1
TITLE: IC Protection Against JTAG-Based Attacks  Full Text
AUTHORS: Xuanle L Ren; Francisco Pimentel Torres; Blanton, RD; Vitor Grade Tavares ;
PUBLISHED: 2019, SOURCE: IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOLUME: 38, ISSUE: 1
INDEXED IN: Scopus WOS CrossRef: 4
2
TITLE: Detection of IJTAG Attacks Using LDPC-based Feature Reduction and Machine Learning
AUTHORS: Xuanle L Ren; (Shawn) D S Blanton; Vitor Grade Tavares ;
PUBLISHED: 2018, SOURCE: 23rd IEEE European Test Symposium (ETS) in 2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), VOLUME: 2018-May
INDEXED IN: Scopus WOS CrossRef
3
TITLE: Detection of Illegitimate Access to JTAG via Statistical Learning in Chip
AUTHORS: Xuanle L Ren; Vitor Grade Tavares ; (Shawn) D Blanton;
PUBLISHED: 2015, SOURCE: Conference on Design Automation Test in Europe (DATE) in 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), VOLUME: 2015-April
INDEXED IN: Scopus WOS