Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits., , and . WIFS, page 1-6. IEEE, (2010)Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of Transition Delay Fault Patterns., , , , , and . J. Low Power Electron., 8 (2): 248-258 (2012)On design vulnerability analysis and trust benchmarks development., , and . ICCD, page 471-474. IEEE Computer Society, (2013)Assessment of Message Missing Failures in CAN-based Systems., and . Parallel and Distributed Computing and Networks, page 387-392. IASTED/ACTA Press, (2005)Preventing design reverse engineering with reconfigurable spin transfer torque LUT gates., , , and . ISQED, page 242-247. IEEE, (2016)COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist.. IEEE Trans. Inf. Forensics Secur., 12 (2): 338-350 (2017)Reliability analysis of spin transfer torque based look up tables under process variations and NBTI aging., , , and . Microelectron. Reliab., (2016)Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis., , , and . DFT, page 87-95. IEEE Computer Society, (2008)Comparative analysis of hybrid Magnetic Tunnel Junction and CMOS logic circuits., , , and . SoCC, page 259-264. IEEE, (2016)Special Session: Countering IP Security threats in Supply chain., , , , , and . VTS, page 1-9. IEEE, (2019)