|
[1] , International Technology Roadmap for Semiconductor, 2013. [2] M. Tehranipoor et al., “Trustworthy hardware: Trojan detection and design-for-trust challeng-es,” IEEE Computer, vol. 44, no. 7, pp. 66-74, July 2011 [3] M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detec-tion,” IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, Jan.-Feb. 2010. [4] R. Karri et al., “Trustworthy hardware: identi-fying and classifying hardware Trojans,” IEEE Computer, vol. 43, no. 10, pp. 39-46, Oct. 2010 [5] Black, James R. "Electromigration—A brief survey and some recent results." IEEE Transactions on Electron Devices 16.4 (1969): 338-347. [6] Black, James R. "Electromigration failure modes in aluminum metallization for semi-conductor devices." Proceedings of the IEEE 57.9 (1969): 1587-1594. [7] A. Sreedhar, S. Kundu, I. Koren, “On Reliability Trojan Injection and Detection,” Jour-nal of Low Power Electronics Vol. 8, 1–10, 2012. [8] Shiyanovskii, Yuriy, et al. "Process reliability based trojans through NBTI and HCI effects." Adaptive Hardware and Systems (AHS), 2010 NASA/ESA Conference on. IEEE, 2010 [9] N. Karimi et al., “MAGIC: Malicious Aging in Circuits/Cores,” ACM Transactions on Archi-tecture and Code Optimization (TACO): Vol-ume 12 Issue 1, April 2015. [10] K. Yang, M. Hicks et al., “A2: Analog Malicious Hardware,” 2016 IEEE Symposium on Security and Privacy. [11] Li, Di-An, and Malgorzata Marek-Sadowska. "Variation-aware Electromigration analysis of power/ground networks." Proceedings of the International Conference on Comput-er-Aided Design. IEEE Press, 2011. [12] Ho, Chung-Wen, A. Ruehli, and Pierce Brennan. "The modified nodal approach to network analysis." IEEE Transactions on circuits and systems 22.6 (1975): 504-509. [13] Qian, Haifeng, Sani R. Nassif, and Sachin S. Sapatnekar. "Power grid analysis using random walks." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24.8 (2005): 1204-1224. [14] Zhao, Min, et al. "Hierarchical analysis of power distribution networks." IEEE Transac-tions on Computer-Aided Design of Integrated Circuits and Systems 21.2 (2002): 159-168. [15] Kozhaya, Joseph N., Sani R. Nassif, and Farid N. Najm. "A multigrid-like technique for power grid analysis." IEEE Transactions on Computer-Aided Design of Integrated Cir-cuits and Systems 21.10 (2002): 1148-1160. [16] Tarjan, Robert. "Depth-first search and linear graph algorithms." SIAM journal on com-puting 1.2 (1972): 146-160. [17] Mack, Chris A. Field guide to optical lithography. Vol. 6. Bellingham, Washington, USA: SPIE Press, 2006. [18] ngSpice, http://ngspice.sourceforge.net/
|