RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 1
TI [Masthead]
AB Provides a listing of current staff, committee members and society officers.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264560
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264560

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 2
TI Table of contents
AB Presents the table of contents for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264561
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264561

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 3
TI Table of contents
AB Presents the table of contents for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264961
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264961

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 4
TI A look at trusted SoC with untrusted components
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2258103
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258103

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 5
TI Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components
A1 Swarup Bhunia,
A1 Dakshi Agrawal,
A1 Leyla Nazhandali,
A1 undefined,
A1 undefined,
A1 undefined,
A1 undefined, K1 Special issues and sections
K1 System-level design
K1 Network security
K1 Hardware
K1 Trojan horses
K1 Circuit layout
K1 Intellectual property
K1 Software protection

AB The articles in this special section focus on design of trusted systems-on-chip components and applications for their use.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2258093
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258093

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 8
TI Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property
K1 Trojan horses
K1 Encryption
K1 Subspace constraints
K1 Microcontrollers
K1 Algorithm design and analysis
K1 Intellectual property
K1 Network security
AB The security of computing systems relies on trust in hardware. This trust can no longer be assumed due to vulnerabilities in hardware designs. Security methodologies have been proposed for mitigating these threats, offering a variety of security guarantees and wide variance in terms of design-time and runtime costs. From an engineering standpoint it is not clear which of the plethora of solutions should be applied or how they should be implemented. We develop an engineering process for the practical and lightweight inclusion of untrusted third-party hardware design components. We find that by combining previously proposed techniques, we are able to build a microcontroller that uses each design module as if it were untrusted third-party intellectual property. Our experience supports the surprising claim that implementing a chip with untrusted components is not significantly more difficult than implementing a regular one.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2013.2247458
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2013.2247458

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 17
TI HELP: A Hardware-Embedded Delay PUF
K1 Hardware
K1 Authentication
K1 Field programmable gate arrays
K1 IP networks
K1 Cryptography
K1 Embedded systems
K1 Network security
K1 Delays
K1 Path delay measurement
K1 Hardware security
K1 Unique identifier
K1 Process variations
K1 Physical unclonable function
AB Physical Unclonable Functions enable a secure alternative method to traditional key storage and authentication schemes. This paper presents a novel PUF design that utilizes the existing path delays of a design to generate a random and stable bitstring of desired length with minimal area and performance overhead.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2013.2247459
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2013.2247459

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 26
TI A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay
K1 Trojan horses
K1 Computer security
K1 Delays
K1 Payloads
K1 Logic gates
K1 Integrated circuits
K1 Synchronization
K1 Circuit layout
K1 outlier analysis
K1 Hardware Trojan
K1 delay-based detection
K1 clock sweeping
K1 process variation
K1 multidimensional scaling
AB Clock sweeping can be used to generate signatures for the purpose of detecting hardware Trojans. With the help of simulations and FPGA results, this article demonstrates the effectiveness of their proposed clock-sweeping technique under process variations, even for Trojans as small as a few gates.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2249555
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249555

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 35
TI Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach
K1 Trojan horses
K1 Program processors
K1 Logic gates
K1 Encryption
K1 Computer security
K1 Hardware
K1 Computer architecture
K1 Hardware security
K1 Hardware-based insider attacks
K1 Logic encryption
K1 Circuit micro-architecture co-design
AB Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in preventing or detecting Trojan attacks.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2249554
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249554

