최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.2, 2021년, pp.187 - 195
조민기 (연세대학교 정보대학원 정보보호연구실) , 정세연 (연세대학교 정보대학원 정보보호연구실) , 권태경 (연세대학교 정보대학원 정보보호연구실)
The hardware Trojan that can be loaded into an FPGA-based system during the development phase is a serious security problem. The conventional hardware Trojan detection techniques, such as side channel analysis and logic testing, are widely used, however, a hardware Trojan which is inserted as the fo...
S. Bhunia, M.S. Hsiao, M. Banga, and S. Narasimhan, "Hardware Trojan attacks: Threat analysis and countermeasures," Proceedings of the IEEE, vol. 102, no. 8, pp. 1229-1247, Jul. 2014.
A.P. Johnson, S. Patranabis, R.S. Chakraborty, and D. Mukhopadhyay, "Remote dynamic clock reconfiguration based attacks on Internet of Things applications," Proceedings of the Euromicro Conference on Digital System Design, pp. 431-438, Aug. 2016.
R.S. Chakraborty, I. Saha, A. Palchaudhuri, and G.K. Naik, "Hardware Trojan insertion by direct modification of FPGA configuration bit-stream," IEEE Design & Test, vol. 30, no. 2, pp. 45-54, Feb. 2013
J.-B. Note and E. Rannaud, "From the bitstream to the netlist." Proceedings of the International Conference on Field Programmable Gate Array, pp. 264-264, Feb. 2008.
F. Benz, A. Seffrin, and S.A. Huss, "BIL: A toolchain for bitstream reverse-engineering," Proceedings of the International Conference on Field Programmable Logic and Applications, pp. 735-738, IEEE, Aug. 2012.
Z. Ding, Q. Wu, Y. Zhang, and L. Zhu, "Deriving an NCD file from an FPGA bit-stream: Methodology, architecture and evaluation," Microprocessors and Microsystems, vol. 37, no. 3, pp. 299-312, May. 2013.
T. Zhang, J. Wang, S. Guo, and Z. Chen. "A comprehensive FPGA reverse engineering tool-chain: From bitstream to RTL code," IEEE Access, vol. 7, 38379-38389, Feb. 2019.
TrustHub, "TrustHub," https://trust-hub.org/, Feb. 2021.
A. Waksman, M. Suozzo, and S. Sethumadhavan. "FANCI: Identification of stealthy malicious logic using Boolean functional analysis," Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 697-708, Nov. 2013.
J. Zhang, F. Yuan, and Q. Xu. "Detrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans," Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 153-166, Nov. 2014.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.