Author of the publication

An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification.

, , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (12): 3317-3330 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip., , , and . DSD, page 472-479. IEEE, (2022)Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses., , , and . IACR Cryptol. ePrint Arch., (2023)Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking., , , and . IACR Cryptol. ePrint Arch., (2022)Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 32-59 (2023)Template Attacks against ECC: practical implementation against Curve25519., , and . HOST, page 13-22. IEEE, (2020)Fit the Joint Moments: How to Attack Any Masking Scheme., , , and . IEEE Access, (2022)Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection., , and . ReConFig, page 1-6. IEEE, (2015)A Bit-Level Approach to Side Channel Based Disassembling., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 143-158. Springer, (2019)Side-channel disassembly on a System-on-Chip: A practical feasibility study., , , and . Microprocess. Microsystems, (2023)The EVIL Machine: Encode, Visualize and Interpret the Leakage., , and . SAC, page 1566-1575. ACM, (2023)