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 45
TI Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream
K1 Trojan horses
K1 Field programmable gate arrays
K1 Hardware
K1 Design automation
K1 Integrated circuits
K1 Oscillators
K1 Computer architecture
K1 Ring-oscillator Trojan
K1 Configuration bitstream
K1 CRC
K1 FPGA
K1 Hardware Trojan
AB In this work, we have demonstrated the feasibility of hardware Trojan insertion in circuits mapped on FPGAs by direct modification of the FPGA configuration bitstream. The main challenge of this attack proved to be the lack of sufficient information in the public domain about the bitstream format and the internal architecture and configurability of the FPGA. Nevertheless, we were able to show that under certain constraints on the functionality, size and placement of the Trojan on the FPGA, it is possible to modify the configuration bitstream by a software program to insert a hardware Trojan in the design. The main strength of the attack lies in the fact that since the modification is at the configuration bitstream level, it bypasses all predeployment design validation mechanisms. We also propose some techniques to prevent the demonstrated attack. We hope that this work will raise awareness among FPGA users about the potency of the threat posed by this relatively simple attack and its improved variants. .
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2013.2247460
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2013.2247460

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 55
TI Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip
K1 Logic gates
K1 System-on-a-chip
K1 Hardware
K1 Timing
K1 Trojan horses
K1 Hardware design languages
AB Editor's notes: Integration of untrusted third-party IPs into an SoC design is a major challenge in establishing trustworthiness of the entire SoC. This article presents an approach to ensure information flow isolation between trusted and untrusted IP cores.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2013.2247457
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2013.2247457

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 63
TI Call for Tutorial and Survey Articles
AB Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2260891
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2260891

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 65
TI IEEE Semantic Technology
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265007
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265007

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 66
TI Creating Structural Patterns for At-Speed Testing: A Case StudyK1 Delays
K1 Frequency measurement
K1 Switches
K1 Testing
K1 Histograms
K1 Manufacturing processes

AB Speed binning (or testing for functional frequency) often requires at-speed testing with functional patterns. Using structural patterns instead is an interesting alternative with respect to cost and overall coverage of nodes. This study analyzes the efficiency of structural test patterns when testing for frequency. Experiments with both path delay and transition delay patterns are discussed for multiple devices. The author shows how the tests are designed and what elements are taken into account to determine the best type of structural patterns.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2012.2200029
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2012.2200029

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 77
TI Fast-Yet-Accurate Statistical Soft-Error-Rate Analysis Considering Full-Spectrum Charge Collection
K1 Transient analysis
K1 Logic gates
K1 Circuit faults
K1 Computational modeling
K1 Support vector machines
K1 Integrated circuit modeling
K1 Error analylsis
K1 Monte Carlo methods
K1 Monte Carlo
K1 soft error
K1 process variation
K1 SVM
AB Soft errors are a growing concern in highly scaled CMOS technologies; estimating error rates for a given design remains very challenging. This article presents a fast statistical soft-error-rate analysis approach that is nearly as accurate as computationally complex Monte Carlo SPICE simulation.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2012.2194471
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2012.2194471

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 87
TI Diverse Double Modular Redundancy: A New Direction for Soft-Error Detection and Correction
K1 Finite impulse response filter
K1 Redundancy
K1 Digital signal processing
K1 Error correction
K1 Integrated circuit reliability
K1 Tunneling magnetoresistance
K1 Error analylsis
K1 Software reliability
K1 Reliability
K1 Soft error
K1 Modular redundancy
K1 Error correction
AB By introducing diversity between original and redundant modules, diverse double modular redundancy is a promising solution to mitigate the impact of soft errors.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2012.2232964
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2012.2232964

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 96
TI IEEE Phaser Data
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265008
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265008

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 97
TI CEDA Currents
AB Provides several short items that may include news, reviews or technical notes that should be of interest to practitioners and researchers.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2257420
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2257420

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 99
TI Discover more. IEEE Educational Activities
AB Advertisement: IEEE offers a wealth of learning resources to working technology professionals, professors, teachers and students.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265009
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265009

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 100
TI Test Technology TC Newsletter
AB Presents letters sent to the editor regarding previous articles from this publication or other relevant topics of discussion.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2251967
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2251967

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 102
TI IEEE Was Here
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265010
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265010

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP 103
TI Let's stop trusting software with our sensitive dataK1 Cryptography
K1 Software development
K1 Hardware
K1 Internet
K1 Encryption

