Tamzidul Hoque

Orcid: 0000-0002-6845-0361

According to our database1, Tamzidul Hoque authored at least 35 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication.
J. Hardw. Syst. Secur., September, 2024

A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs.
CoRR, 2024

HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor.
CoRR, 2024

Physically Unclonable and Reconfigurable Circuits for IP Protection: Opportunities and Challenges.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2024

2023
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing.
ACM J. Emerg. Technol. Comput. Syst., July, 2023

An Automated Framework for Board-Level Trojan Benchmarking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., February, 2023

Unsupervised IC Security with Machine Learning for Trojan Detection.
Proceedings of the 66th IEEE International Midwest Symposium on Circuits and Systems, 2023

2022
Golden-Free Hardware Trojan Detection Using Self-Referencing.
IEEE Trans. Very Large Scale Integr. Syst., 2022

Trojan Resilient Computing in COTS Processors Under Zero Trust.
IEEE Trans. Very Large Scale Integr. Syst., 2022

LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

A Semi-formal Information Flow Validation for Analyzing Secret Asset Propagation in COTS IC Integrated Systems.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

KEATON: Assertion-guided Attack on Combinational and Sequential Locking without Scan Access.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
Software Variants for Hardware Trojan Detection and Resilience in COTS Processors.
CoRR, 2021

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing.
CoRR, 2021

2020
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks.
ACM Trans. Design Autom. Electr. Syst., 2020

Hardware Obfuscation and Logic Locking: A Tutorial Introduction.
IEEE Des. Test, 2020

An Automated Framework for Board-level Trojan Benchmarking.
CoRR, 2020

Trust Issues in Microelectronics: The Concerns and the Countermeasures.
IEEE Consumer Electron. Mag., 2020

P2C2: Peer-to-Peer Car Charging.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Trust Issues in COTS: The Challenges and Emerging Solution.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
Special Session: Countering IP Security threats in Supply chain.
Proceedings of the 37th IEEE VLSI Test Symposium, 2019

Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection.
Proceedings of the 37th IEEE VLSI Test Symposium, 2019

Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

An Adaptable System-on-Chip Security Architecture for Internet of Things Applications.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018
Hardware Trojan attacks in embedded memory.
Proceedings of the 36th IEEE VLSI Test Symposium, 2018

Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify.
Proceedings of the IEEE International Test Conference, 2018

2017
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise.
J. Electron. Test., 2017

MUTARCH: Architectural diversity for FPGA device and IP security.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

Mixed-granular architectural diversity for device security in the Internet of Things.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

Technical demonstration session: Software toolflow for FPGA bitstream obfuscation.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

Active protection against PCB physical tampering.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016

The power play: Security-energy trade-offs in the IoT regime.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

2015
Assessment of NAND based ring oscillator for hardware Trojan detection.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015

Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015


  Loading...