• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 6,005
Next 10 →

Petrify: a tool for manipulating concurrent specifications and . . .

by Jordi Cortadella, et al.
"... Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original descripti ..."
Abstract - Cited by 219 (34 self) - Add to MetaCart
Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original

TROJAN ASTEROIDS

by unknown authors
"... Recent studies suggest significant benefits from using 1st and 2nd generation Radioisotope Power Systems (RPS) as a power source for electric propulsion (EP) missions to the outer planets. This study focuses on trajectories to the Trojan asteroids. A high level analysis is performed with chemical tr ..."
Abstract - Add to MetaCart
Recent studies suggest significant benefits from using 1st and 2nd generation Radioisotope Power Systems (RPS) as a power source for electric propulsion (EP) missions to the outer planets. This study focuses on trajectories to the Trojan asteroids. A high level analysis is performed with chemical

Effective bandwidths at multi-class queues

by F. P. Kelly - Queueing Systems , 1991
"... Consider a queue which serves traffic from a number of distinct sources and which is required to deliver a performance guarantee, expressed in terms of the mean delay or the probability the delay exceeds a threshold. For various simple models we show that an effective bandwidth can be associated wit ..."
Abstract - Cited by 203 (4 self) - Add to MetaCart
Consider a queue which serves traffic from a number of distinct sources and which is required to deliver a performance guarantee, expressed in terms of the mean delay or the probability the delay exceeds a threshold. For various simple models we show that an effective bandwidth can be associated

Generic Global Placement and Floorplanning

by Hans Eisenmann, Frank M. Johannes , 1998
"... We present a new force directed method for global placement. Besides the well-known wire length dependent forces we use additional forces to reduce cell overlaps and to consider the placement area. Compared to existing approaches, the main advantage is that the algorithm provides increased flexibili ..."
Abstract - Cited by 203 (5 self) - Add to MetaCart
We present a new force directed method for global placement. Besides the well-known wire length dependent forces we use additional forces to reduce cell overlaps and to consider the placement area. Compared to existing approaches, the main advantage is that the algorithm provides increased

Designing and implementing malicious hardware

by Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
"... Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and stra ..."
Abstract - Cited by 58 (6 self) - Add to MetaCart
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself

Extraction of intrinsic structure for Hardware Trojan detection

by Maxime Lecomte, Jacques J. A. Fournier , 2015
"... In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid...) of the integr ..."
Abstract - Add to MetaCart
...) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modify and the extracted structure will be affected. After developing the extraction techniques we present a method-ology to insert detection of hardware trojan and counterfeit in different IC manufacturing steps

On Hardware Trojan Design and Implementation at Register-Transfer Level

by Jie Zhang, Qiang Xu
"... Abstract—There have been a number of hardware Trojan (HT) designs at register-transfer level (RTL) in the literature, which mainly describe their malicious behaviors and trigger mechanisms. Generally speaking, the stealthiness of the HTs is shown with extremely low sensitization probability of the t ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract—There have been a number of hardware Trojan (HT) designs at register-transfer level (RTL) in the literature, which mainly describe their malicious behaviors and trigger mechanisms. Generally speaking, the stealthiness of the HTs is shown with extremely low sensitization probability

On the Synthesis of Strategies in Infinite Games

by Wolfgang Thomas , 1995
"... . Infinite two-person games are a natural framework for the study of reactive nonterminating programs. The effective construction of winning strategies in such games is an approach to the synthesis of reactive programs. We describe the automata theoretic setting of infinite games (given by "gam ..."
Abstract - Cited by 192 (7 self) - Add to MetaCart
switching circuits. These circuits were considered as transforming infinite input sequences into output sequences, and systems of restricted arithmetic served as specification formalisms ([Ch63]). With Buchi's decision procedure for the monadic second-order theory S1S of one successor ([Bu62

Hardware Trojan detection using path delay fingerprint.

by Yier Jin , Yiorgos Makris - In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), , 2008
"... Abstract-Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan detection method to complement traditional testing methods, a new behavior-oriented category method is proposed t ..."
Abstract - Cited by 66 (4 self) - Add to MetaCart
aspect of the total characteristics of a genuine design. Chips are validated by comparing their delay parameters to the fingerprints. The comparison of path delays makes small Trojan circuits significant from a delay point of view. The experiment's results show that the detection rate on explicit

Randomization based probabilistic approach to detect Trojan circuits

by Susmit Jha , Sumit Kumar , Jha - in Proc. IEEE High Assurance Syst. Eng. Symp
"... Abstract-In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be inserted into the design or fabrication mask by a malicious manufacturer such that it monitors for a specific ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Abstract-In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be inserted into the design or fabrication mask by a malicious manufacturer such that it monitors for a
Next 10 →
Results 11 - 20 of 6,005
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University