35 results on '"Nasim A. Khan"'
Search Results
2. Assuring Security and Reliability of Emerging Non-Volatile Memories.
3. Power Side Channel Attack Analysis and Detection.
4. Recent Advances in Emerging Technology-based Security Primitives, Attacks and Mitigation.
5. Multi-Bit Read and Write Methodologies for Diode-MTJ Crossbar Array.
6. Reconfigurable and Dense Analog Circuit Design Using Two Terminal Resistive Memory.
7. SecNVM: Power Side-Channel Elimination Using On-Chip Capacitors for Highly Secure Emerging NVM.
8. SCARE: Side Channel Attack on In-Memory Computing for Reverse Engineering.
9. Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks.
10. Meeting the Conflicting Goals of Low-Power and Resiliency Using Emerging Memories : (Invited Paper).
11. ENTT: A Family of Emerging NVM-based Trojan Triggers.
12. SHINE: A Novel SHA-3 Implementation Using ReRAM-based In-Memory Computing.
13. Hardware Trojans in Emerging Non-Volatile Memories.
14. Test Methodologies and Test-Time Compression for Emerging Non-Volatile Memory.
15. Cache-Out: Leaking Cache Memory Using Hardware Trojan.
16. HarTBleed: Using Hardware Trojans for Data Leakage Exploits.
17. Test of Supply Noise for Emerging Non-Volatile Memory.
18. CTCG: Charge-trap based camouflaged gates for reverse engineering prevention.
19. Information Leakage Attacks on Emerging Non-Volatile Memory and Countermeasures.
20. Fault injection attacks on emerging non-volatile memory and countermeasures.
21. Analysis of Row Hammer Attack on STTRAM.
22. Novel application of spintronics in computing, sensing, storage and cybersecurity.
23. Test challenges and solutions for emerging non-volatile memories.
24. Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories.
25. Side-Channel Attack on STTRAM Based Cache for Cryptographic Application.
26. Novel magnetic burn-in for retention testing of STTRAM.
27. Novel Magnetic Burn-In for Retention and Magnetic Tolerance Testing of STTRAM.
28. SCARE: Side Channel Attack on In-Memory Computing for Reverse Engineering.
29. TrappeD: DRAM Trojan Designs for Information Leakage and Fault Injection Attacks.
30. Replacing eFlash with STTRAM in IoTs: Security Challenges and Solutions.
31. A Morphable Physically Unclonable Function and True Random Number Generator using a Commercial Magnetic Memory.
32. RF-Trojan: Leaking Kernel Data Using Register File Trojan.
33. Multi-Bit Read and Write Methodologies for Diode-STTRAM Crossbar Array.
34. Attack resilient architecture to replace embedded Flash with STTRAM in homogeneous IoTs.
35. Security and privacy threats to on-chip non-volatile memories and countermeasures.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.