AB The paper states that people are trusting the cloud more and more to perform sensitive operations. Demanding more trust in software systems is a recipe for disaster. Suppose the people only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. These properties will correspond to cryptographic operations being implemented correctly in the hardware and adding a modicum of physical security. The beauty of hardware is that its functionality is fixed. If we design our systems to only depend on hardware properties, then we need not worry about software changes or patches introducing new security holes-inevitable in current systems. How can it ensure privacy of data despite the practically infinite number of malicious programs out there? The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2259096
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2259096

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 87
TI Diverse Double Modular Redundancy: A New Direction for Soft-Error Detection and Correction
A1 P. Reviriego,
A1 C. J. Bleakley,
A1 J. A. Maestro,
K1 radiation hardening (electronics)
K1 integrated circuit design
K1 soft-error correction
K1 diverse double modular redundancy
K1 soft-error detection
K1 Finite impulse response filter
K1 Redundancy
K1 Digital signal processing
K1 Error correction
K1 Integrated circuit reliability
K1 Tunneling magnetoresistance
K1 Error analylsis
K1 Software reliability
K1 Reliability
K1 Soft error
K1 Modular redundancy
K1 Error correction
AB By introducing diversity between original and redundant modules, diverse double modular redundancy is a promising solution to mitigate the impact of soft errors.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDT.2012.2232964
LK http://doi.ieeecomputersociety.org/10.1109/MDT.2012.2232964

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 3
TI Table of contents
K1
AB Presents the table of contents for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264961
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264961

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP C4
TI Technology insight on demand on IEEE.tv [advertisement]
K1
AB Advertisement: Internet television gets a mobile makeover. A mobile version of IEEE.tv is now available for convenient viewing. Plus a new app for IEEE.tv can also be found in your app store.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264559
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264559

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 5
TI Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components
A1 Swarup Bhunia,
A1 Dakshi Agrawal,
A1 Leyla Nazhandali,
K1 Special issues and sections
K1 System-level design
K1 Network security
K1 Hardware
K1 Trojan horses
K1 Circuit layout
K1 Intellectual property
K1 Software protection
AB The articles in this special section focus on design of trusted systems-on-chip components and applications for their use.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2258093
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258093

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 102
TI IEEE Was Here
K1
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265010
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265010

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 26
TI A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay
A1 Kan Xiao,
A1 Xuehui Zhang,
A1 Mohammad Tehranipoor,
K1 invasive software
K1 clocks
K1 delay circuits
K1 digital signatures
K1 field programmable gate arrays
K1 process variation
K1 circuit delay
K1 signature
K1 hardware Trojan detection
K1 FPGA
K1 clock-sweeping technique
K1 Trojan horses
K1 Computer security
K1 Delays
K1 Payloads
K1 Logic gates
K1 Integrated circuits
K1 Synchronization
K1 Circuit layout
K1 outlier analysis
K1 Hardware Trojan
K1 delay-based detection
K1 clock sweeping
K1 process variation
K1 multidimensional scaling
AB Clock sweeping can be used to generate signatures for the purpose of detecting hardware Trojans. With the help of simulations and FPGA results, this article demonstrates the effectiveness of their proposed clock-sweeping technique under process variations, even for Trojans as small as a few gates.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2249555
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249555

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 35
TI Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach
A1 J. Rajendran,
A1 A. K. Kanuparthi,
A1 M. Zahran,
A1 S. K. Addepalli,
A1 G. Ormazabal,
A1 R. Karri,
K1 system-on-chip
K1 network synthesis
K1 security
K1 Trojan attack detection
K1 processor
K1 insider attack
K1 circuit microarchitecture codesign approach
K1 modification
K1 SoC design flow
K1 rogue functionality
K1 fabrication
K1 circuit architecture level design
K1 Trojan horses
K1 Program processors
K1 Logic gates
K1 Encryption
K1 Computer security
K1 Hardware
K1 Computer architecture
K1 Hardware security
K1 Hardware-based insider attacks
K1 Logic encryption
K1 Circuit micro-architecture co-design
AB Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in preventing or detecting Trojan attacks.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2249554
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2249554

