Trojan detection using IC fingerprinting

D Agrawal, S Baktir, D Karakoyunlu… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due
to their much lower cost structure. This poses a significant security risk for ICs used for …

Automated analysis of cryptographic protocols using mur/spl phi

JC Mitchell, M Mitchell, U Stern - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A methodology is presented for using a general-purpose state enumeration tool, Mur/spl
phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of …

Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection

CRA Gonzalez, JH Reed, SC Chen - US Patent 9,268,938, 2016 - Google Patents
Some embodiments described herein include a system that collects and learns reference
side-channel normal activity, process it to reveal key features, compares subsequent …

A method of automatic data path synthesis

CY Hitchcock, DE Thomas - 20th Design Automation …, 1983 - ieeexplore.ieee.org
A method of automatically synthesizing data paths from a behavioral description has been
developed. An initial implementation of this method, which is integrated into the Carnegie …

Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection

CRA Gonzalez, JH Reed, SC Chen - US Patent 10,157,278, 2018 - Google Patents
Some embodiments described herein include a system that collects and learns reference
side-channel normal activity, process it to reveal key features, compares subsequent …

Methods and apparatuses for characteristic management with side-channel signature analysis

CRA Gonzalez, JH Reed, SC Chen - US Patent 10,859,609, 2020 - Google Patents
Some embodiments described herein include an apparatus having a processor
communicatively coupled to a memory. The processor is configured to monitor, at a …

Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems

CRA Gonzalez, JH Reed, SC Chen - US Patent 9,430,644, 2016 - Google Patents
A power fingerprinting system is adopted for assessing integrity of a target computer-based
system. In one imple mentation, the power fingerprinting System may receive, at a first …

Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection

CRA Gonzalez, JH Reed, SC Chen - US Patent 9,411,009, 2016 - Google Patents
Some embodiments described herein include a system that collects and learns reference
side-channel normal activity, process it to reveal key features, compares Subsequent col …

Dynamic supply current testing of analog circuits using wavelet transform

S Bhunia, K Roy - … 20th IEEE VLSI Test Symposium (VTS 2002), 2002 - ieeexplore.ieee.org
Dynamic supply current (IDD) analysis has emerged as an effective way for defect oriented
testing of analog circuits. In this paper, we propose using wavelet decomposition of IDD for …

Defect oriented testing of analog circuits using wavelet analysis of dynamic supply current

S Bhunia, A Raychowdhury, K Roy - Journal of Electronic Testing, 2005 - Springer
Abstract In recent years, Defect Oriented Testing (DOT) has been investigated as an
alternative testing method for analog circuits. In this paper, we propose a wavelet transform …