Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defense-in-depth: A recipe for logic locking to prevail., , , , , , , , and . Integr., (2020)CONCEALING-Gate: Optical Contactless Probing Resilient Design., , , , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 39:1-39:25 (2021)Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis., , , and . IACR Cryptol. ePrint Arch., (2023)Counterfeit Chip Detection using Scattering Parameter Analysis., , and . DDECS, page 99-104. IEEE, (2023)Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities., , , , , , , , and . VTS, page 1-12. IEEE, (2021)Blockchain-enabled Cryptographically-secure Hardware Obfuscation., , , and . IACR Cryptology ePrint Archive, (2019)Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model., , , , and . CoRR, (2020)Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)., , and . J. Cryptogr. Eng., 13 (4): 485-499 (November 2023)PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs., , and . DATE, page 569-574. IEEE, (2021)The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes., , , , and . HOST, page 262-272. IEEE, (2020)