SALWARE

 

Home

Publications

Salware bibliography

Bloc cipher implementations

TERO-PUF
implementation



Contacts:
mail to Lilian Bossuet

Lilian Bossuet's personnal web page

 

SALUTARY HARDWARE BIBLIOGRAPHY

THREATS ON IC INTELLECTUAL PROPERTY- IC PROTECTION - IP PROTECTION - IP WATERMARKING - HDL OBFUSCATION - LOGIC ENCRYPTION OBFUSCATION - FPGA BITSTREAM SECURITY  - TRUSTWORTHY MANUFACTURING

 

In this bibliographye we list works/articles which highlitgh the intellectual property protection issue for fabless IC designer, IP designer and FPGA designer - Note that we dosen't list works on Physical Unclonable Function (PUF). PUF bibliography is already available on the following link. Similarly for hardware Trojan, a bibliography list provided by Julien Francq is available on the following link.

This biblography work is part of the French ANR SALWARE Projet and the European TRUDEVICE COST ACTION

If you know interesting article to add to this bibliography,  please feel free to contact me

 

Threats on IC Intellectual Property: (top)

M. Brutscheck, M. Franke, A. Th. Schwarzbacher, and St. Becker "Investigation of Finite State Machines in Unknown CMOS Integrated Circuits" 2007 - pdf

M. Brutscheck, B. Schmidt, M. Franke, A. Th. Schwarzbacher, and St. Becker "Non-invasive reverse engineering of CMOS integrated circuits" 2009 - pdf

K. M. Goertzel "Intregated Circuit Security Threats and Hardware Assurance COuntermeasures" 2013 - pdf

U. Guin, M. Tehranipoor, D. DiMase, and M. Megrdichian "Counterfeit IC Detection and Challenges Ahead" 2013 - pdf

U. Guin, D. DiMase, and M. Tehranipoor "Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead" 2013 - pdf

K. Huang, J. M. Carulli, and Y. Makris "Counterfeit Electronics: A Rising Threat in the Semiconductor Manufacturing Industry" 2013 - pdf

F. Koushnafar, and I. Markov "Design Chips that Protect Themselves" 2010 - pdf

G. Masalskis, and R. Navickas "Reverse engineering of CMOS integrated circuits" 2008 - pdf

I. McLoughlin "Reverse engineering of embedded consumer electronic systems" 2011 - pdf

R. Moudgil, D. Ganta, L. Nazhandali, M. Hsiao, C. Wang, and S. Hall "A Novel Statistical and Circuit-Based Technique for Counterfeit Detection in Existing Ics" 2013 - pdf - bib

R. Moudgil, "A Statistical and Circuit Based Technique for Counterfeit Detection in Existing ICs" 2013 (Master Thesis) - pdf

K. Nohl, D. Evans, S. Starbug, and H. Plötz "Reverse-Engineering a Cryptographic RFID Tag" 2008 - pdf - bib

M. Pecht, and S. Tiku "Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics" 2006 - pdf - bib

M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri "Hardware Security: Threat Models and Metrics" 2013 - pdf

B. Sood, D. Das, and M. Pecht "Screening for counterfeit electronic parts" 2011 - pdf - bib

P. Subramanyan, N. Tsiskaridze, W. Li, A. Gascon, W. Yang Tan, A. Tiwari, N. Shankar, S. A. and S. Malik "Reverse Engineering Digital Circuits Using Structural and Functional Analyses" 2013 - pdf - bib

R. Torrance, and D. James "Reverse engineering in the semiconductor industry" 2007 - pdf

R. Torrance, and D. James "The state-of-the-art in semiconductor reverse engineering" 2011 - pdf - bib

IC Protection: (top)

Y. Alkabani, and F. Koushanfar "Active hardware metering for intelectual property" 2007 - pdf - bib

Y. Alkabani, F. Koushanfar, and M. Potkonjak "Remote activation of ICs for piracy prevention and digital right management" 2007 - pdf - bib

A. Baumgarten, A. Tyagi, and J. Zambreno "Preventing IC Piracy Using Reconfigurable Logic Barriers" 2010 - pdf - bib

A. Baumgarten "Preventing integrated circuit piracy using reconfigurable logic barriers" 2010 (Master Thesis) - pdf

L. Bossuet "Sécurité de la conception et protection de la propriété intellectuelle - état de l'art" 2012 - slides (in french)

