@article{10.1109/MDAT.2013.2264560,
author = {},
title = {[Masthead]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {1},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264560},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264561,
author = {},
title = {Table of contents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {2},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264561},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264961,
author = {},
title = {Table of contents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {3},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264961},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2258103,
author = {},
title = {A look at trusted SoC with untrusted components},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {4},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258103},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2258093,
author = {Swarup Bhunia, and Dakshi Agrawal, and Leyla Nazhandali, and undefined, and undefined, and undefined, and undefined, },
title = {Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {5-7},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258093},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2013.2247458,
author = {},
title = {Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {8-16},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2013.2247458},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2013.2247459,
author = {},
title = {HELP: A Hardware-Embedded Delay PUF},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {17-25},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2013.2247459},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2249555,
author = {},
title = {A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {26-34},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249555},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2249554,
author = {},
title = {Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {35-44},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249554},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2013.2247460,
author = {},
title = {Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {45-54},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2013.2247460},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2013.2247457,
author = {},
title = {Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {55-62},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2013.2247457},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2260891,
author = {},
title = {Call for Tutorial and Survey Articles},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {63-64},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2260891},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265007,
author = {},
title = {IEEE Semantic Technology},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {65},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265007},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2012.2200029,
author = {},
title = {Creating Structural Patterns for At-Speed Testing: A Case Study},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {66-76},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2012.2200029},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2012.2194471,
author = {},
title = {Fast-Yet-Accurate Statistical Soft-Error-Rate Analysis Considering Full-Spectrum Charge Collection},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {77-86},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2012.2194471},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2012.2232964,
author = {},
title = {Diverse Double Modular Redundancy: A New Direction for Soft-Error Detection and Correction},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {87-95},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2012.2232964},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265008,
author = {},
title = {IEEE Phaser Data},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {96},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265008},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2257420,
author = {},
title = {CEDA Currents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {97-98},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2257420},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265009,
author = {},
title = {Discover more. IEEE Educational Activities},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {99},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265009},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2251967,
author = {},
title = {Test Technology TC Newsletter},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {100-101},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2251967},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265010,
author = {},
title = {IEEE Was Here},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {102},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265010},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2259096,
author = {},
title = {Let's stop trusting software with our sensitive data},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {103-104},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2259096},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDT.2012.2232964,
author = {P. Reviriego, and C. J. Bleakley, and J. A. Maestro, },
title = {Diverse Double Modular Redundancy: A New Direction for Soft-Error Detection and Correction},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {87-95},
doi = {doi.ieeecomputersociety.org/10.1109/MDT.2012.2232964},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264961,
author = {},
title = {Table of contents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {3},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264961},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264559,
author = {},
title = {Technology insight on demand on IEEE.tv [advertisement]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {C4},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264559},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2258093,
author = {Swarup Bhunia, and Dakshi Agrawal, and Leyla Nazhandali, },
title = {Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {5-7},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258093},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265010,
author = {},
title = {IEEE Was Here},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {102},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265010},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2249555,
author = {Kan Xiao, and Xuehui Zhang, and Mohammad Tehranipoor, },
title = {A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {26-34},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249555},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2249554,
author = {J. Rajendran, and A. K. Kanuparthi, and M. Zahran, and S. K. Addepalli, and G. Ormazabal, and R. Karri, },
title = {Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {35-44},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249554},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2251967,
author = {Theo Theocharides, },
title = {Test Technology TC Newsletter},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {100-101},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2251967},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264560,
author = {},
title = {[Masthead]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {1},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264560},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264561,
author = {},
title = {Table of contents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {2},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264561},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265009,
author = {},
title = {Discover more. IEEE Educational Activities},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {99},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265009},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264558,
author = {},
title = {IEEE Xplore Digital Library},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {C3},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264558},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265008,
author = {},
title = {IEEE Phaser Data},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {96},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265008},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2265007,
author = {},
title = {IEEE Semantic Technology},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {65},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265007},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2260891,
author = {},
title = {Call for Tutorial and Survey Articles},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {63-64},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2260891},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2258103,
author = {Andre Ivanov, },
title = {A Look at Trusted SoC With Untrusted Components},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {4},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258103},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264557,
author = {},
title = {While the world benefi ts from what's new, ieee can focus you on what's next [advertisement]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {C2},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264557},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264556,
author = {},
title = {[Front cover]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {C1},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264556},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2257420,
author = {},
title = {CEDA Currents},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {97-98},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2257420},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2259096,
author = {C. Fletcher, and M. van Dijk, and S. Devadas, },
title = {Let's stop trusting software with our sensitive data},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {},
issn = {0740-7475},
year = {2013},
pages = {103-104},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2259096},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264556,
author = {},
title = {[Front cover]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {C1},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264556},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264557,
author = {},
title = {While the world benefi ts from what's new, ieee can focus you on what's next [advertisement]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {C2},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264557},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264558,
author = {},
title = {IEEE Xplore Digital Library},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {C3},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264558},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MDAT.2013.2264559,
author = {},
title = {Technology insight on demand on IEEE.tv [advertisement]},
journal = {IEEE Design & Test of Computers},
volume = {30},
number = {2},
issn = {0740-7475},
year = {2013},
pages = {C4},
doi = {doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264559},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}