Author of the publication

Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes.

, , , and . DFT, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Processor Security: Detecting Microarchitectural Attacks via Count-Min Sketches., , , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (7): 938-951 (2022)A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses., , , , and . DFT, page 1-6. IEEE, (2021)Machine Learning-Based Classification of Hardware Trojans in FPGAs Implementing RISC-V Cores., , , and . ICISSP, page 717-724. SCITEPRESS, (2024)hXDP: Efficient Software Packet Processing on FPGA NICs., , , , , , , , , and . OSDI, page 973-990. USENIX Association, (2020)Is RISC-V ready for Space? A Security Perspective., , , , , , and . DFT, page 1-6. IEEE, (2022)Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses., , and . DFT, page 1-6. IEEE, (2023)Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes., , , and . DFT, page 1-6. IEEE, (2023)Towards Dependable RISC-V Cores for Edge Computing Devices., , , , , , , , , and . IOLTS, page 1-7. IEEE, (2023)Moving forward through the in silico modeling of tuberculosis: a further step with UISS-TB., , , , , , , , , and 1 other author(s). BMC Bioinform., 21-S (17): 458 (2020)Evaluation of the predictive capability of PETAL tool: a retrospective study on potential tyrosine kinases drug resistance targets., , , , and . BIBM, page 1275-1280. IEEE, (2020)