From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Counterfeit Chip Detection using Scattering Parameter Analysis., , и . DDECS, стр. 99-104. IEEE, (2023)Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis., , , и . IACR Cryptol. ePrint Arch., (2023)Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities., , , , , , , , и . VTS, стр. 1-12. IEEE, (2021)Artificial Neural Networks and Fault Injection Attacks., и . Security and Artificial Intelligence, (2022)The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes., , , , и . HOST, стр. 262-272. IEEE, (2020)Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging., , и . ASHES@CCS, стр. 17-27. ACM, (2021)LeakyOhm: Secret Bits Extraction using Impedance Analysis., , и . CCS, стр. 1675-1689. ACM, (2023)PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs., , и . DATE, стр. 569-574. IEEE, (2021)Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques., , , , , и . ASP-DAC, стр. 429-435. IEEE, (2022)SPARTA: A Laser Probing Approach for Trojan Detection., , , , и . ITC, стр. 1-10. IEEE, (2020)