Author of the publication

FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets.

, , , , and . HOST, page 48-51. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPEE: A Secure Program Execution Environment tool using code integrity checking., , and . J. High Speed Networks, 15 (1): 21-32 (2006)A Microeconomic Approach to Optimal File Allocation., and . ICDCS, page 28-35. IEEE Computer Society, (1986)Addressing application integrity attacks using a reconfigurable architecture., , and . FPGA, page 250. ACM, (2004)High-Performance Software Protection Using Reconfigurable Architectures., , , , and . Proc. IEEE, 94 (2): 419-431 (2006)Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards., , , and . IAS, page 125-130. IEEE, (2010)Algorithms for budget-constrained survivable topology design., , and . ICC, page 2162-2166. IEEE, (2002)Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading., , , , and . HPCC, page 258-265. IEEE Computer Society, (2008)Performance Study of a Compiler/Hardware Approach to Embedded Systems Security., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 543-548. Springer, (2005)Annotation scaffolds for manipulating articulated objects., , , and . Auton. Robots, 45 (6): 885-903 (2021)SAFE-OPS: An approach to embedded software security., , , , and . ACM Trans. Embed. Comput. Syst., 4 (1): 189-210 (2005)