Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
The Hunt For The Kill Switch, IEEE Spectrum, vol.45, issue.5, pp.34-39, 2008. ,
Wavelet aided multivariate outlier analysis to enhance defect contrast in thermal images, vol.7981, 2011. ,
Contactless electromagnetic active attack on ring oscillator based true random number generator, Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012. ,
URL : https://hal.archives-ouvertes.fr/ujm-00699618
Lock-in thermography: A versatile tool for failure analysis of solar cells. Electronic Device Failure Analysis, vol.11, 2009. ,
Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.34, issue.10, pp.1577-1585, 2015. ,
Hardware Trojans -Prevention, Detection, Countermeasures, p.50, 2011. ,
Hardware trojan prevention using layout-level design approach, 2015 European Conference on Circuit Theory and Design (EC-CTD), pp.1-4, 2015. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01234072
New developments in ir lockin thermography ,
A survey on hardware trojan detection techniques, 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.2021-2024, 2015. ,
Uncooled infrared microbolometer arrays and their characterisation techniques, Defence Science Journal, vol.59, p.580, 2009. ,
Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.5, pp.149-175, 2010. ,
Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.1, pp.1-6, 2010. ,
Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.2, pp.7-59, 2010. ,
Lock-in Thermography, Springer Series in Advanced Microelectronics, chapter, vol.10, pp.107-153, 2010. ,
Emmanuelle Dottax, and Hervé Pelletier. Electromagnetic side channels of an fpga implementation of aes, IACR Cryptology ePrint Archive, p.145, 2004. ,
Overview of code division multiple access technology for wireless communications, IECON '98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.98CH36200), vol.1, pp.15-24, 1998. ,
Hardware Trojan: Threats and emerging solutions, IEEE International High Level Design Validation and Test Workshop, pp.166-171, 2009. ,
Performance limitations and measurement analysis of a near-field microwave microscope for nondestructive and subsurface detection, IEEE Transactions on Microwave Theory and Techniques, vol.60, issue.8, pp.2605-2615, 2012. ,
Advanced fault localization techniques in microelectronics failure analysis, 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp.5-9, 2014. ,
, Trust in integrated circuits (tic), pp.10-11, 2007.
Practical Electro-Magnetic Analysis, p.18, 2011. ,
Electromagnetic transient faults injection on a hardware and a software implementations of aes, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15, 2012. ,
URL : https://hal.archives-ouvertes.fr/emse-00742639
The linear coefficient of thermal expansion of silicon at room temperature, Powder Diffraction, vol.6, issue.3, pp.147-152, 1991. ,
Temperature tracking: An innovative run-time approach for hardware Trojan detection, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.532-539, 2013. ,
The thermophysical properties (heat capacity and thermal expansion) of single-crystal silicon. High Temperature, vol.39, pp.413-419, 2001. ,
, Application note: Characteristics and use of infrared detectors, 2011.
, Solid State Division Hamamatsu Photonics. Application note: Thermal detectors, 2011.
Fundamentals of heat and mass transfer, 2002. ,
Fundamentals of heat and mass transfer, 2002. ,
Infrared thermography application to functional and failure analysis of electron devices and circuits. Microelectronics Reliability, vol.52, 2012. ,
Randomization based probabilistic approach to detect trojan circuits, 11th IEEE High Assurance Systems Engineering Symposium, pp.117-124, 2008. ,
Performance limits of uncooled vox microbolometer focal plane arrays, Proceedings of SPIE -The International Society for Optical Engineering, 2004. ,
A thermoreflectance thermography system for measuring the transient surface temperature field of activated electronic devices, Twenty-Second Annual IEEE Semiconductor Thermal Measurement And Management Symposium, pp.199-203, 2006. ,
A thermoreflectance thermography system for measuring the transient surface temperature field of activated electronic devices, Twenty-Second Annual IEEE Semiconductor Thermal Measurement And Management Symposium, pp.199-203, 2006. ,
Optical and Infrared Detectors, 1977. ,
Failure analysis techniques for semiconductors and other devices. info/card 84, RF semiconductors, pp.34-46, 2001. ,
Power analysis attacks on the aes-128 s-box using differential power analysis (dpa) and correlation power analysis (cpa), Journal of Cyber Security Technology, vol.1, issue.2, pp.88-107, 2017. ,
Soc it to em: Electromagnetic side-channel attacks on a complex system-on-chip, Cryptographic Hardware and Embedded Systems -CHES 2015, pp.620-640, 2015. ,
Système embarque de mesure de la tension pour la détection de contrefaçons et de chevaux de Troie matériels, 2016. ,
Electromagnetic activity vs. logical activity: Near field scans for reverse engineering, Smart Card Research and Advanced Applications, pp.140-155, 2019. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01943151
Thermography techniques for integrated circuits and semiconductor devices, Sensor Review, vol.27, issue.4, pp.298-309, 2007. ,
Scanning thermal microscopy, Annual Review of Materials Science, vol.29, pp.505-585, 1999. ,
Thermal imaging by atomic force microscopy using thermocouple cantilever probes, Review of Scientific Instruments, vol.66, pp.3584-3592, 1995. ,
Detection of defects in wind turbine composite blades using statistically enhanced lock-in thermography, Structural Health Monitoring, vol.12, p.2013 ,
Yet Another Fault Injection Technique : by Forward Body Biasing Injection, YACC'2012: Yet Another Conference on Cryptography, 2012. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00762035
Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.33, issue.12, pp.1792-1805, 2014. ,
Method Taking into Account Process Dispersions to Detect Hardware Trojan Horse by Side-Channel, vol.17, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01240241
Improved postsilicon power modeling using AC lock-in techniques, Design Automation Conference (DAC), pp.101-107, 2011. ,
, IEEE, 2011.
