Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
HST
HST 2008
Generate Citations
2008 IEEE International Workshop on Hardware-Oriented Security and Trust
June 9 2008 to June 9 2008
Anaheim, CA, USA
ISBN: 978-1-4244-2401-6
Table of Contents
Session 4 Hardware Trojans
Freely available from IEEE.
pp. 39-39
A region based approach for the identification of hardware Trojans
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Mainak Banga
,
Michael S. Hsiao
Papers
2008 IEEE international workshop on hardware-oriented security and trust (HOST)
Freely available from IEEE.
pp. i
Papers
Table of contents
Freely available from IEEE.
pp. iii-iv
Papers
Keynote address
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Dean Collins
Papers
Sensitivity analysis to hardware Trojans using power supply transient signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-7
by
Reza Rad
,
Jim Plusquellic
,
Mohammad Tehranipoor
Papers
At-speed delay characterization for IC authentication and Trojan Horse detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-14
by
Jie Li
,
John Lach
Papers
Detecting malicious inclusions in secure hardware: Challenges and solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Xiaoxiao Wang
,
Mohammad Tehranipoor
,
Jim Plusquellic
Papers
Slicing up a perfect hardware masking scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-25
by
Zhimin Chen
,
Patrick Schaumont
Papers
Place-and-route impact on the security of DPL designs in FPGAs
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-32
by
Sylvain Guilley
,
Sumanta Chaudhuri
,
Laurent Sauvage
,
Tarik Graba
,
Jean-Luc Danger
,
Philippe Hoogvorst
,
Vinh-Nga Vong
,
Maxime Nassar
Papers
Extended abstract: A high-performance, low-overhead, power-analysis-resistant, single-rail logic style
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-36
by
Eric Menendez
,
Ken Mai
Papers
The role of platform integrity in trustworthy systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 38
by
Kevin Schutz
Papers
On-demand transparency for improving hardware Trojan detectability
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-50
by
Rajat Subhra Chakraborty
,
Somnath Paul
,
Swarup Bhunia
Papers
Hardware Trojan detection using path delay fingerprint
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-57
by
Yier Jin
,
Yiorgos Makris
Papers
Verifying the authenticity of chip designs with the DesignTag system
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Tom Kean
,
David McLaren
,
Carol Marsh
Papers
Extended abstract: Circuit CAD tools as a security threat
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-66
by
Jarrod A. Roy
,
Farinaz Koushanfar
,
Igor L. Markov
Papers
Extended abstract: The butterfly PUF protecting IP on every FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-70
by
Sandeep S. Kumar
,
Jorge Guajardo
,
Roel Maes
,
Geert-Jan Schrijen
,
Pim Tuyls
Papers
Extended abstract: Unified digit-serial multiplier/inverter in finite field GF(2m)
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-75
by
Junfeng Fan
,
Ingrid Verbauwhede
Papers
IC activation and user authentication for security-sensitive systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-80
by
Jiawei Huang
,
John Lach
Papers
Poster session
Freely available from IEEE.
pp. 81
Papers
A solution for on-line trust validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 100
by
Miron Abramovici
Papers
Extended abstract: Designer
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-83
by
Yousra Alkabani
,
Farinaz Koushanfar
Papers
Reassessing the TCG specifications for trusted computing in mobile and embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-90
by
Johann Grossschadl
,
Tobias Vejda
,
Dan Page
Papers
Extended abstract: Trustworthy system security through 3-D integrated hardware
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-92
by
Ted Huffmire
,
Jonathan Valamehr
,
Timothy Sherwood
,
Ryan Kastner
,
Timothy Levin
,
Thuy D. Nguyen
,
Cynthia Irvine
Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-96
by
Malcolm Taylor
,
Chi-En Yin
,
Min Wu
,
Gang Qu
Papers
Extended abstract: An embedded flash memory vault for software Trojan protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-99
by
Francis Wolff
,
Chris Papachristou
,
David McIntyre
,
Daniel Weyer
,
William Clay
Showing 26 out of 26