L. Bossuet, and D. Hely "SALWARE: Salutary Hardware to design Trusted IC" 2013 - pdf

U. Guin, D. Forte and M. Tehranipoo "Anti-Counterfeit Techniques: from Design to Resign" 2013 - pdf

J. Huang, and J. Lach "IC activation and user authentication for security-sensitive systems" 2008 - pdf - bib

E. Jung, C.C. Hung, M. Yang, and S. Choi "An locking and unlocking primitive function of FSM-modeled sequential systems based on extracting logical property" 2013 - pdf

F. Koushanfar "Integrated circuits metering for piracy protection and digital rights management: an overview" 2011 - pdf - bib

F. Koushanfar, S. Fazzari, C. McCants, W. Bryson, P. Song, M. Sale, and M. Potkonjak "Can EDA combat the rise of electronic counterfeiting?" 2012 - pdf - bib

F. Koushanfar "Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management" 2012 - pdf - bib

F. Koushanfar "Hardware Metering: A Survey" 2012 (book chapter) - pdf

B. Liu, and B. Wang "Embedded reconfigurable Logic for ASIC Design Obfuscation Against Supply Chain Attacks" 2014 - pdf

R. Maes, D. Schellekens, P. Tuyls, and I. Verbauwhede "Analysis and design of active IC metering schemes" 2009 - pdf - bib

J.A. Roy, F. Koushanfar, and I.L. Markov "EPIC: Ending Piracy of Integrated Circuits" 2008 - pdf - bib

J.A. Roy, F. Koushanfar, and I.L. Markov "Protecting bus-based hardware IP by secret sharing" 2008 - pdf - bib

J.A. Roy, F. Koushanfar, and I.L. Markov "Ending Piracy of Integrated Circuits" 2010 - pdf - bib

M. Shiozaki, R. Hori, and T. Fujino "Diffusion Programmable Device: The device to prevent reverse engineering" 2014 - pdf

S. Wei, F. Koushanfar, and M. potkonjak "Integrated circuit digital rights management techniques using physical level characterization" 2011 - pdf - bib

X. Zhang "On-Chip Structures and Techniques to improve the Security, Trustworthiness and Reliability of Integrated Circuits" 2013 (Ph.D. Thesis) - pdf

IP Protection: (top)

W. Adi, B. Soudan, and N. Kassab "A protection mechanism for intellectual property rights (IPR) in FPGA design environment" 2003 - pdf - bib

Y. Alkabani, F. Koushanfar, and M. Potkonjak "Remote activation of ICs for piracy prevention and digital right management" 2007 - pdf - bib

Y. Alkabani, and F. Koushanfar "Active control and digital rights management of integrated circuit IP cores" 2008 - pdf - bib

N. Couture, and K.B. Kent "Periodic licensing of FPGA based intellectual property" 2006 - pdf - bib

F. Durvaux, B. Gérard, S. Kerckhof, F. Koeune, and F.X. Standaert "Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions" 2012 - pdf - bib

L. Gaspar, V. Fischer, T. and Guneysu, and Z. Cherif "Two IP protection schemes for multi-FPGA systems" 2012 - pdf - bib

W.P. Griffin, A. Raghunathan, and K. Roy "CLIP: Circuit Level IC Protection Through Direct Injection of Process Variations" 2012 - pdf - bib

J. Guajardo, T. Guneysu, S.S. Kumar, and C. Paar "Secure IP-block distribution for hardware devices" 2009 - pdf - bib

T. Guneysu, B. Moller, and C. Paar "Dynamic Intellectual Property Protection for Reconfigurable Devices" 2007 - pdf - bib

T. Guneysu, B. Moller, and C. Paar "New Protection Mechanisms for Intellectual Property in Reconfigurable Logic" 2007 - pdf - bib

T. Kean "Cryptographic rights management of FPGA intellectual property cores" 2002 - pdf - bib

S. Kerckhof, F. Durvaux, F.X. Standaert, and B. Gérard "Intellectual property protection for FPGA designs with soft physical hash functions: first experimental results" 2013 - pdf

