A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
At-speed delay characterization for IC authentication and Trojan Horse detection
2008
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
New attacker scenarios involving integrated circuits (ICs) are emerging that pose a tremendous threat to national security. Concerns about overseas fabrication facilities and the protection of deployed ICs have given rise to methods for IC authentication (ensuring that an IC being used in a system has not been altered, replaced, or spoofed) and hardware Trojan Horse (HTH) detection (ensuring that an IC fabricated in a nonsecure facility contains the desired functionality and nothing more), but
doi:10.1109/hst.2008.4559038
dblp:conf/host/LiL08
fatcat:ni6dab5rrrgzdggh2b6c4iy6fi