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 100
TI Test Technology TC Newsletter
A1 Theo Theocharides,
K1
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2251967
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2251967

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 1
TI [Masthead]
K1
AB Provides a listing of current staff, committee members and society officers.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264560
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264560

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 2
TI Table of contents
K1
AB Presents the table of contents for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264561
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264561

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 99
TI Discover more. IEEE Educational Activities
K1
AB Advertisement: IEEE offers a wealth of learning resources to working technology professionals, professors, teachers and students.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265009
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265009

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP C3
TI IEEE Xplore Digital Library
K1
AB Advertisement: IEEE Xplore digital library. Driving research at the world's leading universities and institutions.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264558
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264558

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 96
TI IEEE Phaser Data
K1
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265008
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265008

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 65
TI IEEE Semantic Technology
K1
AB Advertisement.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2265007
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2265007

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 63
TI Call for Tutorial and Survey Articles
K1
AB Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2260891
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2260891

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 4
TI A Look at Trusted SoC With Untrusted Components
A1 Andre Ivanov,
K1
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2258103
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2258103

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP C2
TI While the world benefi ts from what's new, ieee can focus you on what's next [advertisement]
K1
AB Advertisement: IEEE Xplore digital library. Driving research at the world's leading universities and institutions.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264557
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264557

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP C1
TI [Front cover]
K1
AB Presents the front cover for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264556
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264556

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 97
TI CEDA Currents
K1
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2257420
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2257420

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS
SP 103
TI Let's stop trusting software with our sensitive data
A1 C. Fletcher,
A1 M. van Dijk,
A1 S. Devadas,
K1 security of data
K1 cloud computing
K1 cryptography
K1 Ascend processor
K1 data security
K1 sensitive data
K1 cloud computing
K1 software system
K1 security property
K1 cryptographic operation
K1 malicious program
K1 data privacy
K1 Cryptography
K1 Software development
K1 Hardware
K1 Internet
K1 Encryption
AB The paper states that people are trusting the cloud more and more to perform sensitive operations. Demanding more trust in software systems is a recipe for disaster. Suppose the people only trust hardware manufacturers and cryptographers, and not system software developers, application programmers, or other software vendors. It will be the hardware manufacturer's job to produce a piece of hardware that provides some security properties. These properties will correspond to cryptographic operations being implemented correctly in the hardware and adding a modicum of physical security. The beauty of hardware is that its functionality is fixed. If we design our systems to only depend on hardware properties, then we need not worry about software changes or patches introducing new security holes-inevitable in current systems. How can it ensure privacy of data despite the practically infinite number of malicious programs out there? The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2259096
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2259096

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP C1
TI [Front cover]
AB Presents the front cover for this issue of the magazine.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264556
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264556

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP C2
TI While the world benefi ts from what's new, ieee can focus you on what's next [advertisement]
AB Advertisement: IEEE Xplore digital library. Driving research at the world's leading universities and institutions.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264557
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264557

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP C3
TI IEEE Xplore Digital Library
AB Advertisement: IEEE Xplore digital library. Driving research at the world's leading universities and institutions.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264558
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264558

RT Journal Article
JF IEEE Design & Test of Computers
YR 2013
VO 30
IS 2
SP C4
TI Technology insight on demand on IEEE.tv [advertisement]
AB Advertisement: Internet television gets a mobile makeover. A mobile version of IEEE.tv is now available for convenient viewing. Plus a new app for IEEE.tv can also be found in your app store.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 0740-7475
LA English
DO 10.1109/MDAT.2013.2264559
LK http://doi.ieeecomputersociety.org/10.1109/MDAT.2013.2264559