Author of the publication

Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †.

, , , , and . Cryptogr., 2 (3): 17 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disassembling Software Instruction Types through Impedance Side-channel Analysis., and . HOST, page 227-237. IEEE, (2023)Exploiting DRAM Latency Variations for Generating True Random Numbers., , , , and . ICCE, page 1-6. IEEE, (2019)Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips., , and . IEEE Trans. Inf. Forensics Secur., (2024)Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †., , , , and . Cryptogr., 2 (3): 17 (2018)Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software., and . CoRR, (2023)Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities., , and . CoRR, (2023)Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips., , and . ACM Great Lakes Symposium on VLSI, page 21-26. ACM, (2022)True Random Number Generation using Latency Variations of Commercial MRAM Chips., , , and . ISQED, page 510-515. IEEE, (2021)Randomized Pulse-Based Encoding for Secure Wireless Data Communications., , , and . MWSCAS, page 289-292. IEEE, (2020)Side-Channel-Driven Intrusion Detection System for Mission Critical Unmanned Aerial Vehicles., , , and . ISQED, page 1-9. IEEE, (2024)