Author of the publication

Detecting Hardware Trojans with Gate-Level Information-Flow Tracking.

, , , and . Computer, 49 (8): 44-52 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expanding Gate Level Information Flow Tracking for Multilevel Security., , , , and . IEEE Embed. Syst. Lett., 5 (2): 25-28 (2013)Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions., , , , , , , and . VTS, page 1-10. IEEE, (2021)Security Verification of the OpenTitan Hardware Root of Trust., , , , and . IEEE Secur. Priv., 21 (3): 27-36 (May 2023)Minimal Multi-threading: Finding and Removing Redundant Instructions in Multi-threaded Processors., , , , , , and . MICRO, page 337-348. IEEE Computer Society, (2010)Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security., , , , , , , , and . ISCA, page 189-200. ACM, (2011)A software-based dynamic-warp scheduling approach for load-balancing the Viola-Jones face detection algorithm on GPUs., , , , and . J. Parallel Distributed Comput., 73 (5): 677-685 (2013)SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip., , , , , , and . ISCA, page 583-594. ACM, (2013)A Framework for Design, Verification, and Management of SoC Access Control Systems., , , and . IEEE Trans. Computers, 72 (2): 386-400 (February 2023)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , and . IEEE Des. Test, 30 (2): 55-62 (2013)Detecting Hardware Trojans with Gate-Level Information-Flow Tracking., , , and . Computer, 49 (8): 44-52 (2016)