Main navigation | Main content
Optional background reading:
Ken Thompson. “Reflections on trusting
trust”. Communications of the ACM, 27(8):761–763,
1984.
[ACM]
Possible main readings:
David Wheeler. “Countering trusting trust through diverse
double-compiling”. In Annual Computer Security Applications
Conference (ACSAC), pages 33–48, Tucson, AZ, USA, December
2005.
[IEEE]
Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mahesh
V. Tripunitara. “Securing computer hardware using 3D integrated
circuit (IC) technology and split manufacturing for
obfuscation”. In USENIX Security Symposium, Washington,
DC, USA, August 2013.
[USENIX]
Georg T. Becker, Francesco Regazzoni, Christof Paar, and Wayne
P. Burleson. “Stealthy dopant-level hardware trojans”. In
Cryptographic Hardware and Embedded Systems (CHES), pages
197–214, Santa Barbara, CA, USA, August 2013.
[Springer]