F. Koushanfar, G. Qu, and M. Potkonjak "Intellectual Property Metering" 2001 - pdf - bib

R. Maes, D. Schellekens, and I. Verbauwhede "A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs" 2012 - pdf - bib

S. Malipatlolla, and S.A. Huss "A novel method for secure intellectual property deployment in embedded systems" 2011 - pdf - bib

C. Marsh, T. Kean, and D. Mclaren "Protecting designs with a passive thermal tag" 2008 - pdf - bib

S. Narasimhan, S. Bhunia, and R.S. Chakraborty "Hardware IP Protection During Evaluation Using Embedded Sequential Trojan" 2012 - pdf - bib

L. Parrilla, E. Castillo, A. Garcia, E. Todorovich, D. Gonzalez, and A. Lloris "Intelectuall property protection of µP cores" 2009 - pdf

D. Saha, and S. Sur-Kolay "SoC: a real platform for IP reuse, IP infringement, and IP protection" 2011 - pdf - bib

E. Simpson, and P. Schaumont "Offline hardware/software authentication for reconfigurable platforms" 2006 - pdf - bib

B. Soudan, W. Adi, and A. Hanoun "Novel secret-key IPR protection in FPGA environment" 2005 - pdf - bib

P. Yeolekar, R. A. Shafik, J. Mathew, D. K. Pradhan, and S. P. Mohanty "STEP: a unified design methodology for secure test and IP core protection" 2012 - pdf - bib

L. Yuan, G. Qu, L. Ghouti, and A. Bouridane "VLSI Design IP Protection: Solutions, New Challenges, and Opportunities" 2006 - pdf - bib

D. Ziener, and J. Teich "Power Signature Watermarking of IP Cores for FPGAs" 2008 - pdf - bib

D. Ziener, and J. Teich "New directions for FPGA IP Core watermarking and identification" 2010 - pdf

D. Ziener "Security and reliability of IP cores embedded in FPGA and ASIC designs" 2010 (Thesis) - pdf

IP Watermarking: (top)

A. Abdel-Hamid, S. Tahar, and E. Aboulhamid "A Survey on IP Watermarking Techniques" 2004 - pdf - bib

G.T. Becker, M. Kasper, A. Moradi, and C; Paar "Side-channel based watermarks for IP protection" 2010 - pdf

G.T. Becker, M. Kasper, A. Moradi, and C; Paar "Side-channel based watermarks for integrated circuits" 2010 - pdf - bib

R. Chapman, and T.S. Durrani "IP protection of DSP algorithms for system on chip implementation" 2000 - pdf - bib

A. Cui, and C. Chip-Hong "Intellectual property authentication by watermarking scan chain in design-for-testability flow" 2008 - pdf - bib

A. Cui, and C. Chip-Hong "An improved publicly detectable watermarking scheme based on scan chain ordering" 2009 - pdf - bib

Y.C. Fan, and H.W. Tsao "Watermarking for intellectual property protection" 2003 - pdf - bib

Y.C. Fan "Testing-Based Watermarking Techniques for Intellectual-Property Identification in SOC Design" 2008 - pdf - bib

I. Hong, M. Potkonjak "Behavioral synthesis techniques for intellectual property protection" 1999 - pdf - bib

A. K. Jain, L. Yuan, P. Pari, and G. Qu "Zero overhead watermarking technique for FPGA designs" 2003 - pdf - bib

P. A. Jamieson "Intellectual property protection via watermarking: a survey" 2000 - pdf

A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker, W. Huijuan, and G. Wolfe "Constraint-based watermarking techniques for design IP protection" 2001 - pdf - bib

M. Kasper, A. Moradi, G.T. Becker, O. Mischke, T. Güneysu, C. Paar, and W. Burleson "Side Channels as Building Blocks" 2013 - pdf - bib

D. Kirovski, H. Yean-Yow, M. Potkonjak, and J. Cong "Intellectual property protection by watermarking combinational logic synthesis solutions" 1998 - pdf - bib

D. Kirovski, and M. Potkonjak "Intellectual property protection using watermarking partial scan chains for seuqential logic test generation" 1998 - pdf

