hardware Trojan Detection Using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.51-57, 2008. ,
Proof carrying-based information flow tracking for data secrecy protection and hardware trust, 2012 IEEE 30th VLSI Test Symposium (VTS), pp.252-257, 2012. ,
DOI : 10.1109/VTS.2012.6231062
A Sensor-Assisted Self- Authentication Framework for Hardware Trojan Detection, Design, Automation and Test in Europe (DATE'12), 2012. ,
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.382-395, 2009. ,
DOI : 10.1007/978-3-642-04138-9_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.904
Hardware Trojan horse detection using gate-level characterization, Proceedings of the 46th Annual Design Automation Conference on ZZZ, DAC '09, pp.688-693, 2009. ,
DOI : 10.1145/1629911.1630091
Power supply signal calibration techniques for improving detection resolution to hardware Trojans, 2008 IEEE/ACM International Conference on Computer-Aided Design, pp.632-639, 2008. ,
DOI : 10.1109/ICCAD.2008.4681643
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010. ,
DOI : 10.1109/WIFS.2010.5711438
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp.112-125, 2012. ,
DOI : 10.1109/TVLSI.2010.2093547
A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010. ,
DOI : 10.1109/MDT.2010.7
Detecting malicious inclusions in secure hardware: Challenges and solutions, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.15-19, 2008. ,
Towards trojan-free trusted ICs, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1362-1365, 2008. ,
DOI : 10.1145/1403375.1403703