169 results on '"Tehranipoor, Mark"'
Search Results
2. Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-Channel Simulation
3. CAD Tools Pathway in Hardware Security
4. ARC-FSM-G: Automatic Security Rule Checking for Finite State Machine at the Netlist Abstraction
5. QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy
6. ActiWate: Adaptive and Design-agnostic Active Watermarking for IP Ownership in Modern SoCs
7. FISHI: Fault Injection Detection in Secure Heterogeneous Integration via Power Noise Variation
8. Towards Secure Classical-Quantum Systems
9. Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation
10. Design and Security-Mitigation of Custom and Configurable Hardware Cryptosystems
11. ADWIL: A Zero-Overhead Analog Device Watermarking Using Inherent IP Features
12. RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the RTL for Security Applications
13. Physical Assurance for Heterogeneous Integration: Challenges and Opportunities
14. Logo Detection and Localization for IC Authentication, Marking Recognition, and Counterfeit Detection
15. PinPoint: An SMD Pin Localization Method
16. LDTFI: Layout-aware Timing Fault-Injection Attack Assessment Against Differential Fault Analysis
17. Security Properties Driven Pre-Silicon Laser Fault Injection Assessment
18. FTC: A Universal Sensor for Fault Injection Attack Detection
19. Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers
20. Machine Learning Assisted Counterfeit IC Detection through Non-destructive Infrared (IR) Spectroscopy Material Characterization
21. Security challenges of MEMS devices in HI packaging
22. Trust Validation of Chiplets using a Physical Inspection based Certification Authority
23. FSMx: Finite State Machine Extraction from Flattened Netlist With Application to Security
24. AIME: Watermarking AI Models by Leveraging Errors
25. POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly
26. Invited: End-to-End Secure SoC Lifecycle Management
27. HLock: Locking IPs at the High-Level Language
28. PSC-TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation
29. AutoMap: Automated Mapping of Security Properties Between Different Levels of Abstraction in Design Flow
30. SymbA: Symbolic Execution at C-level for Hardware Trojan Activation
31. LL-ATPG: Logic-Locking Aware Test Using Valet Keys in an Untrusted Environment
32. ACED-IT: Assuring Confidential Electronic Design Against Insider Threats in a Zero-Trust Environment.
33. Generative Adversarial Network for Integrated Circuits Physical Assurance Using Scanning Electron Microscopy
34. HEXON: Protecting Firmware Using Hardware-Assisted Execution-Level Obfuscation
35. Power Side-Channel Leakage Assessment Framework at Register-Transfer Level.
36. Terahertz Based Machine Learning Approach to Integrated Circuit Assurance
37. RHAT: Efficient RowHammer-Aware Test for Modern DRAM Modules
38. Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions
39. SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
40. Secure High-Level Synthesis: Challenges and Solutions
41. Detecting Hardware Trojans Using Combined Self-Testing and Imaging.
42. BOFT: Exploitable Buffer Overflow Detection by Information Flow Tracking
43. SPARTA-COTS: A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits
44. Tracking Cloned Electronic Components using a Consortium-based Blockchain Infrastructure
45. SHADE: Automated Refinement of PCB Component Estimates Using Detected Shadows
46. The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
47. SPARTA: A Laser Probing Approach for Trojan Detection
48. SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks.
49. eChain: A Blockchain-Enabled Ecosystem for Electronic Device Authenticity Verification.
50. On Optical Attacks Making Logic Obfuscation Fragile
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.