Author of the publication

Granularity and detection capability of an adaptive embedded Hardware Trojan detection system.

, , and . HOST, page 135-138. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (1): 32-59 (2023)Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses., , , and . IACR Cryptol. ePrint Arch., (2023)Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking., , , and . IACR Cryptol. ePrint Arch., (2022)Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip., , , and . DSD, page 472-479. IEEE, (2022)Template Attacks against ECC: practical implementation against Curve25519., , and . HOST, page 13-22. IEEE, (2020)Fit the Joint Moments: How to Attack Any Masking Scheme., , , and . IEEE Access, (2022)Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection., , and . ReConFig, page 1-6. IEEE, (2015)A Bit-Level Approach to Side Channel Based Disassembling., , and . CARDIS, volume 11833 of Lecture Notes in Computer Science, page 143-158. Springer, (2019)Side-channel disassembly on a System-on-Chip: A practical feasibility study., , , and . Microprocess. Microsystems, (2023)The EVIL Machine: Encode, Visualize and Interpret the Leakage., , and . SAC, page 1566-1575. ACM, (2023)