Mobile QR Code QR CODE

REFERENCES

1 
Lucero S., Mar., 2016, IoT Platforms - Enabling the Internet of Things, Complimentary Whitepaper, IHS TechnologyGoogle Search
2 
Blythe S., Fraboni B., Lall S., Ahmed H., de Riu U., Feb., 1993, Layout reconstruction of complex silicon chips, Solid-State Circuits, IEEE Journal of, Vol. 28, No. 2, pp. 138-145DOI
3 
Kömmerling O., Kuhn M. G., 1999, Design principles for tam-perresistant smartcard processors, USENIX Workshop of Smartcard Technology (WOST), pp. 9-20Google Search
4 
Skorobogatov S., 2011, Physical attacks on tamper resistance: progress and lessons, 2nd ARO Special Workshop on Hardware AssuranceGoogle Search
5 
Briais S., Cioranesco J.-M., Danger J.-L., Guilley S., Naccache D., Porteboeuf T., 2012, Random active shield, Workshop FDTC, pp. 103-114DOI
6 
Anderson R., 2001, Security Engineering: A Guide to Building De-pendable Distributed Systems, 1st ed., John Wiley & Sons, Inc.Google Search
7 
Ray V., 2009, FREUD Applications of FIB: Invasive FIB Attacks and Countermeasures in Hardware Security Devices, East-Coast Focused Ion Beam User Group MeetingGoogle Search
8 
Tarnovsky C., 2008, Security failures in secure devices, Black Hat DCGoogle Search
9 
Laackmann P., Taddiken H., Nov., 2004, Apparatus for protecting an integrated circuit formed in a substrate and method for protecting the circuit against reverse engineering, US Patent 6,798,234Google Search
10 
Ngo X. T., Danger J., Guilley S., Graba T., Mathieu Y., Najm Z., Bhasin S., Feb., 2017, Cryptographically Secure Shield for Security IPs Protection, Computers, IEEE Transactions on, Vol. 66, No. 2, pp. 354-360DOI
11 
Manich S., Wamser M. S., Sigl G., 2012, Detection of probing attempts in secure ICs, Hardware-Oriented Security Trust, HOST 2012, IEEE International Symposium of, pp. 134-139DOI
12 
Tarnovsky C., 2013, Tarnovsky Deconstruct Processor, https://www.youtube.com/watch?v=w7PT0nrK2BEGoogle Search
13 
Shi Q., Asadizanjani N., Forte D., Tehranipoor M., 2016, A layout-driven framework to access vulnerability of ICs to microprobing attacks, Hardware-Oriented Security Trust, HOST 2016, IEEE International Symposium of, pp. 155-160DOI
14 
Derouet O., Oct., 2012, Integrated circuits including reverse engineering detection using differences in signals, US Patent 8,296,845Google Search
15 
Manich S., Strasser M., Nov., 2013, A Highly Time Sensitive XOR Gate for Probe Attempt Detectors, Circuits and Systems II: Express Briefs, IEEE Transactions on, Vol. 60, No. 11, pp. 786-790DOI
16 
Janke M., Engl K., Jun., 2012, Integrated circuit and method of protecting a circuit part to be protected of an integrated cir-cuit, US Patent 8,195,995Google Search
17 
INVIA , Active shield IP (Digital IP and Analog IP that Detects Invasive Attacks)., http://invia.fr/detectors/active-shield.aspxGoogle Search
18 
Cioranesco J., Danger J., Graba T., Guilley S., Mathieu Y., Naccache D., Ngo X. T., 2014, Cryptographically secure shields, Hardware-Oriented Security Trust, HOST 2014, IEEE International Symposium of, pp. 25-31DOI
19 
Wan M., He Z., Han S., Dai K., Zou X., Aug., 2015, An invasive-attack-resistant PUF based on switched-capacitor circuit, Circuits and Systems I: Regular Papers, IEEE Transactions on, Vol. 62, No. 8, pp. 2024-2034DOI
20 
MPI CORPORATION , MPI T5200-SE (200 mm Manual Probe System with ShielDEnvironment for accurate and reli-able DC/CV, RF and mmW measurements, http://www.mpi-corporation.comGoogle Search