Author of the publication

PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans.

, , , , and . IEEE Trans. Emerg. Top. Comput., 10 (3): 1443-1455 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shaheen: An Open, Secure, and Scalable RV64 SoC for Autonomous Nano-UAVs., , , , , , , , , and 8 other author(s). HCS, page 1-12. IEEE, (2023)ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 1867-1882 (2021)PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans., , , , and . IEEE Trans. Emerg. Top. Comput., 10 (3): 1443-1455 (2022)A Novel Attack Mode on Advanced Technology Nodes Exploiting Transistor Self-Heating., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4134-4144 (2022)RESCUE: Resilient, Scalable, High-Corruption, Compact-Key-Set Locking Framework., and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (9): 2826-2838 (September 2023)Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks., , , , , , and . DAC, page 91-96. IEEE, (2021)Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques., , and . CoRR, (2022)Revisiting Logic Locking for Reversible Computing., , and . ETS, page 1-6. IEEE, (2019)Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking., , , , , , , , , and 25 other author(s). CoRR, (2020)VIGILANT: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (11): 3571-3584 (November 2023)