Journal: Proceedings of the IEEE

Volume 102, Issue 8

1118 -- 1122William F. Pickard. Energy return on energy invested (eroi): a quintessential but possibly inadequate metric for sustainability in a solar-powered world? [point of view]
1123 -- 1125Ramesh Karri, Farinaz Koushanfar. Trustworthy Hardware [Scanning the Issue]
1126 -- 1141Charles Herder, Meng-Day (Mandel) Yu, Farinaz Koushanfar, Srinivas Devadas. Physical Unclonable Functions and Applications: A Tutorial
1142 -- 1156Miodrag Potkonjak, Vishwa Goudar. Public Physical Unclonable Functions
1157 -- 1173Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Christof Paar. Microcontrollers as (In)Security Devices for Pervasive Computing Applications
1174 -- 1188Meng Zhang, Anand Raghunathan, Niraj K. Jha. Trustworthiness of Medical Devices and Body Area Networks
1189 -- 1206N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos V. Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann. Mobile Trusted Computing
1207 -- 1228Ujjwal Guin, Ke Huang, Daniel DiMase, John M. Carulli, Mohammad Tehranipoor, Yiorgos Makris. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
1229 -- 1247Swarup Bhunia, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan. Hardware Trojan Attacks: Threat Analysis and Countermeasures
1248 -- 1265Stephen Trimberger, Jason Moore. FPGA Security: Motivations, Features, and Applications
1266 -- 1282Jeyavijayan Rajendran, Ozgur Sinanoglu, Ramesh Karri. Regaining Trust in VLSI Design: Design-for-Trust Techniques
1283 -- 1295Masoud Rostami, Farinaz Koushanfar, Ramesh Karri. A Primer on Hardware Security: Models, Methods, and Metrics
1296 -- 1303Burton Grad. STARS: Software Industry [Scanning Our Past]