,
Near-field mapping system to scan in time domain the magnetic emissions of integrated circuits, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, pp.229-236, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00394395
Analysis and Design of Analog Integrated Circuits, 1993. ,
Local and direct em injection of power into cmos integrated circuits, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.100-104, 2011. ,
Improved Thermal Tracking for Processors Using Hard and Soft Sensor Allocation Techniques, IEEE Transactions on Computers, vol.60, issue.6, pp.841-851, 2011. ,
Thermal and power characterization of real computing devices, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol.1, issue.2, pp.76-87, 2011. ,
Ic failure analysis: Techniques and tools for quality and reliability improvement. Microelectronics Reliability, vol.35, pp.429-453, 1995. ,
Application of lock-in thermography for failure analysis in integrated circuits using quantitative phase shift analysis, MicroTherm2011 -Microtechnology and Thermal Problems in Electronics, vol.177, pp.1261-1267, 2012. ,
Nondestructive defect depth determination at fully packaged and stacked die devices using lock-in thermography, 17th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits, pp.1-5, 2010. ,
Statistical methods iowa state university press, 1967. ,
Jamal Madjdpour, and Nuggehalli Ravindra. Calculation of emissivity of si wafers, Journal of Electronic Materials, vol.28, pp.1385-1389, 1999. ,
Benchmarking of hardware trojans and maliciously affected circuits, Journal of Hardware and Systems Security, vol.1, issue.1, pp.85-102, 2017. ,
Simple photonic emission analysis of aes, Cryptographic Hardware and Embedded Systems -CHES 2012, pp.41-57, 2012. ,
Laser voltage imaging: A new perspective of laser voltage probing, ISTFA, pp.5-13, 2010. ,
Soi thickness uniformity improvement using corrective etching for silicon nano-photonic device, 8th IEEE International Conference on Group IV Photonics, pp.71-73, 2011. ,
Clock gating: A power optimizing technique for VLSI circuits, 2011 Annual IEEE India Conference, pp.1-4, 2011. ,
On design vulnerability analysis and trust benchmarks development, 2013 IEEE 31st International Conference on Computer Design (ICCD), pp.471-474, 2013. ,
Back side thermal imaging of integrated circuits at high spatial resolution, Physics Letters, vol.90, issue.17, p.171112, 2007. ,
Datasheet: J12 series, inas detectors, operating notes, 2000. ,
Backside ir photon emission microscopy (ir-pem) observation in failure analysis of the packaged devices, 8th International Conference on Electronic Packaging Technology, pp.1-4, 2007. ,
The State-of-the-Art in IC Reverse Engineering, pp.363-381, 2009. ,
A survey of hardware trojan taxonomy and detection, IEEE Design Test of Computers, vol.27, issue.1, pp.10-25, 2010. ,
No place to hide: Contactless probing of secret data on fpgas, vol.9813, 2016. ,
, October, 2018.
Ic failure analysis: The importance of test and diagnostics, IEEE Des. Test, vol.14, issue.3, pp.76-82, 1997. ,
Breaking mobile firmware encryption through near-field side-channel analysis, 2019 attacks and solutions in hardware security (ASHES), 2019. ,
Practical optical fault injection on secure microcontrollers, 2011 BIBLIOGRAPHY Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.91-99 ,
, IEEE, 2011.
The Generalization of Student's Problem When Several Different Population Variance Are Involved, Biometrika, vol.34, issue.1-2, p.1947 ,
Detecting malicious inclusions in secure hardware: Challenges and solutions, IEEE International Workshop on Hardware-Oriented Security and Trust, pp.15-19, 2008. ,
Adaptive power blurring techniques to calculate ic temperature profile under large temperature variations, vol.03, 2019. ,