Author of the publication

TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.

, , , , , , and . USENIX Security Symposium, page 3219-3236. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Removal Attacks on Logic Locking and Camouflaging Techniques., , , and . IACR Cryptology ePrint Archive, (2017)Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging., , and . IACR Cryptology ePrint Archive, (2016)The Cat and Mouse in Split Manufacturing., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (5): 805-817 (2018)Parallel memristors: Improving variation tolerance in memristive digital circuits., , and . ISCAS, page 2241-2244. IEEE, (2011)Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging., , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2668-2682 (2017)Thwarting Replication Attack Against Memristor-Based Neuromorphic Computing System., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (10): 2192-2205 (2020)Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction., , , , and . IEEE Trans. Emerg. Top. Comput., 10 (1): 386-403 (2022)An Approach to Tolerate Process Related Variations in Memristor-Based Applications., , , and . VLSI Design, page 18-23. IEEE Computer Society, (2011)Security analysis of integrated circuit camouflaging., , , and . CCS, page 709-720. ACM, (2013)Blue team red team approach to hardware trust assessment., , and . ICCD, page 285-288. IEEE Computer Society, (2011)