Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.15-19, 2008. ,
A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010. ,
DOI : 10.1109/MDT.2010.7
Hardware Trojan Attacks: Threat Analysis and Countermeasures, Proceedings of the IEEE, pp.1229-1247, 2014. ,
DOI : 10.1109/JPROC.2014.2334493
URL : http://doi.org/10.1109/jproc.2014.2334493
Proof carrying-based information flow tracking for data secrecy protection and hardware trust, 2012 IEEE 30th VLSI Test Symposium (VTS), pp.252-257, 2012. ,
DOI : 10.1109/VTS.2012.6231062
Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
URL : http://isis.poly.edu/~kurt/fm/feb_22/ic_fingerp.pdf
Hardware Trojan Detection Using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.51-57, 2008. ,
Towards trojan-free trusted ICs, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1362-1365, 2008. ,
DOI : 10.1145/1403375.1403703
MERO: A Statistical Approach for Hardware Trojan Detection, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.396-410, 2009. ,
DOI : 10.1007/978-3-642-04138-9_28
Regaining Trust in VLSI Design: Design-for-Trust Techniques, Proceedings of the IEEE, pp.1266-1282, 2014. ,
DOI : 10.1109/JPROC.2014.2332154
URL : http://doi.org/10.1109/jproc.2014.2332154
On-demand transparency for improving hardware Trojan detectability, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.48-50, 2008. ,
DOI : 10.1109/HST.2008.4559048
Security against hardware Trojan through a novel application of design obfuscation, Proceedings of the 2009 International Conference on Computer-Aided Design, ICCAD '09, pp.113-116, 2009. ,
DOI : 10.1145/1687399.1687424
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp.112-125, 2012. ,
DOI : 10.1109/TVLSI.2010.2093547
URL : http://www.ece.unm.edu/~jimp/pubs/TVLSIver5.pdf
A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS), pp.49-54, 2014. ,
DOI : 10.1109/IOLTS.2014.6873671
URL : https://hal.archives-ouvertes.fr/lirmm-01025275
BISA: Built-in self-authentication for preventing hardware Trojan insertion, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.45-50, 2013. ,
DOI : 10.1109/HST.2013.6581564
Hardware Trojan Horses in Cryptographic IP Cores, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.15-29, 2013. ,
DOI : 10.1109/FDTC.2013.15
URL : https://hal.archives-ouvertes.fr/hal-00855146
Identification of Hardware Trojans triggering signals, Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'13), 2013. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00991360
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis, Information Security Journal: A Global Perspective, vol.44, issue.5-6, pp.226-236, 2013. ,
DOI : 10.1145/1403375.1403703
URL : https://hal.archives-ouvertes.fr/lirmm-00991362