Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers., , , and . HOST, page 13-16. IEEE, (2022)Threats on Logic Locking: A Decade Later., , , and . ACM Great Lakes Symposium on VLSI, page 471-476. ACM, (2019)Metrics-to-Methods: Decisive Reverse Engineering Metrics for Resilient Logic Locking., , , and . ACM Great Lakes Symposium on VLSI, page 685-690. ACM, (2023)Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration., , , , , , , , , and . IEEE Access, (2024)From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains., , , and . IEEE Access, (2021)DuCNoC: A High-Throughput FPGA-Based NoC Simulator Using Dual-Clock Lightweight Router Micro-Architecture., , and . IEEE Trans. Computers, 67 (2): 208-221 (2018)ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things., , , , and . CoRR, (2020)SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption., , , and . ISVLSI, page 153-159. IEEE, (2020)SoCFuzzer: SoC Vulnerability Detection using Cost Function enabled Fuzz Testing., , , , , and . DATE, page 1-6. IEEE, (2023)QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy., , , , , and . DFT, page 1-6. IEEE, (2023)