The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 01 - January/February (vol. 27)
ISSN: 0740-7475

Table of Contents (PDF)

pp. 2-3

Secure and Robust Error Correction for Physical Unclonable Functions (Abstract)

Meng-Day Yu , Verayo, San Jose, CA, USA
S. Devadas , Massachusetts Inst. of Technol., Cambridge, MA, USA
pp. 48-65
Call for Papers

Call for Papers (HTML)

pp. 1
From the EIC
Verifying Physical Trustworthiness of ICs and Systems

A Survey of Hardware Trojan Taxonomy and Detection (Abstract)

Farinaz Koushanfar , Rice University
Mohammad Tehranipoor , University of Connecticut
pp. 10-25

Hardware Trojans in Wireless Cryptographic ICs (Abstract)

Yier Jin , Yale University
Yiorgos Makris , Yale University
pp. 26-35

Attacks and Defenses for JTAG (Abstract)

Ramesh Karri , Polytechnic Institute of New York University
Kurt Rosenfeld , Polytechnic Institute of New York University
pp. 36-47

Preventing IC Piracy Using Reconfigurable Logic Barriers (Abstract)

Akhilesh Tyagi , Iowa State University
Joseph Zambreno , Iowa State University
Alex Baumgarten , Microsoft
pp. 66-75
Feature Article

Verification-Purpose Operating System for Microprocessor System-Level Functions (Abstract)

Lingkan Gong , East China Institute of Computer Technology
Jingfen Lu , East China Institute of Computer Technology
pp. 76-85
CEDA Currents

CEDA Currents (HTML)

pp. 86-87
DATC Newsletter
TTTC Newsletter
Conference Reports

Conference Reports (HTML)

pp. 92
Book Reviews

Master numerical tasks with ease (HTML)

Igor Markov , University of Michigan
pp. 93-95
The Last Byte

Variability: For headache and profit (Abstract)

Miodrag Potkonjak , University of California, Los Angeles
pp. 96-98
112 ms
(Ver )