Wei et al., 2011 - Google Patents
Gate characterization using singular value decomposition: Foundations and applicationsWei et al., 2011
View PDF- Document ID
- 1492155477799997833
- Author
- Wei S
- Nahapetian A
- Nelson M
- Koushanfar F
- Potkonjak M
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Modern hardware security has a very broad scope ranging from digital rights management to the detection of ghost circuitry. These and many other security tasks are greatly hindered by process variation, which makes each integrated circuit (IC) unique, and device aging …
- 238000010192 crystallographic characterization 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/2851—Testing of integrated circuits [IC]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H01—BASIC ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES; ELECTRIC SOLID STATE DEVICES NOT OTHERWISE PROVIDED FOR
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
| Narasimhan et al. | Hardware Trojan detection by multiple-parameter side-channel analysis | |
| He et al. | Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis | |
| Wu et al. | TPAD: Hardware Trojan prevention and detection for trusted integrated circuits | |
| Zhang et al. | Design of on-chip lightweight sensors for effective detection of recycled ICs | |
| Wei et al. | Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry | |
| Wei et al. | Gate-level characterization: Foundations and hardware security applications | |
| Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
| Lecomte et al. | An on-chip technique to detect hardware trojans and assist counterfeit identification | |
| Zheng et al. | SeMIA: Self-similarity-based IC integrity analysis | |
| Wei et al. | Provably complete hardware trojan detection using test point insertion | |
| Li et al. | A survey of hardware trojan detection, diagnosis and prevention | |
| Sinanoglu et al. | Reconciling the IC test and security dichotomy | |
| Wei et al. | Self-consistency and consistency-based detection and diagnosis of malicious circuitry | |
| Wei et al. | Malicious circuitry detection using thermal conditioning | |
| Chen et al. | A general framework for hardware trojan detection in digital circuits by statistical learning algorithms | |
| Kitsos et al. | Towards a hardware Trojan detection methodology | |
| Yang et al. | Golden-free hardware trojan detection using self-referencing | |
| Ahmed et al. | Quantifiable assurance: From ips to platforms | |
| Ma et al. | On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive | |
| Nelson et al. | SVD-based ghost circuitry detection | |
| Wei et al. | Gate characterization using singular value decomposition: Foundations and applications | |
| Tehranipoor et al. | Hardware Security | |
| Ma et al. | EMSim: A fast layout level electromagnetic emanation simulation framework for high accuracy pre-silicon verification | |
| Wei et al. | Scalable consistency-based hardware Trojan detection and diagnosis |