ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A2: Analog Malicious Hardware
2016 IEEE Symposium on Security and Privacy (SP)
◽
10.1109/sp.2016.10
◽
2016
◽
Cited By ~ 75
Author(s):
Kaiyuan Yang
◽
Matthew Hicks
◽
Qing Dong
◽
Todd Austin
◽
Dennis Sylvester
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Related Documents
Cited By
References
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware
Lecture Notes in Computer Science - Cryptographic Hardware and Embedded Systems – CHES 2017
◽
10.1007/978-3-319-66787-4_21
◽
2017
◽
pp. 425-442
◽
Cited By ~ 7
Author(s):
Nisha Jacob
◽
Johann Heyszl
◽
Andreas Zankl
◽
Carsten Rolfes
◽
Georg Sigl
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Defeating UCI: Building Stealthy and Malicious Hardware
2011 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2011.32
◽
2011
◽
Cited By ~ 65
Author(s):
Cynthia Sturton
◽
Matthew Hicks
◽
David Wagner
◽
Samuel T. King
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Effect of Malicious Hardware Logic on Circuit Reliability
Progress in VLSI Design and Test - Lecture Notes in Computer Science
◽
10.1007/978-3-642-31494-0_22
◽
2012
◽
pp. 190-197
◽
Cited By ~ 1
Author(s):
Sanjay Burman
◽
Ayan Palchaudhuri
◽
Rajat Subhra Chakraborty
◽
Debdeep Mukhopadhyay
◽
Pranav Singh
Keyword(s):
Circuit Reliability
◽
Malicious Hardware
Get full-text (via PubEx)
Exploiting the analog properties of digital circuits for malicious hardware
Communications of the ACM
◽
10.1145/3068776
◽
2017
◽
Vol 60
(9)
◽
pp. 83-91
◽
Cited By ~ 5
Author(s):
Kaiyuan Yang
◽
Matthew Hicks
◽
Qing Dong
◽
Todd Austin
◽
Dennis Sylvester
Keyword(s):
Digital Circuits
◽
Malicious Hardware
Get full-text (via PubEx)
A threat of malicious hardware using on-chip voltmeter
2017 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC)
◽
10.1109/apemc.2017.7975434
◽
2017
◽
Author(s):
Daisuke Fujimoto
◽
Ryo Miyachi
◽
Tsutomu Matsumoto
Keyword(s):
Malicious Hardware
◽
On Chip
Get full-text (via PubEx)
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
2010 IEEE Symposium on Security and Privacy
◽
10.1109/sp.2010.18
◽
2010
◽
Cited By ~ 148
Author(s):
Matthew Hicks
◽
Murph Finnicum
◽
Samuel T. King
◽
Milo M. K. Martin
◽
Jonathan M. Smith
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Compromising FPGA SoCs using malicious hardware blocks
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017
◽
10.23919/date.2017.7927157
◽
2017
◽
Cited By ~ 1
Author(s):
Nisha Jacob
◽
Carsten Rolfes
◽
Andreas Zankl
◽
Johann Heyszl
◽
Georg Sigl
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop - ASHES'19
◽
10.1145/3338508.3359568
◽
2019
◽
Author(s):
Mathieu Gross
◽
Nisha Jacob
◽
Andreas Zankl
◽
Georg Sigl
Keyword(s):
Malicious Hardware
Get full-text (via PubEx)
Design Comparison to Identify Malicious Hardware in External Intellectual Property
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
◽
10.1109/trustcom.2011.82
◽
2011
◽
Cited By ~ 13
Author(s):
Trey Reece
◽
Daniel B. Limbrick
◽
William H. Robinson
Keyword(s):
Intellectual Property
◽
Malicious Hardware
◽
Design Comparison
Get full-text (via PubEx)
Detecting/preventing information leakage on the memory bus due to malicious hardware
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)
◽
10.1109/date.2010.5456930
◽
2010
◽
Cited By ~ 14
Author(s):
Abhishek Das
◽
Gokhan Memik
◽
Joseph Zambreno
◽
Alok Choudhary
Keyword(s):
Information Leakage
◽
Malicious Hardware
Get full-text (via PubEx)
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close