Author of the publication

Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin.

, , , , and . HOST, page 111-121. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin., , , , and . HOST, page 111-121. IEEE, (2020)Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data., , , and . PAISI, volume 9650 of Lecture Notes in Computer Science, page 114-128. Springer, (2016)Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials., , , , , , and . Wirel. Networks, 25 (5): 2651-2664 (2019)True Random Number Generation Using Latency Variations of FRAM., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 14-23 (2021)Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin., , , , and . CoRR, (2019)Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips., , and . CoRR, (2024)Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation., , , and . CoRR, (2021)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . ICCE, page 1-6. IEEE, (2019)A New Method to Prevent Unintentional Child Poisoning., , , and . EMBC, page 5142-5145. IEEE, (2018)Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †., , , , and . Cryptogr., 2 (3): 17 (2018)