D. Kirovski, and M. Potkonjak "Local watermarks: methodology and application to behavioral synthesis" 2003 - pdf - bib

D. Kirovski, H. Yean-Yow, M. Potkonjak, and J. Cong "Protecting Combinational Logic Synthesis Solutions" 2006 - pdf - bib

F. Koushanfar, I. Hong, and M. Potkonjak "Behavioral synthesis techniques for intellectual property protection" 2005 - pdf - bib

J. Kufel, P. Wilson, S. Hill, B. M. Al-Hashimi, P. N. Whatmough, and J. Myers "Clock-Modulation Based Watermark for Protection of Embedded processors" 2014 - pdf

J. Lach, W. Mangione-Smith, and M. Potkonjak "Robust FPGA intellectual property protection through multiple small watermarks" 1999 - pdf - bib

B. LeGal, and L. Bossuet "Automatic low-cost IP watermarking technique based on output mark insertions" 2012 - pdf - bib

W. Liang, X. Sun, Z. Ruan, J. Long, and C. Wu "A sequential circuit-based IP watermarking algorithm for multiple scan chains in design-for-test" 2011 - pdf

W. Liang, X. Sun, Z. Xia, D. Sun, and J. Long "A chaotic IP watermarking in physical layout level based on FPGA" 2011 - pdf

M.C. Lin, G.R. Tsai, W. Chun-Rong, and C.H. Lin "Watermarking Technique for HDL-based IP Module Protection" 2007 - pdf - bib

D. Liu, J. Wong, D. Kirovski, and M. Potkonjak "Forensic engineering techniques for VLSI CAD tools" 2001 - pdf

S. Miao, G. Dai, D. Mu, and M. Li "Using combinational logic function to watermak IP based on FPGA" 2006 - pdf

T. Nie "Performance evaluation for IP protection watermarking techniques" (Book Chapter) - pdf

G. Qu "Publicly detectable watermarking for intellectual property authentication in VLSI design" 2002 - pdf - bib

A. Rashid, J. Asher, W.H. Mangione-Smith, and M. Potkonjak "Hierarchical watermarking for protection of DSP filter cores" 1999 - pdf - bib

I. Torunoglu, and E. Charbon "Watermarking-based copyright protection of sequential functions" 2000 - pdf - bib

VLSI Alliance "Intellectual property protection schemes, alternatives and discussion " 2000 (White Paper) - pdf

G. Wolfe, J.L. Wong, and M. Potkonjak "Watermarking graph partitioning solutions" 2001 - pdf - bib

J.L. Wong, D. Kirovski, and M. Potkonjak "Computational forensic techniques for intellectual property protection" 2004 - pdf - bib

L. Yuan, P. Pari, and G. Qu "Proceedings of the 6th international conference on Information Hiding" 2004 - pdf - bib

L. Yuan, G. Qu, A. Srivastava "VLSI CAD tool protection by birthmarking design solutions" 2005 - pdf - bib

L. Yuan, G. Qu, L. Ghout, and A. Bouridane "VLSI Design IP Protection: Solutions, New Challenges, and Opportunities" 2006 - pdf - bib

J. Zhang, Y. Lin, Q. Wu, and W. Che "Watermarking FPGA bitfile for intellectual property protection" 2012 - pdf

D. Ziener, and J. Teich "FPGA core watermarking based on power signature analysis" 2006 - pdf - bib

D. Ziener, S. Assmus and J. Teich "Identifying FPGA IP-Cores Based on Lookup Table Content Analysis" 2006 - pdf - bib

D. Ziener, F. Baueregger and J. Teich "Multiplexing methods for power watermarking" 2010 - pdf - bib

D. Ziener, and J. Teich "New directions for FPGA IP core watermarking and Identification" 2010 - pdf

D. Ziener, M. Schmid, and J. Teich "Robustness analysis of watermark verification techniques for FPGA netlist cores" 2010 - pdf

D. Ziener "Techniques for increasing security and reliability of IP cores embedded in FPGA and ASIC designs" 2010 (Thesis) - pdf

HDL Obfuscation: (top)

