Author of the publication

Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking.

, , , , , , and . QRS, page 702-713. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DRAM based Intrinsic Physical Unclonable Functions for System Level Security., , , and . ACM Great Lakes Symposium on VLSI, page 15-20. ACM, (2015)A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay., , and . IEEE Des. Test, 30 (2): 26-34 (2013)ReCFA: Resilient Control-Flow Attestation., , , , , , and . ACSAC, page 311-322. ACM, (2021)TI-TRNG: Technology Independent True Random Number Generator., , , , , and . DAC, page 179:1-179:6. ACM, (2014)Path-delay fingerprinting for identification of recovered ICs., , and . DFT, page 13-18. IEEE Computer Society, (2012)BISA: Built-in self-authentication for preventing hardware Trojan insertion., and . HOST, page 45-50. IEEE Computer Society, (2013)A zero-overhead IC identification technique using clock sweeping and path delay analysis., , , and . ACM Great Lakes Symposium on VLSI, page 95-98. ACM, (2012)A study on the effectiveness of Trojan detection techniques using a red team blue team approach., , , , and . VTS, page 1-3. IEEE Computer Society, (2013)Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking., , , , , , and . QRS, page 702-713. IEEE, (2021)