Author of the publication

Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis.

, , , and . DFT, page 87-95. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative analysis of hybrid Magnetic Tunnel Junction and CMOS logic circuits., , , and . SoCC, page 259-264. IEEE, (2016)Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws., , and . J. Hardw. Syst. Secur., 5 (1): 19-31 (2021)Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis., , , and . DFT, page 87-95. IEEE Computer Society, (2008)Special Session: Countering IP Security threats in Supply chain., , , , , and . VTS, page 1-9. IEEE, (2019)Assessment of Message Missing Failures in CAN-based Systems., and . Parallel and Distributed Computing and Networks, page 387-392. IASTED/ACTA Press, (2005)Preventing design reverse engineering with reconfigurable spin transfer torque LUT gates., , , and . ISQED, page 242-247. IEEE, (2016)Reliability analysis of spin transfer torque based look up tables under process variations and NBTI aging., , , and . Microelectron. Reliab., (2016)COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist.. IEEE Trans. Inf. Forensics Secur., 12 (2): 338-350 (2017)Session details: Session 6B: Special Session - 2: Application-oriented Hardware Security Challenges and Solutions.. ACM Great Lakes Symposium on VLSI, ACM, (2022)Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of Transition Delay Fault Patterns., , , , , and . J. Low Power Electron., 8 (2): 248-258 (2012)