[go: up one dir, main page]

Wei et al., 2011 - Google Patents

Gate characterization using singular value decomposition: Foundations and applications

Wei et al., 2011

View PDF
Document ID
1492155477799997833
Author
Wei S
Nahapetian A
Nelson M
Koushanfar F
Potkonjak M
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Modern hardware security has a very broad scope ranging from digital rights management to the detection of ghost circuitry. These and many other security tasks are greatly hindered by process variation, which makes each integrated circuit (IC) unique, and device aging …
Continue reading at aceslab.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3185Reconfiguring for testing, e.g. LSSD, partitioning
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/317Testing of digital circuits
    • G01R31/3181Functional testing
    • G01R31/3183Generation of test inputs, e.g. test vectors, patterns or sequence
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/28Testing of electronic circuits, e.g. by signal tracer
    • G01R31/2851Testing of integrated circuits [IC]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H01BASIC ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/0002Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00

Similar Documents

Publication Publication Date Title
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Narasimhan et al. Hardware Trojan detection by multiple-parameter side-channel analysis
He et al. Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
Wu et al. TPAD: Hardware Trojan prevention and detection for trusted integrated circuits
Zhang et al. Design of on-chip lightweight sensors for effective detection of recycled ICs
Wei et al. Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry
Wei et al. Gate-level characterization: Foundations and hardware security applications
Tehranipoor et al. A survey of hardware trojan taxonomy and detection
Lecomte et al. An on-chip technique to detect hardware trojans and assist counterfeit identification
Zheng et al. SeMIA: Self-similarity-based IC integrity analysis
Wei et al. Provably complete hardware trojan detection using test point insertion
Li et al. A survey of hardware trojan detection, diagnosis and prevention
Sinanoglu et al. Reconciling the IC test and security dichotomy
Wei et al. Self-consistency and consistency-based detection and diagnosis of malicious circuitry
Wei et al. Malicious circuitry detection using thermal conditioning
Chen et al. A general framework for hardware trojan detection in digital circuits by statistical learning algorithms
Kitsos et al. Towards a hardware Trojan detection methodology
Yang et al. Golden-free hardware trojan detection using self-referencing
Ahmed et al. Quantifiable assurance: From ips to platforms
Ma et al. On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive
Nelson et al. SVD-based ghost circuitry detection
Wei et al. Gate characterization using singular value decomposition: Foundations and applications
Tehranipoor et al. Hardware Security
Ma et al. EMSim: A fast layout level electromagnetic emanation simulation framework for high accuracy pre-silicon verification
Wei et al. Scalable consistency-based hardware Trojan detection and diagnosis