Domenic Forte

Orcid: 0000-0002-2794-7320

According to our database1, Domenic Forte authored at least 203 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Recycled Counterfeit Chips Detection for AMS and Digital ICs Using Low-Area, Self-Contained, and Secure LDO Odometers.
J. Hardw. Syst. Secur., September, 2024

A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication.
J. Hardw. Syst. Secur., September, 2024

Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource.
Cryptogr., June, 2024

MaGNIFIES: Manageable GAN Image Augmentation Framework for Inspection of Electronic Systems.
J. Hardw. Syst. Secur., March, 2024

Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs.
CoRR, 2024

SPERO: Simultaneous Power/EM Side-channel Dataset Using Real-time and Oscilloscope Setups.
CoRR, 2024

LaserEscape: Detecting and Mitigating Optical Probing Attacks.
CoRR, 2024

RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations.
CoRR, 2024

DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

2023
iPROBE: Internal Shielding Approach for Protecting Against Front-Side and Back-Side Probing Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration.
J. Hardw. Syst. Secur., December, 2023

Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming.
ACM Trans. Design Autom. Electr. Syst., November, 2023

A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images.
ACM J. Emerg. Technol. Comput. Syst., October, 2023

A Comprehensive Taxonomy of Visual Printed Circuit Board Defects.
J. Hardw. Syst. Secur., September, 2023

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation.
ACM Trans. Design Autom. Electr. Syst., March, 2023

A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack.
IEEE Trans. Very Large Scale Integr. Syst., 2023

Information Theory-based Evolution of Neural Networks for Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

A Brief Tutorial on Mixed Signal Approaches to Combat Electronic Counterfeiting.
IEEE Open J. Circuits Syst., 2023

Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks.
IACR Cryptol. ePrint Arch., 2023

Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions.
IACR Cryptol. ePrint Arch., 2023

Quantization-aware Neural Architectural Search for Intrusion Detection.
CoRR, 2023

SECURE: A Segmentation Quality Evaluation Metric on SEM Images for Reverse Engineering on Integrated Circuits.
IEEE Access, 2023

Laser Fault Injection Vulnerability Assessment and Mitigation with Case Study on PG-TVD Logic Cells.
Proceedings of the IEEE International Test Conference, 2023

Polymorphic Sensor to Detect Laser Logic State Imaging Attack.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

SPRED: Spatially Distributed Laser Fault Injection Resilient Design.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

KinfaceNet: A New Deep Transfer Learning based Kinship Feature Extraction Framework.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

ASHES '23: Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems.
ACM Trans. Design Autom. Electr. Syst., 2022

EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Physical security in the post-quantum era.
J. Cryptogr. Eng., 2022

Real-time instruction-level verification of remote IoT/CPS devices via side channels.
Discov. Internet Things, 2022

HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation.
CoRR, 2022

REFICS: A Step Towards Linking Vision with Hardware Assurance.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

HWGN<sup>2</sup>: Side-Channel Protected NNs Through Secure and Private Function Evaluation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

TAMED: Transitional Approaches for LFI Resilient State Machine Encoding.
Proceedings of the IEEE International Test Conference, 2022

Self-timed Sensors for Detecting Static Optical Side Channel Attacks.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

Joint Optimization of NCL PUF Using Frequency-based Analysis and Evolutionary Algorithm.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

Garbled EDA: Privacy Preserving Electronic Design Automation.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

iPROBE-O: FIB-aware Place and Route for Probing Protection Using Orthogonal Shields.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks.
ACM Trans. Design Autom. Electr. Syst., 2021

An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems.
IEEE Trans. Inf. Forensics Secur., 2021

A Metal-Via Resistance Based Physically Unclonable Function With Backend Incremental ADC.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person.
J. Hardw. Syst. Secur., 2021

Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security.
ACM J. Emerg. Technol. Comput. Syst., 2021

Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives.
ACM J. Emerg. Technol. Comput. Syst., 2021

Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version).
J. Cryptogr. Eng., 2021

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners.
CoRR, 2021

InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis.
CoRR, 2021

REFICS: Assimilating Data-Driven Paradigms Into Reverse Engineering and Hardware Assurance on Integrated Circuits.
IEEE Access, 2021

LDO-based Odometer to Combat IC Recycling.
Proceedings of the 34th IEEE International System-on-Chip Conference, 2021

SPARSE: Spatially Aware LFI Resilient State Machine Encoding.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection Using Machine Learning Classification.
IEEE Trans. Very Large Scale Integr. Syst., 2020

SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation.
ACM Trans. Design Autom. Electr. Syst., 2020

Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks.
ACM Trans. Design Autom. Electr. Syst., 2020

Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation.
ACM Trans. Design Autom. Electr. Syst., 2020

CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

ECG Biometric: Spoofing and Countermeasures.
IEEE Trans. Biom. Behav. Identity Sci., 2020

Recycled SoC Detection Using LDO Degradation.
SN Comput. Sci., 2020

Leveraging Side-Channel Information for Disassembly and Security.
ACM J. Emerg. Technol. Comput. Syst., 2020

Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation.
ACM J. Emerg. Technol. Comput. Syst., 2020

Defense-in-depth: A recipe for logic locking to prevail.
Integr., 2020

Defeating CAS-Unlock.
IACR Cryptol. ePrint Arch., 2020

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions.
CoRR, 2020

Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images.
CoRR, 2020

Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives.
CoRR, 2020

A Weak Asynchronous RESet (ARES) PUF Using Start-up Characteristics of Null Conventional Logic Gates.
Proceedings of the IEEE International Test Conference, 2020

Low-Cost Remarked Counterfeit IC Detection using LDO Regulators.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Probing Assessment Framework and Evaluation of Antiprobing Solutions.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Electronics Supply Chain Integrity Enabled by Blockchain.
ACM Trans. Design Autom. Electr. Syst., 2019

Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

Automated Defective Pin Detection for Recycled Microelectronics Identification.
J. Hardw. Syst. Secur., 2019

Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design.
IACR Cryptol. ePrint Arch., 2019

Theoretical and Practical Approaches for Hardness Amplification of PUFs.
IACR Cryptol. ePrint Arch., 2019

Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
IACR Cryptol. ePrint Arch., 2019

Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement.
IEEE Des. Test, 2019

EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering.
CoRR, 2019

Early Detection of Cardiovascular Diseases Using Wearable Ultrasound Device.
IEEE Consumer Electron. Mag., 2019

PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures.
IEEE Access, 2019

Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT.
IEEE Access, 2019

PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks.
IEEE Access, 2019

Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection.
Proceedings of the 37th IEEE VLSI Test Symposium, 2019

Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones.
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019

IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Past, Present, and Future.
Proceedings of the IEEE International Test Conference, 2019

Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation.
Proceedings of the IEEE International Test Conference, 2019

Aging Analysis of Low Dropout Regulator for Universal Recycled IC Detection.
Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI, 2019

RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions.
Proceedings of the 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019

A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2019

Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

Contact-to-Silicide Probing Attacks on Integrated Circuits and Countermeasures.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

Sweep to the Secret: A Constant Propagation Attack on Logic Locking.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs.
IEEE Trans. Very Large Scale Integr. Syst., 2018

SCARe: An SRAM-Based Countermeasure Against IC Recycling.
IEEE Trans. Very Large Scale Integr. Syst., 2018

Hardware-Enabled Pharmaceutical Supply Chain Security.
ACM Trans. Design Autom. Electr. Syst., 2018

ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain.
ACM Trans. Design Autom. Electr. Syst., 2018

UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain.
ACM Trans. Design Autom. Electr. Syst., 2018

Guest Editorial: Hardware Reverse Engineering and Obfuscation.
J. Hardw. Syst. Secur., 2018

Development and Evaluation of Hardware Obfuscation Benchmarks.
J. Hardw. Syst. Secur., 2018

Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security.
J. Hardw. Syst. Secur., 2018

LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures.
CoRR, 2018

Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT.
CoRR, 2018

EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs.
Proceedings of the IEEE International Test Conference, 2018

Power-based side-channel instruction-level disassembler.
Proceedings of the 55th Annual Design Automation Conference, 2018

A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Poly-Si-Based Physical Unclonable Functions.
IEEE Trans. Very Large Scale Integr. Syst., 2017

Security Beyond CMOS: Fundamentals, Applications, and Roadmap.
IEEE Trans. Very Large Scale Integr. Syst., 2017

CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain.
ACM Trans. Design Autom. Electr. Syst., 2017

Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering.
ACM Trans. Design Autom. Electr. Syst., 2017

SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware.
IEEE Trans. Dependable Secur. Comput., 2017

Highly Reliable Key Generation From Electrocardiogram (ECG).
IEEE Trans. Biomed. Eng., 2017

Benchmarking of Hardware Trojans and Maliciously Affected Circuits.
J. Hardw. Syst. Secur., 2017

Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation.
J. Hardw. Syst. Secur., 2017

Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks.
IACR Cryptol. ePrint Arch., 2017

Probing Attacks on Integrated Circuits: Challenges and Research Opportunities.
IEEE Des. Test, 2017

Aging resilient RO PUF with increased reliability in FPGA.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2017

Hardware trojan detection through information flow security verification.
Proceedings of the IEEE International Test Conference, 2017

On the vulnerability of ECG verification to online presentation attacks.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

Human recognition from photoplethysmography (PPG) based on non-fiducial features.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

Comparative Analysis of Hardware Obfuscation for IP Protection.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

