ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
11
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,380
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs
proceedings-article
Author(s):
Mohammad Tehranipoor
,
Domenic Forte
Publication date
(Print):
January 2014
Publisher:
IEEE
Conference name:
2014 27th International Conference on VLSI Design
Conference date:
February 5, 2014 - February 9, 2014
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
DrugRxiv
Author and article information
Conference
Publisher:
IEEE
Publication date:
January 2014
Publication date (Print):
January 2014
Pages
: 9-10
Article
DOI:
10.1109/VLSID.2014.119
SO-VID:
f39a589d-a19f-44fb-a424-31fbdbe99136
Copyright ©
© 2014
Conference name:
2014 27th International Conference on VLSI Design
Conference location:
India
Conference date:
February 5, 2014 - February 9, 2014
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,380
Survey on recent counterfeit IC detection techniques and future research directions
Authors:
Enahoro Oriero
,
Syed Hasan
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage
Authors:
Peter Samarin
,
Kerstin Lemke-Rust
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification
Authors:
Maxime Lecomte
,
Jacques Fournier
,
Philippe Maurine
See all similar
Cited by
1
Guided Electromagnetic Wave Technique for IC Authentication
Authors:
Mosabbah Mushir Ahmed
,
Etienne Perret
,
David Hely
…
See all cited by