Integrated circuit security, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09 ,
DOI : 10.1145/1558607.1558671
Active hardware metering for intellectual property protection and security, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, pp.1-20, 2007. ,
ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp.18-23, 2011. ,
DOI : 10.1109/HST.2011.5954989
Hardware Trojan Horses in Cryptographic IP Cores, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.15-29, 2013. ,
DOI : 10.1109/FDTC.2013.15
URL : https://hal.archives-ouvertes.fr/hal-00855146
Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration. Solid-State Circuits, IEEE Journal, vol.37, issue.2, pp.183-190, 2002. ,
Efficient Trojan Detection via Calibration of Process Variations, 2012 IEEE 21st Asian Test Symposium, pp.355-361, 2012. ,
DOI : 10.1109/ATS.2012.64
Randomization Based Probabilistic Approach to Detect Trojan Circuits, 2008 11th IEEE High Assurance Systems Engineering Symposium, pp.117-124, 2008. ,
DOI : 10.1109/HASE.2008.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.3028
Experiences in Hardware Trojan design and implementation, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.50-57, 2009. ,
DOI : 10.1109/HST.2009.5224971
Hardware trojan design and detection, Proceedings of the Workshop on Embedded Systems Security, WESS '13, pp.1-1, 2013. ,
DOI : 10.1145/2527317.2527318
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, CHES, pp.77-88, 2003. ,
DOI : 10.1007/978-3-540-45238-6_7
Hardware Trojan horse detection using gate-level characterization, Proceedings of the 46th Annual Design Automation Conference on ZZZ, DAC '09, pp.688-693, 2009. ,
DOI : 10.1145/1629911.1630091
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.6475
Sensitivity analysis to hardware Trojans using power supply transient signals, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.3-7, 2008. ,
DOI : 10.1109/HST.2008.4559037
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip, Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, CHES'12, pp.23-40, 2012. ,
DOI : 10.1007/978-3-642-33027-8_2