Author of the publication

An automated configurable Trojan insertion framework for dynamic trust benchmarks.

, , , and . DATE, page 1598-1603. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits, , and . CoRR, (2007)Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies, , , , and . CoRR, (2007)ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)Eat, but Verify: Low-Cost Portable Devices for Food Safety Analysis., , , , and . IEEE Consumer Electronics Magazine, 8 (1): 12-18 (2019)On-Chip Batteries as Distributed Energy Sources in Heterogeneous 2.5D/3D Integrated Circuits., , , , and . IEEE Access, (2023)SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (8): 1529-1542 (2021)On Database-Free Authentication of Microelectronic Components., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 149-161 (2021)Golden-Free Hardware Trojan Detection Using Self-Referencing., , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (3): 325-338 (2022)IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks., , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (2): 347-360 (February 2024)