Author of the publication

An automated configurable Trojan insertion framework for dynamic trust benchmarks.

, , , and . DATE, page 1598-1603. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing., , , , and . CoRR, (2021)Automatic Hardware Trojan Insertion using Machine Learning., , , , and . CoRR, (2022)An automated configurable Trojan insertion framework for dynamic trust benchmarks., , , and . DATE, page 1598-1603. IEEE, (2018)The Metric Matters: The Art of Measuring Trust in Electronics., , and . DAC, page 222. ACM, (2019)MAGIC: Machine-Learning-Guided Image Compression for Vision Applications in Internet of Things., , and . IEEE Internet Things J., 8 (9): 7303-7315 (2021)Software Variants for Hardware Trojan Detection and Resilience in COTS Processors., , , , and . CoRR, (2021)Learning Your Lock: Exploiting Structural Vulnerabilities in Logic Locking., , , , and . IEEE Des. Test, 41 (2): 7-14 (2024)Hardware Trojan Detection Using ATPG and Model Checking., , , and . VLSID, page 91-96. IEEE Computer Society, (2018)HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption., , , , and . IEEE Embed. Syst. Lett., 14 (2): 71-74 (2022)An Automated Framework for Board-Level Trojan Benchmarking., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 397-410 (February 2023)