Author of the publication

Implementation-Based Design Fingerprinting for Robust IC Fraud Detection.

, , , and . J. Hardw. Syst. Secur., 3 (4): 426-439 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of the switching activity on the aging of delay-PUFs., , , and . ETS, page 1-2. IEEE, (2017)DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 774-787 (March 2024)Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks., , , , and . DATE, page 1000-1005. IEEE, (2021)On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis., , , , , and . SECRYPT, page 661-668. SCITEPRESS, (2022)Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware., , , , , , , and . VTS, page 1-12. IEEE, (2022)Impact of Aging on Template Attacks., , and . ACM Great Lakes Symposium on VLSI, page 455-458. ACM, (2018)Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks., , , , and . ICICDT, page 10-15. IEEE, (2023)Welcome Message from the Chairs., , , , , , , and . COINS, page 1. IEEE, (2023)LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection., , , , , and . ISQED, page 40-45. IEEE, (2020)Reliable NoC architecture utilizing a robust rerouting algorithm., , , , and . EWDTS, page 200-203. IEEE Computer Society, (2008)