Default Cover Image

2008 IEEE International Workshop on Hardware-Oriented Security and Trust

June 9 2008 to June 9 2008

Anaheim, CA, USA

ISBN: 978-1-4244-2401-6

Table of Contents

Session 4 Hardware TrojansFreely available from IEEE.pp. 39-39
A region based approach for the identification of hardware TrojansFull-text access may be available. Sign in or learn about subscription options.pp. 40-47
Papers
Table of contentsFreely available from IEEE.pp. iii-iv
Papers
Keynote addressFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Sensitivity analysis to hardware Trojans using power supply transient signalsFull-text access may be available. Sign in or learn about subscription options.pp. 3-7
Papers
At-speed delay characterization for IC authentication and Trojan Horse detectionFull-text access may be available. Sign in or learn about subscription options.pp. 8-14
Papers
Detecting malicious inclusions in secure hardware: Challenges and solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Papers
Slicing up a perfect hardware masking schemeFull-text access may be available. Sign in or learn about subscription options.pp. 21-25
Papers
Extended abstract: A high-performance, low-overhead, power-analysis-resistant, single-rail logic styleFull-text access may be available. Sign in or learn about subscription options.pp. 33-36
Papers
The role of platform integrity in trustworthy systemsFull-text access may be available. Sign in or learn about subscription options.pp. 38
Papers
On-demand transparency for improving hardware Trojan detectabilityFull-text access may be available. Sign in or learn about subscription options.pp. 48-50
Papers
Hardware Trojan detection using path delay fingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 51-57
Papers
Verifying the authenticity of chip designs with the DesignTag systemFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
Papers
Extended abstract: Circuit CAD tools as a security threatFull-text access may be available. Sign in or learn about subscription options.pp. 65-66
Papers
Extended abstract: The butterfly PUF protecting IP on every FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
Papers
Extended abstract: Unified digit-serial multiplier/inverter in finite field GF(2m)Full-text access may be available. Sign in or learn about subscription options.pp. 72-75
Papers
IC activation and user authentication for security-sensitive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 76-80
Papers
Poster sessionFreely available from IEEE.pp. 81
Papers
A solution for on-line trust validationFull-text access may be available. Sign in or learn about subscription options.pp. 100
Papers
Extended abstract: DesignerFull-text access may be available. Sign in or learn about subscription options.pp. 82-83
Papers
Reassessing the TCG specifications for trusted computing in mobile and embedded systemsFull-text access may be available. Sign in or learn about subscription options.pp. 84-90
Papers
Extended abstract: An embedded flash memory vault for software Trojan protectionFull-text access may be available. Sign in or learn about subscription options.pp. 97-99
Showing 26 out of 26