M. Brzozowski, and V.N. Yarmolik "Obfuscation as Intellectual Rights Protection in VHDL Language" 2007 - pdf - bib

M. Brzozowski, and V.N. Yarmolik "Obfuscation quality in hardware designs" 2009 - pdf

U. Meyer-Baese, E. Castillo, G. Botella, L. Parilla, and A. Garcia "Intellectual Property Protection (IPP) using Obfuscation in C, VHDL, and Verilog Coding" 2011 - pdf

Logic Encryption - Obfuscation: (top)

J. Bringer, H. Chabanne, and T. Icart "On Physical Obfuscation of Cryptographic Algorithms" 2009 - pdf - bib

R.S. Chakraborty, and S. Bhunia "Hardware protection and authentication through netlist level obfuscation" 2008 - pdf - bib

R.S. Chakraborty, and S. Bhunia "Security through obscurity: An approach for protecting Register Transfer Level hardware IP" 2009 - pdf - bib

R.S. Chakraborty "Hardware security through design obfuscation" 2010 (Ph.D. Thesis) - pdf

A.R. Desai "Anti-Counterfeit and Anti-Tamper Implementation using Hardware Obfuscation" 2013 (Master Thesis) - pdf

F. Koushanfar, and Y. Alkabani "Provably secure obfuscation of diverse watermarks for sequential circuits" 2010 - pdf - bib

L. Li, and H. Zhou "Structural Transformation for Best-Possible Obfuscation of Sequential circuits" 2013 - pdf

B. Liu, and B. Wang "Embedded reconfigurable Logic for ASIC Design Obfuscation Against Supply Chain Attacks" 2014 - pdf

J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri "Logic encryption: A fault analysis perspective" 2012 - pdf - bib

J. Rajendran, Y. Pino, O. Sinanoglu, and R. Karri "Security analysis of logic obfuscation" 2012 - pdf - bib

J. Rajendran, O. Sinanoglu, M. Sam, and R. Karri "Security analysis of integrated circuit camouflaging" 2013 - pdf

X. Zhuang, T. Zhang, H.H. Lee, and S. Pande "Hardware assisted control flow obfuscation for embedded processors" 2004 - pdf - bib

FPGA Bitstream Security: (top)

ACTEL "Design Security in Nonvolatile Flash and Antifuse FPGAs" 2002 - pdf

B. Badrignans, R. Elbaz, and L. Torres "Secure FPGA configuration architecture preventing system downgrade" 2008 - pdf - bib

B. Badrignans, R. Elbaz, and L. Torres "Secure update Mechanism for Remote Update of FPGA-Based System" 2008 - pdf - bib

L. Bossuet, G. Gogniat, and W. Burleson "Dynamically configurable security for SRAM FPGA bitstreams" 2004 - pdf - bib

L. Bossuet, G. Gogniat, and W. Burleson "Dynamically configurable security for SRAM FPGA bitstreams (long version)" 2006 - pdf - bib

J. Castillo, P. Huerta, V. Lopez, and J.I. Martinez "A secure self-reconfiguring architecture based on open-source hardware" 2005 - pdf - bib

J. Castillo, P. Huerta, and J.I. Martinez "Secure IP downloading for SRAM FPGAs" 2007 - pdf - bib

B. Christiansen "Active FPGA security through decoy circuits" 2006 (Master Thesis) - pdf

F. Devic "Securing embedded systems based on FPGA technologies" 2012 (Ph.D. Thesis) - pdf

P. Dillien "Prevent FPGA cloning" 2009 - pdf

S. Drimer "Authentication of FPGA bitstreams: why and how" 2007 - pdf - bib

S. Drimer "Volatile FPGA design security - a survey" 2007 - pdf

S. Drimer, and M. G. Kuhn "A Protocol for Secure Remote Updates of FPGA Configurations" 2009 - pdf - bib

F. Durvaux, S. Kerckhof, F. Regazzoni, and F.X. Standaert "A Survey of Recent Results in FPGA Security and Intellectual Property Protection" 2014 - pdf - bib

S. Gören, O. Ozkurt, A. Yildiz, H. F. Ugurdag, R. S. Chakraborty, D. Mukhopadhyay "Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration" 2013 - pdf - bib

T. Güneysu, B. Moller, and C. Paar "Dynamic Intellectual Property Protection for Reconfigurable Devices" 2007 - pdf - bib

