Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities., , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-2): 1170-1179 (2011)Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor., , , , and . Cryptogr., 6 (3): 38 (2022)Information Leakage Analysis Using a Co-Design-Based Fault Injection Technique on a RISC-V Microprocessor., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (3): 438-451 (2022)Novel Offset Techniques for Improving Bitstring Quality of a Hardware-Embedded Delay PUF., , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (4): 733-743 (2018)A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time., , and . IEEE Trans. Very Large Scale Integr. Syst., 20 (1): 112-125 (2012)Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution., , , , , , and . IEEE Des. Test, 30 (3): 6-17 (2013)Secure LoRa Firmware Update with Adaptive Data Rate Techniques., , , and . Sensors, 21 (7): 2384 (2021)Defect detection under Realistic Leakage Models using Multiple IDDQ Measurement., , and . ITC, page 319-328. IEEE Computer Society, (2004)On detecting delay anomalies introduced by hardware trojans., , , , and . ICCAD, page 44. ACM, (2016)IP-level implementation of a resistance-based physical unclonable function., and . HOST, page 64-69. IEEE Computer Society, (2014)