Author of the publication

FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs.

, , , and . ACM Trans. Design Autom. Electr. Syst., 21 (4): 63:1-63:20 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TSensors Vision, Infrastructure and Security Challenges in Trillion Sensor Era., , and . J. Hardware and Systems Security, 1 (4): 311-327 (2017)Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement., , and . IEEE Des. Test, 36 (1): 14-22 (2019)Hardware Security (Dagstuhl Seminar 16202)., , and . Dagstuhl Reports, 6 (5): 72-93 (2016)Robust, low-cost, and accurate detection of recycled ICs using digital signatures., , , and . HOST, page 209-214. IEEE Computer Society, (2018)Probing Attacks on Integrated Circuits: Challenges and Research Opportunities., , , and . IEEE Des. Test, 34 (5): 63-71 (2017)Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives., , , , , , , , , and . CoRR, (2020)Emerging Attacks and Solutions for Secure Hardware in the Internet of Things., , , and . IEEE Trans. Dependable Secur. Comput., 16 (3): 373-375 (2019)Editorial TVLSI Positioning - Continuing and Accelerating an Upward Trajectory., , , , , , , , , and 47 other author(s). IEEE Trans. Very Large Scale Integr. Syst., 27 (2): 253-280 (2019)Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation., , , and . JETC, 16 (2): 17:1-17:25 (2020)A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks., , , , and . AsianHOST, page 98-103. IEEE, (2018)