Author of the publication

Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication.

, , , and . ICCAD, page 30. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved obstacle avoidance and navigation for an autonomous ground vehicle., , , , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 9406 of SPIE Proceedings, page 940608. SPIE, (2015)Electronics Supply Chain Integrity Enabled by Blockchain., , , , , and . ACM Trans. Design Autom. Electr. Syst., 24 (3): 31:1-31:25 (2019)CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (1): 175-202 (2020)Development and Evaluation of Hardware Obfuscation Benchmarks., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 142-161 (2018)Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 86-118 (2019)Defeating CAS-Unlock., , , and . IACR Cryptol. ePrint Arch., (2020)New vision system and navigation algorithm for an autonomous ground vehicle., , , , , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 9025 of SPIE Proceedings, page 90250T. SPIE, (2014)EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs., , , , , and . ITC, page 1-9. IEEE, (2018)