The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (vol. 27)
ISSN: 0740-7475

Table of Contents (PDF)

pp. 2-3

Secure and robust error correction for physical unclonable functions (Abstract)

Meng-Day Yu , Verayo
Srinivas Devadas , Massachusetts Institute of Technology
pp. 48-65
Call for Papers

Call for Papers (HTML)

pp. 1
From the EIC
Verifying Physical Trustworthiness of ICs and Systems

A Survey of Hardware Trojan Taxonomy and Detection (Abstract)

Mohammad Tehranipoor , University of Connecticut
Farinaz Koushanfar , Rice University
pp. 10-25

Hardware Trojans in Wireless Cryptographic ICs (Abstract)

Yier Jin , Yale University
Yiorgos Makris , Yale University
pp. 26-35

Attacks and Defenses for JTAG (Abstract)

Kurt Rosenfeld , Polytechnic Institute of New York University
Ramesh Karri , Polytechnic Institute of New York University
pp. 36-47

Preventing IC Piracy Using Reconfigurable Logic Barriers (Abstract)

Alex Baumgarten , Microsoft
Akhilesh Tyagi , Iowa State University
Joseph Zambreno , Iowa State University
pp. 66-75
Feature Article

Verification-Purpose Operating System for Microprocessor System-Level Functions (Abstract)

Lingkan Gong , East China Institute of Computer Technology
Jingfen Lu , East China Institute of Computer Technology
pp. 76-85
CEDA Currents

CEDA Currents (HTML)

pp. 86-87
DATC Newsletter
TTTC Newsletter
Conference Reports

Conference Reports (HTML)

pp. 92
Book Reviews

Master numerical tasks with ease (HTML)

Igor Markov , University of Michigan
pp. 93-95
The Last Byte

Variability: For headache and profit (Abstract)

Miodrag Potkonjak , University of California, Los Angeles
pp. 96-98
80 ms
(Ver 3.3 (11022016))