Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Reference :

  1. [1]. Rostami M, Koushanfar. F, Karri. R, “A Primer on Hardware Security: Models, Methods, and Metrics”, Proceedings of IEEE, Vol. 102, Issue – 8, pp. 1283- 1295, Aug 2014.

    [2] “Defense Science Board (DSB) study on High Performance Microchip Supply,” www.acq.osd.mil/dsb/ reports/ADA435563.pdf, 2005.

    [3] SEMI, “Innovation is at risk as semiconductor equipment and materials industry loses up to $4 billion annually due to IP infringement.” www.semi.org/en/Press/P043775, 2008.

    [4] Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Flottes, Rouzeyre and Verbauwhede, “Test versus Security: Past and Present”, IEEE transactions on emerging computing-2013.

    [5] Stephan Mangard et.al.,”Power Analysis Attacks:Revealing the secrets of smart cards” Springer Science-2007.

    [6] M. Tehranipoor and F. Koushanfar, “A survey of hardware trojan taxonomy and detection,” IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10–25, 2010.

    [7]. DARPA, “Integrity and Reliability of Integrated Circuits (IRIS),” http://www.darpa.mil/Our\_Work/MTO/Programs/ Integri ty\_and\_ReliabilityofIntegratedCircuits, 2012.

    [8] https://www.trust-hub.org/resources

    [9]. Xuehui Zhang and Mohammad Tehranipoor, Case Study: Detecting Hardware Trojans in Third-Party Digital IP Cores, IEEE International Symposium on HOST-2011.

    [10]. Trey Reece, William H Robinson, “Analysis of data-leak hardware Trojans in AES cryptographic circuits” Technologies for Homeland Security (HST), 2013 IEEE International Conference on pp. 467-472

    [11]. L. Lin, M. Kasper, T. Güneysu, C. Paar and W. Burleson, "Trojan Side‐Channels: Lightweight Hardware Trojans through Side‐ Channel Engineering," 11th International Workshop Cryptographic Hardware and Embedded Systems (CHES), pp. 382‐395, 2009.

    [12]. Seetharaman Narasimahan, et.al, Hardware Trojan Detection by Multiple Parameter Side-Channel Analysis, IEEE Transactions on computers, vol.62, No.11, November-2013.


Recent Article