Author of the publication

GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units.

, , and . HOST, page 144-150. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Design Flow of FPGA Based RISC-V Implementation., , , , , and . IVSW, page 37-42. IEEE, (2019)An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays., , , , , , and . Cryptogr., 2 (3): 15 (2018)Leveraging Distributions in Physical Unclonable Functions., , , and . Cryptogr., 1 (3): 17 (2017)Dynamic Key Updates for LUT Locked Design., , , , , and . HOST, page 105-108. IEEE, (2022)Multilayer Camouflaged Secure Boot for SoCs., , , , , , and . MTV, page 56-61. IEEE, (2019)Security Vulnerabilities of Smart Meters in Smart Grid., , , and . IECON, page 3018-3023. IEEE, (2019)Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)On detecting delay anomalies introduced by hardware trojans., , , , and . ICCAD, page 44. ACM, (2016)Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V., , , and . CoRR, (2023)Hardware Secure Execution and Simulation Model Correlation using IFT on RISC-V., , and . ACM Great Lakes Symposium on VLSI, page 409-414. ACM, (2021)