Author of the publication

Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip.

, , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1158-1171 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Against Data-Sniffing and Alteration Attacks in IJTAG., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (7): 1301-1314 (2021)Securing SoCs With FPGAs Against Rowhammer Attacks., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (7): 2052-2065 (2022)Machine Learning for Hardware Security: Opportunities and Risks., and . J. Electron. Test., 34 (2): 183-201 (2018)Run-time hardware trojan detection using performance counters., , and . ITC, page 1-10. IEEE, (2017)Accurate and Robust Malware Detection: Running XGBoost on Runtime Data From Performance Counters., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (7): 2066-2079 (2022)Learning Malicious Circuits in FPGA Bitstreams., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (3): 726-739 (March 2023)Security and Survivability of Heterogeneous SoCs.. Duke University, Durham, NC, USA, (2020)base-search.net (ftdukeunivdsp:oai:localhost:10161/22145).Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques., , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (12): 2706-2719 (2019)Runtime Malware Detection Using Embedded Trace Buffers., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (1): 35-48 (2022)Detection of Rowhammer Attacks in SoCs with FPGAs., , , and . ETS, page 1-2. IEEE, (2020)