University of Minnesota
Security and Privacy in Computing
index.php

Readings on: infrastructure paranoia

Optional background reading: Ken Thompson. “Reflections on trusting trust”. Communications of the ACM, 27(8):761–763, 1984.
[ACM]

Possible main readings: David Wheeler. “Countering trusting trust through diverse double-compiling”. In Annual Computer Security Applications Conference (ACSAC), pages 33–48, Tucson, AZ, USA, December 2005.
[IEEE]

Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mahesh V. Tripunitara. “Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation”. In USENIX Security Symposium, Washington, DC, USA, August 2013.
[USENIX]

Georg T. Becker, Francesco Regazzoni, Christof Paar, and Wayne P. Burleson. “Stealthy dopant-level hardware trojans”. In Cryptographic Hardware and Embedded Systems (CHES), pages 197–214, Santa Barbara, CA, USA, August 2013.
[Springer]