FFD: A Framework for Fake Flash Detection.
Proceedings of the 54th Annual Design Automation Conference, 2017

Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Non-fiducial PPG-based authentication for healthcare application.
Proceedings of the 2017 IEEE EMBS International Conference on Biomedical & Health Informatics, 2017

Security vulnerability analysis of design-for-test exploits for asset protection in SoCs.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

MPA: Model-assisted PCB attestation via board-level RO and temperature compensation.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Hardware Trojans: Lessons Learned after One Decade of Research.
ACM Trans. Design Autom. Electr. Syst., 2016

FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs.
ACM Trans. Design Autom. Electr. Syst., 2016

An Aging-Resistant RO-PUF for Reliable Key Generation.
IEEE Trans. Emerg. Top. Comput., 2016

On Reverse Engineering-Based Hardware Trojan Detection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2016

A Survey on Chip to System Reverse Engineering.
ACM J. Emerg. Technol. Comput. Syst., 2016

Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction].
Computer, 2016

A stochastic approach to analog physical unclonable function.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

Recycled FPGA detection using exhaustive LUT path delay characterization.
Proceedings of the 2016 IEEE International Test Conference, 2016

Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs).
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Hardware security meets biometrics for the age of IoT.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

UCR: An unclonable chipless RFID tag.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

A layout-driven framework to assess vulnerability of ICs to microprobing attacks.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Aging attacks for key extraction on permutation-based obfuscation.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

A zero-cost approach to detect recycled SoC chips using embedded SRAM.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Tracking Data Flow at Gate-Level through Structural Checking.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Memristor PUF - A Security Primitive: Theory and Experiment.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2015

ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Harnessing Nanoscale Device Properties for Hardware Security.
Proceedings of the 16th International Workshop on Microprocessor and SOC Test and Verification, 2015

Performance optimization for on-chip sensors to detect recycled ICs.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

A pair selection algorithm for robust RO-PUF against environmental variations and aging.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

Protecting Endpoint Devices in IoT Supply Chain.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

Efficient and secure split manufacturing via obfuscated built-in self-authentication.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Chip-level anti-reverse engineering using transformable interconnects.
Proceedings of the 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2015

Investigation of obfuscation-based anti-reverse engineering for printed circuit boards.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014

Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs.
Proceedings of the 2014 27th International Conference on VLSI Design, 2014

CSST: An Efficient Secure Split-Test for Preventing IC Piracy.
Proceedings of the IEEE 23rd North Atlantic Test Workshop, 2014

On application of one-class SVM to reverse engineering-based hardware Trojan detection.
Proceedings of the Fifteenth International Symposium on Quality Electronic Design, 2014

Bit selection algorithm suitable for high-volume production of SRAM-PUF.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly.
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014

Aging analysis for recycled FPGA detection.
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014

ARO-PUF: An aging-resistant ring oscillator PUF design.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

TI-TRNG: Technology Independent True Random Number Generator.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Low-cost On-Chip Structures for Combating Die and IC Recycling.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Advanced Analysis of Cell Stability for Reliable SRAM PUFs.
Proceedings of the 23rd IEEE Asian Test Symposium, 2014

2013
Design, Fabrication, and Run-time Strategies for Hardware-Assisted Security.
PhD thesis, 2013

Thermal-aware sensor scheduling for distributed estimation.
ACM Trans. Sens. Networks, 2013

Resource-aware architectures for adaptive particle filter based visual target tracking.
ACM Trans. Design Autom. Electr. Syst., 2013

Energy- and Thermal-Aware Video Coding via Encoder/Decoder Workload Balancing.
ACM Trans. Embed. Comput. Syst., 2013

Improving the Quality of Delay-Based PUFs via Optical Proximity Correction.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

Anti-counterfeit Techniques: From Design to Resign.
Proceedings of the 14th International Workshop on Microprocessor Test and Verification, 2013

Temperature tracking: an innovative run-time approach for hardware Trojan detection.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013

2012
Manipulating Manufacturing Variations for Better Silicon-Based Physically Unclonable Functions.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

On improving the uniqueness of silicon-based physically unclonable functions via optical proximity correction.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
Energy-aware and quality-scalable data placement and retrieval for disks in video server environments.
Proceedings of the IEEE 29th International Conference on Computer Design, 2011

Adaptable architectures for distributed visual target tracking.
Proceedings of the IEEE 29th International Conference on Computer Design, 2011

Energy-aware video storage and retrieval in server environments.
Proceedings of the 2011 International Green Computing Conference and Workshops, 2011

Resource-aware architectures for particle filter based visual target tracking.
Proceedings of the 2011 International Green Computing Conference and Workshops, 2011

Energy-aware video coding of multiple views via workload balancing.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011

Adaptable video compression and transmission using lossy and workload balancing techniques.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011


  Loading...