A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test, vol.27, issue.1, pp.10-25, 2010. ,
DOI : 10.1109/MDT.2009.159
BISA: Built-in self-authentication for preventing hardware Trojan insertion, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.45-50, 2013. ,
DOI : 10.1109/HST.2013.6581564
A Trust-Driven Placement Approach: A New Perspective on Design for Hardware Trust, Journal of Circuits, Systems and Computers, vol.24, issue.08, p.1550115, 2015. ,
DOI : 10.1142/S0218126615501157
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain, Proc. IEEE, pp.1207-1228, 2014. ,
DOI : 10.1109/JPROC.2014.2332291
A High Efficiency Hardware Trojan Detection Technique Based on Fast SEM Imaging, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, pp.788-793, 2015. ,
DOI : 10.7873/DATE.2015.1104
Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467
At-speed delay characterization for ic authentication and Trojan horse detection, Proc. HOST, pp.8-14, 2008. ,
Integrated circuit security, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009. ,
DOI : 10.1145/1558607.1558671
MERO: A Statistical Approach for Hardware Trojan Detection, Cryptographic Hardware and Embedded Systems?CHES, pp.396-410, 2009. ,
DOI : 10.1007/978-3-642-04138-9_28
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.13-18, 2010. ,
DOI : 10.1109/HST.2010.5513122
Dynamic variation monitor for measuring the impact of voltage droops on microprocessor clock frequency, IEEE Custom Integrated Circuits Conference 2010, pp.1-4, 2010. ,
DOI : 10.1109/CICC.2010.5617415
An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1170-1179, 2011. ,
DOI : 10.1109/TIFS.2011.2136339
Ron: An on-chip ring oscillator network for hardware Trojan detection, Proc. DATE, pp.1-6, 2011. ,
Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC, Proceedings of the International Conference on Computer-Aided Design, ICCAD '12, pp.37-42, 2012. ,
DOI : 10.1145/2429384.2429392
Cluster-based distributed active current timer for hardware Trojan detection, Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), pp.1010-1013, 2013. ,
EM-based detection of hardware trojans on FPGAs, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.84-87, 2014. ,
DOI : 10.1109/HST.2014.6855574
Electromagnetic circuit fingerprints for Hardware Trojan detection, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp.246-251, 2015. ,
DOI : 10.1109/ISEMC.2015.7256167
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis, J. Cryptogr. Eng, vol.6, pp.239-247, 2016. ,
Power/Ground Network and Floorplan Cosynthesis for Fast Design Convergence, Proc. ISPD, pp.86-93, 2006. ,
DOI : 10.1109/TCAD.2007.892336
URL : http://cc.ee.ntu.edu.tw/~ywchang/Papers/tcad07-pgnetwork.pdf
Available: http://www.digilentinc.com/Data/Products/ S3E1600/ug257.pdf [22] Federal Information Processing Standards Publication 197 Specification for the Advanced Encryption Standard (AES), 2001. ,
Measurements and modeling of intrinsic fluctuations in MOSFET threshold voltage, Proceedings of the 2005 international symposium on Low power electronics and design , ISLPED '05, pp.26-29, 2005. ,
DOI : 10.1145/1077603.1077611
Fluctuation limits & amp; scaling opportunities for CMOS SRAM cells, IEEE InternationalElectron Devices Meeting, 2005. IEDM Technical Digest., pp.659-662, 2005. ,
DOI : 10.1109/IEDM.2005.1609437
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.464.550
Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, 2014 IEEE 32nd VLSI Test Symposium (VTS), pp.1-6, 2014. ,
DOI : 10.1109/VTS.2014.6818792