Journal: IEEE Design & Test of Computers

Volume 27, Issue 1

8 -- 9Mohammad Tehranipoor, Farinaz Koushanfar. Guest Editors Introduction: Confronting the Hardware Trustworthiness Problem
10 -- 25Mohammad Tehranipoor, Farinaz Koushanfar. A Survey of Hardware Trojan Taxonomy and Detection
26 -- 35Yier Jin, Yiorgos Makris. Hardware Trojans in Wireless Cryptographic ICs
36 -- 47Kurt Rosenfeld, Ramesh Karri. Attacks and Defenses for JTAG
48 -- 65Meng-Day (Mandel) Yu, Srinivas Devadas. Secure and Robust Error Correction for Physical Unclonable Functions
66 -- 75Alex Baumgarten, Akhilesh Tyagi, Joseph Zambreno. Preventing IC Piracy Using Reconfigurable Logic Barriers
76 -- 85Lingkan Gong, Jingfen Lu. Verification-Purpose Operating System for Microprocessor System-Level Functions
93 -- 95Igor L. Markov. Master numerical tasks with ease
96 -- 98Miodrag Potkonjak. Variability: For headache and profit