T. Güneysu, B. Moller, and C. Paar "New Protection Mechanisms for Intellectual Property in Reconfigurable Logic" 2007 - pdf - bib

T. Güneysu "Cryptography and cryptanalysis on reconfigurable devices" 2009 (Thesis) - pdf

T. Güneysu, I. Markov, and A. Weimerskirch "Securely sealing Multi-FPGA systems" 2012 - pdf - bib

Y. Hori, A. Satoh, H. Sakane, and K.Toda "Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems" 2008 - pdf - bib

Y. Hori, T. Katashita, and A. Satoh "Tackling the security issues of FPGA partial reconfiguration with physical unclonable functions" 2012 - pdf

C. Hu "Solving today's design sacurity concerns" 2010 - pdf

T. Huffmire, B. Brotherton, T. Sherwood, R. Kastner, T. Levin, T.D. Nguyen, and C. Irvine "Managing Security in FPGA-Based Embedded Systems" 2008 - pdf - bib

T. Huffmire, T. Levin, T. Nguyen, C. Irvine, B. Brotherton, G. Wang, T. Sherwood, R. Kastner "Security Primitives for Reconfigurable Hardware-Based Systems" 2010 - pdf - bib

T. Kean "Secure Configuration of a Field Programmable Gate Array (short)" 2001 - pdf - bib

T. Kean "Secure Configuration of a Field Programmable Gate Array (long)" 2001 - pdf

T. Kean "Cryptographic rights management of FPGA intellectual property cores" 2002 - pdf - bib

K. Kepa, F. Morgan, K. Kosciuszkiewicz, and T. Surmacz "SeReCon: a secure reconfiguration controller for self reconfigurable systems" 2010 - pdf - bib

S. McNeil "Solving today's design sacurity concerns" 2012 - pdf

N. Mentens, J. Vliegen, A. Braeken, A. Touhafi, K. Wouters, and I. Verbauwhede "Secure remote reconfiguration of FPGAs" 2010 - pdf

A. Moradi, A. Barenghi, T. Kasper, and C. Paar "On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs" 2011 - pdf - bib

A. Moradi, M. Kasper, and C. Paar "Black-Box side-channel attacks highlight the importance of countermeasures: an analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism" 2012 - pdf - bib

A. Moradi, M. Kasper, and C. Paar " On the portability of side-channel attacks - an analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism" 2012 - pdf

A. Moradi, D. Oswald, C. Paar, and P. Swierczynski "Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering" 2013 - pdf - bib

M. Nakanishi "An FPGA Configuration Scheme for Bitstream Protection" 2008 - pdf - bib

J.B. Note, and E. Rannaud "From the bitstream to the netlist" 2008 - pdf - bib

M. Parelkar " FPGA security - Bitstream authentication" pdf

E. Simpson, and P. Schaumont "Offline hardware/software authentication for reconfigurable platforms" 2006 - pdf - bib

S. Skorobogatov, and C. Woods "In the blink of an eye: There goes your AES key" 2012 - pdf

S. Trimberger "Trusted Design in FPGAs" 2007 - pdf - bib

J. B. Webb "Methods for securing the integrity of FPGA configurations" 2009 (Master Thesis) - pdf

T. Wollinger, J. Guajardo, and C. Paar "Security on FPGAs: State-of-the-art implementations and attacks" 2003 - pdf - bib

T. Wollinger, and C. Paar "Security aspects of FPGAs in cryptographic applications" 2004 (Book Chapter) - pdf

A.S. Zeineddini, and K. Gaj "Secure partial reconfiguration of FPGAs" 2005 - pdf - bib

A.S. Zeineddini "Secure partial reconfiguration of FPGAs" 2005 (Master Thesis)- pdf

J.X. Zheng, and M. Potkonjak "Securing netlist-level FPGA design through exploiting process variation and degradation" 2012 - pdf

Trustworthy Manufacturing: (top)

G. Bloom, B. Narahari, and R. Simha "Fab forensics: Increasing trust in IC fabrication" 2010 - pdf - bib

F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara "Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation" 2013 - pdf -

H. Livingston "Avoiding Counterfeit Electronic Components" 2007 - pdf - bib

 

compteur gratuit