Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis., , , and . IACR Cryptol. ePrint Arch., (2023)Counterfeit Chip Detection using Scattering Parameter Analysis., , and . DDECS, page 99-104. IEEE, (2023)Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities., , , , , , , , and . VTS, page 1-12. IEEE, (2021)SPARTA: A Laser Probing Approach for Trojan Detection., , , , and . ITC, page 1-10. IEEE, (2020)The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes., , , , and . HOST, page 262-272. IEEE, (2020)Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model., , , , and . SP, page 1955-1971. IEEE, (2021)Artificial Neural Networks and Fault Injection Attacks., and . Security and Artificial Intelligence, (2022)PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs., , and . DATE, page 569-574. IEEE, (2021)Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging., , and . ASHES@CCS, page 17-27. ACM, (2021)LeakyOhm: Secret Bits Extraction using Impedance Analysis., , and . CCS, page 1675-1689. ACM, (2023)