Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations

Daniel Y. Deng, Andrew H. Chan, G. Edward Suh. Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations. In Ahmad-Reza Sadeghi, David Naccache, editors, Towards Hardware-Intrinsic Security - Foundations and Practice. Information Security and Cryptography, pages 309-329, Springer, 2010. [doi]

Abstract

Abstract is missing.