Criticality based reliability against hardware Trojan attacks for processing of tasks on reconfigurable hardware (original) (raw)

Security protection and checking in embedded system integration against buffer overflow attacks

Edwin Sha

2004

View PDFchevron_right

On the limitations of logic testing for detecting Hardware Trojans Horses

Sophie Dupuis

2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015

View PDFchevron_right

Reliable code generation and execution on unreliable hardware under joint functional and timing reliability considerations

Muhammad Shafique

2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS)

View PDFchevron_right

Dynamic Lifetime Reliability Management for Chip Multiprocessors

Milad Moghaddam

IEEE Transactions on Multi-Scale Computing Systems, 2018

View PDFchevron_right

A Security Architecture for Reconfigurable Networked Embedded Systems

GIANLUCA DINI

International Journal of Wireless Information Networks, 2010

View PDFchevron_right

Invisible Trojan-horse attack

shihan sajeed

Scientific Reports, 2017

View PDFchevron_right

IEEE Access Special Section Editorial: Security and Reliability Aware System Design for Mobile Computing Devices

Leonardo Mostarda

IEEE Access, 2016

View PDFchevron_right

Security engineering for embedded systems

Antonio Maña

Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, 2010

View PDFchevron_right

A Novel Sustained Vector Technique for the Detection of Hardware Trojans

Michael Hsiao

2009 22nd International Conference on VLSI Design, 2009

View PDFchevron_right

Automatic Hardware Trojan Insertion using Machine Learning

Jonathan Cruz

arXiv (Cornell University), 2022

View PDFchevron_right

Toward a building-in reliability approach

David Erhart

Microelectronics Reliability, 1997

View PDFchevron_right

Homomorphic Data Isolation for Hardware Trojan Protection

ِAmr Alanwar

2015 IEEE Computer Society Annual Symposium on VLSI, 2015

View PDFchevron_right

Secure embedded system hardware design – A flexible security and trust enhanced approach

Apostolos Fournaris

Computers & Electrical Engineering, 2014

View PDFchevron_right

System Dependability Assessment—Interplay Between Research and Practice

Mohamed Kaaniche

Springer eBooks, 2022

View PDFchevron_right

Dependability engineering of complex computing systems

Mohamed Kaaniche

Proceedings Sixth IEEE International Conference on Engineering of Complex Computer Systems. ICECCS 2000, 2000

View PDFchevron_right

IOMMU protection against I/O attacks: a vulnerability and a proof of concept

Mohamed Kaaniche

Journal of the Brazilian Computer Society, 2018

View PDFchevron_right

Protecting reprogrammable hardware with polymorphic circuit variation

Jeffrey McDonald

View PDFchevron_right

Hardware trojan attacks in FPGA devices

Aswin Krishna

Proceedings of the 24th edition of the great lakes symposium on VLSI, 2014

View PDFchevron_right

On Reliability Trojan Injection and Detection

Israel Koren

Journal of Low Power Electronics

View PDFchevron_right

Defending embedded systems against buffer overflow via hardware/software

Edwin Sha

19th Annual Computer Security Applications Conference, 2003. Proceedings.

View PDFchevron_right

Detecting hardware trojans using backside optical imaging of embedded watermarks

Selim Unlu

Proceedings of the 52nd Annual Design Automation Conference, 2015

View PDFchevron_right

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

Jonathan Cruz

arXiv (Cornell University), 2021

View PDFchevron_right

Helper-less physically unclonable functions and chip authentication

Roberto Rinaldo

2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014

View PDFchevron_right

CEDAR: Modeling impact of component error derating and read frequency on system-level vulnerability in high-performance processors

Amirali Baniasadi

Microelectronics Reliability, 2014

View PDFchevron_right

Introductory Chapter: Innovative Manifestations of Reliability-Based Design

Maguid Hassan

IntechOpen eBooks, 2023

View PDFchevron_right