Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects., , , and . CoRR, (2019)ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , and . CoRR, (2019)Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime., , , , and . CoRR, (2019)A Comparative Security Analysis of Current and Emerging Technologies., , , and . IEEE Micro, 36 (5): 50-61 (2016)Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques., , and . IEEE Trans. Inf. Forensics Secur., (2022)Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques., , and . IEEE Trans. Inf. Forensics Secur., (2022)UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2023)Breaking CAS-Lock and Its Variants by Exploiting Structural Traces., , and . IACR Cryptol. ePrint Arch., (2021)A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications., and . IEEE Des. Test, 34 (1): 57-64 (2017)