International Symposium on Quality Electronic Design (ISQED) 2013
DOI: 10.1109/isqed.2013.6523662
|View full text |Cite
|
Sign up to set email alerts
|

Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…For instance, Boher et al proposed modifying the current IC design process, as shown in Fig. 22 (a), and exposing all existing vulnerabilities during the AMS-IP design process to identify potential security risks [123], as shown in Fig. 22 (b).…”
Section: ) Chip Verification Layermentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, Boher et al proposed modifying the current IC design process, as shown in Fig. 22 (a), and exposing all existing vulnerabilities during the AMS-IP design process to identify potential security risks [123], as shown in Fig. 22 (b).…”
Section: ) Chip Verification Layermentioning
confidence: 99%
“…Block diagram of IC design flow. (a) Current IC design flow without vulnerabilities analysis[123]. (b) AMS-IP based design flow with vulnerabilities analysis[123].…”
mentioning
confidence: 99%
See 1 more Smart Citation