Daniel Y. Deng, Andrew H. Chan, G. Edward Suh. Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations. In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 309-329, Springer, 2010. [doi]
Abstract is missing.