ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
Latest Publications
TOTAL DOCUMENTS
34
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By IEEE
9781424424016
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Keynote address
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559035
◽
2008
◽
Cited By ~ 1
Author(s):
Dean Collins
Keyword(s):
Keynote Address
Download Full-text
Sensitivity analysis to hardware Trojans using power supply transient signals
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559037
◽
2008
◽
Cited By ~ 87
Author(s):
Reza Rad
◽
Jim Plusquellic
◽
Mohammad Tehranipoor
Keyword(s):
Sensitivity Analysis
◽
Power Supply
◽
Hardware Trojans
◽
Transient Signals
Download Full-text
The role of platform integrity in trustworthy systems
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559045
◽
2008
◽
Author(s):
Kevin Schutz
Download Full-text
Extended abstract: An embedded flash memory vault for software Trojan protection
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559063
◽
2008
◽
Cited By ~ 1
Author(s):
Francis Wolff
◽
Chris Papachristou
◽
David McIntyre
◽
Daniel Weyer
◽
William Clay
Keyword(s):
Flash Memory
◽
Embedded Flash
Download Full-text
IC activation and user authentication for security-sensitive systems
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559056
◽
2008
◽
Cited By ~ 13
Author(s):
Jiawei Huang
◽
John Lach
Keyword(s):
User Authentication
Download Full-text
Hardware Trojan detection using path delay fingerprint
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559049
◽
2008
◽
Cited By ~ 46
Author(s):
Yier Jin
◽
Yiorgos Makris
Keyword(s):
Hardware Trojan
◽
Path Delay
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559062
◽
2008
◽
Author(s):
Malcolm Taylor
◽
Chi-En Yin
◽
Min Wu
◽
Gang Qu
Keyword(s):
Data Hiding
◽
High Performance
Download Full-text
Detecting malicious inclusions in secure hardware: Challenges and solutions
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559039
◽
2008
◽
Cited By ~ 80
Author(s):
Xiaoxiao Wang
◽
Mohammad Tehranipoor
◽
Jim Plusquellic
Keyword(s):
Secure Hardware
Download Full-text
Extended abstract: Circuit CAD tools as a security threat
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559052
◽
2008
◽
Cited By ~ 17
Author(s):
Jarrod A. Roy
◽
Farinaz Koushanfar
◽
Igor L. Markov
Keyword(s):
Security Threat
◽
Cad Tools
Download Full-text
Slicing up a perfect hardware masking scheme
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
◽
10.1109/hst.2008.4559041
◽
2008
◽
Cited By ~ 1
Author(s):
Zhimin Chen
◽
Patrick Schaumont
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close