Hardware security: Threat models and metrics, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.819-823, 2013. ,
DOI : 10.1109/ICCAD.2013.6691207
Survey of hardware protection of design data for integrated circuits and intellectual properties, IET Computers & Digital Techniques, vol.8, issue.6, p.274, 2014. ,
DOI : 10.1049/iet-cdt.2014.0028
URL : https://hal.archives-ouvertes.fr/ujm-01180551
Counterfeit electronics: A rising threat in the semiconductor manufacturing industry, Proceedings of the IEEE International Test Conference, pp.1-4, 2013. ,
Counterfeit chips on the rise, IEEE Spectrum, vol.49, issue.6, 2012. ,
DOI : 10.1109/MSPEC.2012.6203952
Bogus! Electronic manufacturing and consumers confront a rising tide of counterfeit electronics, IEEE Spectrum, 2006. ,
SALWARE: Salutary Hardware to design Trusted IC, Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00961641
Automatic low-cost IP watermarking technique based on output mark insertions, Design Automation for Embedded Systems, vol.17, issue.5, pp.71-92, 2012. ,
DOI : 10.1007/s10617-012-9085-y
IP watermark verification based on power consumption analysis, 2014 27th IEEE International System-on-Chip Conference (SOCC), pp.330-335, 2014. ,
DOI : 10.1109/SOCC.2014.6948949
URL : https://hal.archives-ouvertes.fr/ujm-01063085
Fact or Busted? A Security Evaluation of Physically Unclonalble Functions Cast in Silicon, Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, Spinger, Lecture Note on Computer Science, pp.283-301, 2012. ,
Contactless transmission of intellectual property data to protect FPGA designs, 2015 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pp.19-24, 2015. ,
DOI : 10.1109/VLSI-SoC.2015.7314385
URL : https://hal.archives-ouvertes.fr/hal-01218722
Trustworthy Hardware: Identifying and Classifying Hardware Trojans, Computer, vol.43, issue.10, pp.39-46, 2010. ,
DOI : 10.1109/MC.2010.299
A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010. ,
DOI : 10.1109/MDT.2010.7
Hardware IP Protection During Evaluation Using Embedded Sequential Trojan, IEEE Design & Test of Computers, vol.29, issue.3, pp.70-79, 2012. ,
DOI : 10.1109/MDT.2012.2205997
Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Experimental implementation of 2ODPA attacks on AES design with flash-based FPGA technology, 2010 International Conference on Microelectronics, pp.407-410, 2010. ,
DOI : 10.1109/ICM.2010.5696173
URL : https://hal.archives-ouvertes.fr/ujm-00552196
Protecting designs with a passive thermal tag, 2008 15th IEEE International Conference on Electronics, Circuits and Systems, pp.218-221, 2008. ,
DOI : 10.1109/ICECS.2008.4674830
Power Signature Watermarking of IP Cores for FPGAs, Journal of Signal Processing Systems, vol.51, issue.1, pp.123-136, 2008. ,
DOI : 10.1007/s11265-007-0136-8
Side-channel based watermarks for integrated circuits, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.30-35, 2010. ,
DOI : 10.1109/HST.2010.5513117
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.7-12, 2013. ,
DOI : 10.1109/HST.2013.6581557
Architectures of flexible symmetric key crypto engines???a survey, ACM Computing Surveys, vol.45, issue.4, 2013. ,
DOI : 10.1145/2501654.2501655
URL : https://hal.archives-ouvertes.fr/hal-00765634
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, pp.382-395, 2009. ,
DOI : 10.1007/978-3-642-04138-9_27
TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs, 2013 International Conference on Field-Programmable Technology (FPT), pp.160-167, 2013. ,
DOI : 10.1109/FPT.2013.6718347
HCrypt: A Novel Reconfigurable Crypto-processor with Secured Key Management, the Proceedings of the International Conference on ReConFigurable Computing and FPGAs, pp.280-285, 2010. ,
URL : https://hal.archives-ouvertes.fr/ujm-00552139
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software, Proceedings of the Second International Conference on Trusted Systems, pp.253-270, 2010. ,
DOI : 10.1109/SP.2010.19
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, pp.173-187, 2010. ,
DOI : 10.1007/978-3-642-15031-9_12
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis, IEEE Transactions on Computers, vol.62, issue.11, pp.2183-2195, 2013. ,
DOI : 10.1109/TC.2012.200
A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp.1735-1744, 2010. ,
DOI : 10.1109/TVLSI.2009.2029117
Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator, Proceedings on International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012. ,
DOI : 10.1007/978-3-642-29912-4_12
URL : https://hal.archives-ouvertes.fr/lirmm-00761824
EM leakage analysis on True Random Number Generator: Frequency and localization retrieval method, Proceedings of the Asia Pacific International Symposium and Exhibition on Electromagnetic Compatibility, 2013. ,
The state-of-the-art in semiconductor reverse engineering, Proceedings of the 48th Design Automation Conference on, DAC '11, pp.333-338, 2011. ,
DOI : 10.1145/2024724.2024805
Reverse Engineering Digital Circuits Using Structural and Functional Analyses, IEEE Transactions on Emerging Topics in Computing, 2013. ,
DOI : 10.1109/TETC.2013.2294918
Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
Hardware Trojan Detection using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust, pp.51-57, 2008. ,
Available online: http://www.tek.com/sites/tek.com/files/media/media/resources/RSA5000- Series-Spectrum-Analyzers-Datasheet-37W2627414_1, Spectrum Analyzers Datasheet, 2015. ,
Side channels as building blocks, Journal of Cryptographic Engineering, vol.51, issue.1, pp.143-159, 2012. ,
DOI : 10.1007/s13389-012-0040-4
Counterfeit Integrated Circuits -Detection and Avoidance, 2015. ,
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon, IEEE Transactions on Emerging Topics in Computing, vol.2, issue.1, pp.30-36, 2014. ,
DOI : 10.1109/TETC.2013.2287182
URL : https://hal.archives-ouvertes.fr/hal-00961503
Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher, 2009 3rd International Conference on Signals, Circuits and Systems (SCS), pp.1-6, 2009. ,
DOI : 10.1109/ICSCS.2009.5412604