Остановите войну!
for scientists:
default search action
Mark M. Tehranipoor
- > Home > Persons > Mark M. Tehranipoor
Publications
- 2023
- [j138]Minyan Gao, M. Sazadur Rahman, Nitin Varshney, Mark M. Tehranipoor, Domenic Forte:
iPROBE: Internal Shielding Approach for Protecting Against Front-Side and Back-Side Probing Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4541-4554 (2023) - [c206]Yunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation. HOST 2023: 133-143 - 2022
- [j137]Yunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
Real-time instruction-level verification of remote IoT/CPS devices via side channels. Discov. Internet Things 2(1) (2022) - [j128]Yunkai Bai, Andrew Stern, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems. ACM Trans. Design Autom. Electr. Syst. 27(6): 65:1-65:25 (2022) - 2021
- [j124]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j122]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives. ACM J. Emerg. Technol. Comput. Syst. 17(4): 62:1-62:53 (2021) - [j121]Beomsoo Park, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A Metal-Via Resistance Based Physically Unclonable Function With Backend Incremental ADC. IEEE Trans. Circuits Syst. I Regul. Pap. 68(11): 4700-4709 (2021) - [j120]M. Sazadur Rahman, Adib Nahiyan, Fahim Rahman, Saverio Fazzari, Kenneth Plaks, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks. ACM Trans. Design Autom. Electr. Syst. 26(4): 29:1-29:27 (2021) - 2020
- [j119]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-depth: A recipe for logic locking to prevail. Integr. 72: 39-57 (2020) - [j118]Jungmin Park, Fahim Rahman, Apostol Vassilev, Domenic Forte, Mark M. Tehranipoor:
Leveraging Side-Channel Information for Disassembly and Security. ACM J. Emerg. Technol. Comput. Syst. 16(1): 6:1-6:21 (2020) - [j117]Zimu Guo, Sreeja Chowdhury, Mark M. Tehranipoor, Domenic Forte:
Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation. ACM J. Emerg. Technol. Comput. Syst. 16(2): 17:1-17:25 (2020) - [j114]Huanyu Wang, Qihang Shi, Adib Nahiyan, Domenic Forte, Mark M. Tehranipoor:
A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2152-2165 (2020) - [j113]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 175-202 (2020) - [j112]Tamzidul Hoque, Kai Yang, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(1): 4:1-4:32 (2020) - [j111]Adib Nahiyan, Jungmin Park, Miao Tony He, Yousef Iskander, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation. ACM Trans. Design Autom. Electr. Syst. 25(3): 26:1-26:27 (2020) - [j110]Md. Mahbub Alam, Adib Nahiyan, Mehdi Sadi, Domenic Forte, Mark M. Tehranipoor:
Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation. ACM Trans. Design Autom. Electr. Syst. 25(4): 35:1-35:22 (2020) - [j108]Andrew Stern, Ulbert Botero, Fahim Rahman, Domenic Forte, Mark M. Tehranipoor:
EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection Using Machine Learning Classification. IEEE Trans. Very Large Scale Integr. Syst. 28(2): 363-375 (2020) - [i14]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil Azhagan Mallaiyan Sathiaseelan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives. CoRR abs/2002.04210 (2020) - [i12]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Defeating CAS-Unlock. IACR Cryptol. ePrint Arch. 2020: 324 (2020) - 2019
- [j106]Nima Karimian, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT. IEEE Access 7: 49135-49149 (2019) - [j105]Ulbert J. Botero, Mark M. Tehranipoor, Domenic Forte:
Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement. IEEE Des. Test 36(1): 14-22 (2019) - [j103]Adib Nahiyan, Farimah Farahmandi, Prabhat Mishra, Domenic Forte, Mark M. Tehranipoor:
Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(6): 1003-1016 (2019) - [j102]Qihang Shi, Mark M. Tehranipoor, Domenic Forte:
Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(11): 1981-1994 (2019) - [j101]Bicky Shakya, Hao-Ting Shen, Mark M. Tehranipoor, Domenic Forte:
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 86-118 (2019) - [j99]Xiaolin Xu, Fahim Rahman, Bicky Shakya, Apostol Vassilev, Domenic Forte, Mark M. Tehranipoor:
Electronics Supply Chain Integrity Enabled by Blockchain. ACM Trans. Design Autom. Electr. Syst. 24(3): 31:1-31:25 (2019) - [j97]Huanyu Wang, Qihang Shi, Domenic Forte, Mark M. Tehranipoor:
