Остановите войну!
for scientists:
default search action
Domenic Forte
- > Home > Persons > Domenic Forte
Publications
- 2024
- [c99]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. ACNS (3) 2024: 325-354 - [i23]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Cryptol. ePrint Arch. 2024: 72 (2024) - 2023
- [j75]David Selasi Koblah, Ulbert J. Botero, Sean P. Costello, Olivia P. Dizon-Paradis, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images. ACM J. Emerg. Technol. Comput. Syst. 19(4): 34:1-34:20 (2023) - [j70]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
Information Theory-based Evolution of Neural Networks for Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 401-437 (2023) - [j69]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. ACM Trans. Design Autom. Electr. Syst. 28(2): 16:1-16:57 (2023) - [i22]Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte:
Quantization-aware Neural Architectural Search for Intrusion Detection. CoRR abs/2311.04194 (2023) - [i21]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. IACR Cryptol. ePrint Arch. 2023: 1 (2023) - [i20]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. IACR Cryptol. ePrint Arch. 2023: 76 (2023) - 2022
- [j65]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical security in the post-quantum era. J. Cryptogr. Eng. 12(3): 267-303 (2022) - [c86]David Selasi Koblah, Fatemeh Ganji, Domenic Forte, Shahin Tajik:
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities. MTD@CCS 2022: 25-36 - [c84]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. ICCAD 2022: 156:1-156:9 - [c80]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation. SPACE 2022: 225-248 - [i19]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. CoRR abs/2204.09579 (2022) - [i18]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation. CoRR abs/2208.03806 (2022) - [i17]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. CoRR abs/2208.03822 (2022) - 2021
- [j61]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j59]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives. ACM J. Emerg. Technol. Comput. Syst. 17(4): 62:1-62:53 (2021) - [j58]Sumaiya Shomaji, Zimu Guo, Fatemeh Ganji, Nima Karimian, Damon L. Woodard, Domenic Forte:
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person. J. Hardw. Syst. Secur. 5(3): 223-236 (2021) - [j56]Sumaiya Shomaji, Pallabi Ghosh, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems. IEEE Trans. Inf. Forensics Secur. 16: 5294-5309 (2021) - [c77]Rabin Yu Acharya, Noeloikeau F. Charlot, Md. Mahbub Alam, Fatemeh Ganji, Daniel J. Gauthier, Domenic Forte:
Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm. ISQED 2021: 426-431 - [i16]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis. CoRR abs/2105.00117 (2021) - [i15]Ana Covic, Fatemeh Ganji, Domenic Forte:
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners. CoRR abs/2106.12714 (2021) - 2020
- [j51]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Recycled SoC Detection Using LDO Degradation. SN Comput. Sci. 1(6): 312 (2020) - [c74]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c73]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. HOST 2020: 284-294 - [c71]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Low-Cost Remarked Counterfeit IC Detection using LDO Regulators. ISCAS 2020: 1-5 - [i14]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil Azhagan Mallaiyan Sathiaseelan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives. CoRR abs/2002.04210 (2020) - [i13]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. CoRR abs/2003.13904 (2020) - [i11]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions. CoRR abs/2005.04344 (2020) - 2019
- [j41]Fatemeh Ganji, Domenic Forte, Jean-Pierre Seifert:
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks. IEEE Access 7: 122513-122521 (2019) - [c67]Sumaiya Shomaji, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems. BTAS 2019: 1-8 - [c65]Md. Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark M. Tehranipoor, Domenic Forte:
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions. FDTC 2019: 48-55 - [c63]Sreeja Chowdhury, Fatemeh Ganji, Troy Bryant, Nima Maghari, Domenic Forte:
Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation. ITC 2019: 1-10 - [c61]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [i7]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i6]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint