Tehranipoor, Mohammad
Integrated Circuit Authentication
1. Introduction
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
2. Hardware Trojan Detection: Untrusted Third-Party IP Cores
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
3. Hardware Trojan Detection: Untrusted Manufactured Integrated Circuits
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
4. Design for Hardware Trust: Dummy Scan Flip-Flop Insertion
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
5. Design for Hardware Trust: Layout-Aware Scan Cell Reordering
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
6. Design for Hardware Trust: Ring Oscillator Network
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
7. Design Vulnerability Analysis
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
8. Trojan Prevention: Built-In Self-Authentication
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
9. Counterfeit ICs: Taxonomies, Assessment, and Challenges
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
10. Counterfeit ICs: Detection and Prevention of Recycled ICs Using On-Chip Sensors
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
11. Counterfeit ICs: Path-Delay Fingerprinting
Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang
Keywords: Engineering, Circuits and Systems, Processor Architectures, Electronic Circuits and Devices
- Author(s)
- Tehranipoor, Mohammad
- Salmani, Hassan
- Zhang, Xuehui
- Publisher
- Springer
- Publication year
- 2014
- Language
- en
- Edition
- 2014
- Page amount
- 16 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783319008165