From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defense-in-depth: A recipe for logic locking to prevail., , , , , , , , и . Integr., (2020)Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis., , , и . IACR Cryptol. ePrint Arch., (2023)CONCEALING-Gate: Optical Contactless Probing Resilient Design., , , , , и . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 39:1-39:25 (2021)Counterfeit Chip Detection using Scattering Parameter Analysis., , и . DDECS, стр. 99-104. IEEE, (2023)Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities., , , , , , , , и . VTS, стр. 1-12. IEEE, (2021)Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model., , , , и . CoRR, (2020)Blockchain-enabled Cryptographically-secure Hardware Obfuscation., , , и . IACR Cryptology ePrint Archive, (2019)Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)., , и . J. Cryptogr. Eng., 13 (4): 485-499 (ноября 2023)Artificial Neural Networks and Fault Injection Attacks., и . Security and Artificial Intelligence, (2022)LeakyOhm: Secret Bits Extraction using Impedance Analysis., , и . CCS, стр. 1675-1689. ACM, (2023)