Criticality based reliability against hardware Trojan attacks for processing of tasks on reconfigurable hardware (original) (raw)
Related papers
Security protection and checking in embedded system integration against buffer overflow attacks
2004
On the limitations of logic testing for detecting Hardware Trojans Horses
2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015
2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS)
Dynamic Lifetime Reliability Management for Chip Multiprocessors
IEEE Transactions on Multi-Scale Computing Systems, 2018
A Security Architecture for Reconfigurable Networked Embedded Systems
International Journal of Wireless Information Networks, 2010
Scientific Reports, 2017
IEEE Access, 2016
Security engineering for embedded systems
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, 2010
A Novel Sustained Vector Technique for the Detection of Hardware Trojans
2009 22nd International Conference on VLSI Design, 2009
Automatic Hardware Trojan Insertion using Machine Learning
arXiv (Cornell University), 2022
Toward a building-in reliability approach
Microelectronics Reliability, 1997
Homomorphic Data Isolation for Hardware Trojan Protection
2015 IEEE Computer Society Annual Symposium on VLSI, 2015
Secure embedded system hardware design – A flexible security and trust enhanced approach
Computers & Electrical Engineering, 2014
System Dependability Assessment—Interplay Between Research and Practice
Springer eBooks, 2022
Dependability engineering of complex computing systems
Proceedings Sixth IEEE International Conference on Engineering of Complex Computer Systems. ICECCS 2000, 2000
IOMMU protection against I/O attacks: a vulnerability and a proof of concept
Journal of the Brazilian Computer Society, 2018
Protecting reprogrammable hardware with polymorphic circuit variation
Hardware trojan attacks in FPGA devices
Proceedings of the 24th edition of the great lakes symposium on VLSI, 2014
On Reliability Trojan Injection and Detection
Journal of Low Power Electronics
Defending embedded systems against buffer overflow via hardware/software
19th Annual Computer Security Applications Conference, 2003. Proceedings.
Detecting hardware trojans using backside optical imaging of embedded watermarks
Proceedings of the 52nd Annual Design Automation Conference, 2015
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing
arXiv (Cornell University), 2021
Helper-less physically unclonable functions and chip authentication
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014
Microelectronics Reliability, 2014
Introductory Chapter: Innovative Manifestations of Reliability-Based Design
IntechOpen eBooks, 2023