Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs., , and . CoRR, (2020)Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table., , and . ISQED, page 408-413. IEEE, (2021)Basic Block Encoding Based Run-time CFI Check for Embedded Software., , , and . VLSI-SOC, page 135-140. IEEE, (2020)Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks.. University of South Florida, Tampa, USA, (2020)base-search.net (ftunisfloridatam:oai:digitalcommons.usf.edu:etd-10753).A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs., , and . J. Hardw. Syst. Secur., 4 (3): 246-262 (2020)Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility., , and . AsianHOST, page 109-114. IEEE, (2018)An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks., , and . AsianHOST, page 1-6. IEEE, (2018)High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging., , and . ACM Trans. Design Autom. Electr. Syst., 26 (1): 6:1-6:35 (2021)DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs., , and . iSES, page 17-20. IEEE, (2019)Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack., , and . MWSCAS, page 239-242. IEEE, (2019)