Probing Assessment Framework and Evaluation of Antiprobing Solutions. IEEE Trans. Very Large Scale Integr. Syst. 27(6): 1239-1252 (2019) - [j95]Md. Mahbub Alam, Mark M. Tehranipoor, Domenic Forte:
Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2897-2910 (2019) - [c173]Beomsoo Park, Mark M. Tehranipoor, Domenic Forte, Nima Maghari:
A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability. CICC 2019: 1-4 - [c172]Md. Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark M. Tehranipoor, Domenic Forte:
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions. FDTC 2019: 48-55 - [c165]Domenic Forte, Swarup Bhunia, Ramesh Karri, Jim Plusquellic, Mark M. Tehranipoor:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Past, Present, and Future. ITC 2019: 1-4 - [c164]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [i9]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. CoRR abs/1904.09516 (2019) - [i8]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-Depth: A Recipe for Logic Locking to Prevail. CoRR abs/1907.08863 (2019) - [i7]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i6]M. Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design. IACR Cryptol. ePrint Arch. 2019: 946 (2019) - 2018
- [j94]Md. Mahbub Alam, Sreeja Chowdhury, Beomsoo Park, David Joseph Munzer, Nima Maghari, Mark M. Tehranipoor, Domenic Forte:
Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security. J. Hardw. Syst. Secur. 2(1): 15-32 (2018) - [j93]Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2(2): 142-161 (2018) - [j89]Kun Yang, Hao-Ting Shen, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Hardware-Enabled Pharmaceutical Supply Chain Security. ACM Trans. Design Autom. Electr. Syst. 23(2): 23:1-23:26 (2018) - [j88]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain. ACM Trans. Design Autom. Electr. Syst. 23(3): 29:1-29:27 (2018) - [j87]Kun Yang, Ulbert Botero, Hao-Ting Shen, Damon L. Woodard, Domenic Forte, Mark M. Tehranipoor:
UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain. ACM Trans. Design Autom. Electr. Syst. 23(6): 74:1-74:24 (2018) - [j86]Zimu Guo, Xiaolin Xu, Md. Tauhidur Rahman, Mark M. Tehranipoor, Domenic Forte:
SCARe: An SRAM-Based Countermeasure Against IC Recycling. IEEE Trans. Very Large Scale Integr. Syst. 26(4): 744-755 (2018) - [j85]Xiaolin Xu, Shahrzad Keshavarz, Domenic Forte, Mark M. Tehranipoor, Daniel E. Holcomb:
Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs. IEEE Trans. Very Large Scale Integr. Syst. 26(11): 2431-2442 (2018) - [c162]Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark M. Tehranipoor, Domenic Forte:
A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks. AsianHOST 2018: 98-103 - [c160]Jungmin Park, Xiaolin Xu, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
Power-based side-channel instruction-level disassembler. DAC 2018: 119:1-119:6 - [c155]Andrew Stern, Ulbert Botero, Bicky Shakya, Hao-Ting Shen, Domenic Forte, Mark M. Tehranipoor:
EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs. ITC 2018: 1-9 - [i5]Adib Nahiyan, Mehdi Sadi, Rahul Vittal, Gustavo K. Contreras, Domenic Forte, Mark M. Tehranipoor:
Hardware Trojan Detection through Information Flow Security Verification. CoRR abs/1803.04102 (2018) - [i4]Nima Karimian, Zimu Guo, Fatemeh Tehranipoor, Damon L. Woodard, Mark M. Tehranipoor, Domenic Forte:
Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT. CoRR abs/1803.09710 (2018) - [i3]Bashir M. Sabquat Bahar Talukder, Biswajit Ray, Mark M. Tehranipoor, Domenic Forte, Md. Tauhidur Rahman:
LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. CoRR abs/1808.02584 (2018) - 2017
- [j83]Huanyu Wang, Domenic Forte, Mark M. Tehranipoor, Qihang Shi:
Probing Attacks on Integrated Circuits: Challenges and Research Opportunities. IEEE Des. Test 34(5): 63-71 (2017) - [j80]Bicky Shakya, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Benchmarking of Hardware Trojans and Maliciously Affected Circuits. J. Hardw. Syst. Secur. 1(1): 85-102 (2017) - [j79]Md. Tauhidur Rahman, Alison Hosey, Zimu Guo, Jackson Carroll, Domenic Forte, Mark M. Tehranipoor:
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation. J. Hardw. Syst. Secur. 1(2): 137-155 (2017) - [j77]Nima Karimian, Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Highly Reliable Key Generation From Electrocardiogram (ECG). IEEE Trans. Biomed. Eng. 64(6): 1400-1411 (2017) - [j74]Ujjwal Guin, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor:
SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware. IEEE Trans. Dependable Secur. Comput. 14(3): 265-278 (2017) - [j72]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain. ACM Trans. Design Autom. Electr. Syst. 22(3): 42:1-42:31 (2017) - [j71]Zimu Guo, Jia Di, Mark M. Tehranipoor, Domenic Forte:
Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering. ACM Trans. Design Autom. Electr. Syst. 22(3): 54:1-54:31 (2017) - [j68]Hao-Ting Shen, Fahim Rahman, Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Poly-Si-Based Physical Unclonable Functions. IEEE Trans. Very Large Scale Integr. Syst. 25(11): 3207-3217 (2017) - [j66]Fahim Rahman, Bicky Shakya, Xiaolin Xu, Domenic Forte, Mark M. Tehranipoor:
Security Beyond CMOS: Fundamentals, Applications, and Roadmap. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3420-3433 (2017) - [c152]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
MPA: Model-assisted PCB attestation via board-level RO and temperature compensation. AsianHOST 2017: 25-30 - [c151]Kun Yang, Ulbert Botero, Hao-Ting Shen, Domenic Forte, Mark M. Tehranipoor:
A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security. AsianHOST 2017: 61-66 - [c149]Gustavo K. Contreras, Adib Nahiyan, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor:
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. ASP-DAC 2017: 617-622 - [c148]Nima Karimian, Mark M. Tehranipoor, Domenic Forte:
Non-fiducial PPG-based authentication for healthcare application. BHI 2017: 429-432 - [c147]Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark M. Tehranipoor:
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. CCS 2017: 1533-1546 - [c145]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. CHES 2017: 189-210 - [c144]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
FFD: A Framework for Fake Flash Detection. DAC 2017: 8:1-8:6 - [c143]Qihang Shi, Kan Xiao, Domenic Forte, Mark M. Tehranipoor:
Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication. ACM Great Lakes Symposium on VLSI 2017: 339-344 - [c142]Sarah Amir, Bicky Shakya, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Comparative Analysis of Hardware Obfuscation for IP Protection. ACM Great Lakes Symposium on VLSI 2017: 363-368 - [c141]Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. HOST 2017: 140-145 - [c140]Nima Karimian, Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Human recognition from photoplethysmography (PPG) based on non-fiducial features. ICASSP 2017: 4636-4640 - [c138]Adib Nahiyan, Mehdi Sadi, Rahul Vittal, Gustavo K. Contreras, Domenic Forte, Mark M. Tehranipoor:
Hardware trojan detection through information flow security verification. ITC 2017: 1-10 - [c134]Sreeja Chowdhury, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Aging resilient RO PUF with increased reliability in FPGA. ReConFig 2017: 1-7 - [i2]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks. IACR Cryptol. ePrint Arch. 2017: 621 (2017) - 2016
- [j64]Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John A. Chandy, Mark M. Tehranipoor:
A Survey on Chip to System Reverse Engineering. ACM J. Emerg. Technol. Comput. Syst. 13(1): 6:1-6:34 (2016) - [j63]Md. Tauhidur Rahman, Fahim Rahman, Domenic Forte, Mark M. Tehranipoor:
An Aging-Resistant RO-PUF for Reliable Key Generation. IEEE Trans. Emerg. Top. Comput. 4(3): 335-348 (2016) - [j59]Ujjwal Guin, Qihang Shi, Domenic Forte, Mark M. Tehranipoor:
FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs. ACM Trans. Design Autom. Electr. Syst. 21(4): 63:1-63:20 (2016) - [j58]Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, Mark M. Tehranipoor:
Hardware Trojans: Lessons Learned after One Decade of Research. ACM Trans. Design Autom. Electr. Syst. 22(1): 6:1-6:23 (2016) - [j57]Ujjwal Guin, Domenic Forte, Mark M. Tehranipoor:
Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling. IEEE Trans. Very Large Scale Integr. Syst. 24(4): 1233-1246 (2016) - [c132]Adib Nahiyan, Kan Xiao, Kun Yang, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs. DAC 2016: 89:1-89:6 - [c131]Thao Le, Jia Di, Mark M. Tehranipoor, Domenic Forte, Lei Wang:
Tracking Data Flow at Gate-Level through Structural Checking. ACM Great Lakes Symposium on VLSI 2016: 185-189 - [c130]Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Aging attacks for key extraction on permutation-based obfuscation. AsianHOST 2016: 1-6 - [c129]Md. Tauhidur Rahman, Domenic Forte, Xiaoxiao Wang, Mark M. Tehranipoor:
Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs. AsianHOST 2016: 1-6 - [c128]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
UCR: An unclonable chipless RFID tag. HOST 2016: 7-12 - [c127]Qihang Shi, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor:
A layout-driven framework to assess vulnerability of ICs to microprobing attacks. HOST 2016: 155-160 - [c126]Zimu Guo, Md. Tauhidur Rahman, Mark M. Tehranipoor, Domenic Forte:
A zero-cost approach to detect recycled SoC chips using embedded SRAM. HOST 2016: 191-196 - [c125]Bicky Shakya, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor:
Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication. ICCAD 2016: 30 - [c123]Zimu Guo, Nima Karimian, Mark M. Tehranipoor, Domenic Forte:
Hardware security meets biometrics for the age of IoT. ISCAS 2016: 1318-1321 - [c120]Hao-Ting Shen, Fahim Rahman, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs). ISVLSI 2016: 188-193 - [c119]Md. Mahbub Alam, Mark M. Tehranipoor, Domenic Forte:
Recycled FPGA detection using exhaustive LUT path delay characterization. ITC 2016: 1-10 - [c117]Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A stochastic approach to analog physical unclonable function. MWSCAS 2016: 1-4 - 2015
- [c111]Zimu Guo, Mark M. Tehranipoor, Domenic Forte, Jia Di:
Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. DAC 2015: 114:1-114:6 - [c110]Shuai Chen, Junlin Chen, Domenic Forte, Jia Di, Mark M. Tehranipoor, Lei Wang:
Chip-level anti-reverse engineering using transformable interconnects. DFTS 2015: 109-114 - [c107]Kan Xiao, Domenic Forte, Mark M. Tehranipoor:
Efficient and secure split manufacturing via obfuscated built-in self-authentication. HOST 2015: 14-19 - [c106]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
Protecting Endpoint Devices in IoT Supply Chain. ICCAD 2015: 351-356 - [c105]Bicky Shakya, Ujjwal Guin, Mark M. Tehranipoor, Domenic Forte:
Performance optimization for on-chip sensors to detect recycled ICs. ICCD 2015: 289-295 - [c104]Md. Tauhidur Rahman, Domenic Forte, Fahim Rahman, Mark M. Tehranipoor:
A pair selection algorithm for robust RO-PUF against environmental variations and aging. ICCD 2015: 415-418 - [c102]Bicky Shakya, Fahim Rahman, Mark M. Tehranipoor, Domenic Forte:
Harnessing Nanoscale Device Properties for Hardware Security. MTV 2015: 42-47 - [c101]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices. RFIDSec 2015: 32-49 - 2014
- [j45]Kan Xiao, Domenic Forte, Mohammad Tehranipoor:
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12): 1778-1791 (2014) - [c98]Alison Hosey, Md. Tauhidur Rahman, Kan Xiao, Domenic Forte, Mohammad Tehranipoor:
Advanced Analysis of Cell Stability for Reliable SRAM PUFs. ATS 2014: 348-353 - [c97]Ujjwal Guin, Xuehui Zhang, Domenic Forte, Mohammad Tehranipoor:
Low-cost On-Chip Structures for Combating Die and IC Recycling. DAC 2014: 87:1-87:6 - [c96]Md. Tauhidur Rahman, Kan Xiao, Domenic Forte, Xuhei Zhang, Zhijie Jerry Shi, Mohammad Tehranipoor:
TI-TRNG: Technology Independent True Random Number Generator. DAC 2014: 179:1-179:6 - [c94]Md. Tauhidur Rahman, Domenic Forte, Jim Fahrny, Mohammad Tehranipoor:
ARO-PUF: An aging-resistant ring oscillator PUF design. DATE 2014: 1-6 - [c93]Md. Tauhidur Rahman, Domenic Forte, Quihang Shi, Gustavo K. Contreras, Mark Mohammad Tehranipoor:
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. DFT 2014: 46-51 - [c92]Halit Dogan, Domenic Forte, Mark Mohammad Tehranipoor:
Aging analysis for recycled FPGA detection. DFT 2014: 171-176 - [c90]Kan Xiao, Md. Tauhidur Rahman, Domenic Forte, Yu Huang, Mei Su, Mohammad Tehranipoor:
Bit selection algorithm suitable for high-volume production of SRAM-PUF. HOST 2014: 101-106 - [c88]Md. Tauhidur Rahman, Domenic Forte, Quihang Shi, Gustavo K. Contreras, Mohammad Tehranipoor:
CSST: An Efficient Secure Split-Test for Preventing IC Piracy. NATW 2014: 43-47 - [c86]Mohammad Tehranipoor, Domenic Forte:
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs. VLSID 2014: 9-10 - 2013
- [c75]Ujjwal Guin, Domenic Forte, Mohammad Tehranipoor:
Anti-counterfeit Techniques: From Design to Resign. MTV 2013: 89-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 16:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint