default search action
Kaveh Shamsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j10]Rajesh Datta, Guangwei Zhao, Kanad Basu, Kaveh Shamsi:
A Security Analysis of Circuit Clock Obfuscation. Cryptogr. 6(3): 43 (2022) - [j9]Guangwei Zhao, Kaveh Shamsi:
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation. Cryptogr. 6(4): 60 (2022) - 2021
- [j8]Kaveh Shamsi, Yier Jin:
In Praise of Exact-Functional-Secrecy in Circuit Locking. IEEE Trans. Inf. Forensics Secur. 16: 5225-5238 (2021) - 2019
- [j7]Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, David Z. Pan:
Provably Secure Camouflaging Strategy for IC Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(8): 1399-1412 (2019) - [j6]Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu:
On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(10): 1820-1830 (2019) - [j5]Kaveh Shamsi, Travis Meade, Meng Li, David Z. Pan, Yier Jin:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. IEEE Trans. Inf. Forensics Secur. 14(2): 347-359 (2019) - [j4]Kaveh Shamsi, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, Yier Jin:
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview. ACM Trans. Design Autom. Electr. Syst. 24(6): 65:1-65:36 (2019) - 2018
- [j3]Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin:
The Old Frontier of Reverse Engineering: Netlist Partitioning. J. Hardw. Syst. Secur. 2(3): 201-213 (2018) - 2017
- [j2]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael T. Niemier, Xiaobo Sharon Hu:
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs. IEEE Trans. Emerg. Top. Comput. 5(3): 340-352 (2017) - 2016
- [j1]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, Xiaobo Sharon Hu, Michael T. Niemier, Yier Jin:
Emerging Technology-Based Design of Primitives for Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 13(1): 3:1-3:19 (2016)
Conference and Workshop Papers
- 2024
- [c22]Rajesh Kumar Datta, Guangwei Zhao, Dipali Jain, Kaveh Shamsi:
On Hardware Trojan Detection using Oracle-Guided Circuit Learning. ACM Great Lakes Symposium on VLSI 2024: 198-203 - 2023
- [c21]Kaveh Shamsi, Rajesh Kumar Datta:
TIPLock: Key-Compressed Logic Locking using Through-Input-Programmable Lookup-Tables. DATE 2023: 1-2 - [c20]Kaveh Shamsi, Guangwei Zhao:
Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning. ACM Great Lakes Symposium on VLSI 2023: 345-350 - 2022
- [c19]Guangwei Zhao, Kaveh Shamsi:
Graph Neural Network based Netlist Operator Detection under Circuit Rewriting. ACM Great Lakes Symposium on VLSI 2022: 53-58 - [c18]Kaveh Shamsi, Guangwei Zhao:
An Oracle-Less Machine-Learning Attack against Lookup-Table-based Logic Locking. ACM Great Lakes Symposium on VLSI 2022: 133-137 - 2021
- [c17]Kaveh Shamsi, Yier Jin:
Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT. ICCAD 2021: 1-9 - 2019
- [c16]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin:
KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. DATE 2019: 534-539 - [c15]Kaveh Shamsi, David Z. Pan, Yier Jin:
On the Impossibility of Approximation-Resilient Circuit Locking. HOST 2019: 161-170 - [c14]Kaveh Shamsi, David Z. Pan, Yier Jin:
IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits. ICCAD 2019: 1-7 - 2018
- [c13]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin:
Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures. ACM Great Lakes Symposium on VLSI 2018: 147-152 - [c12]Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu:
R2D2: Runtime reassurance and detection of A2 Trojan. HOST 2018: 195-200 - [c11]Meng Li, Kaveh Shamsi, Yier Jin, David Z. Pan:
TimingSAT: Decamouflaging Timing-based Logic Obfuscation. ITC 2018: 1-10 - 2017
- [c10]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
Cyclic Obfuscation for Creating SAT-Unresolvable Circuits. ACM Great Lakes Symposium on VLSI 2017: 173-178 - [c9]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail? ACM Great Lakes Symposium on VLSI 2017: 357-362 - [c8]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
AppSAT: Approximately deobfuscating integrated circuits. HOST 2017: 95-100 - 2016
- [c7]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, François-Xavier Standaert, Yier Jin:
Leverage Emerging Technologies For DPA-Resilient Block Cipher Design. DATE 2016: 1538-1543 - [c6]Yu Bi, Xiaobo Sharon Hu, Yier Jin, Michael T. Niemier, Kaveh Shamsi, Xunzhao Yin:
Enhancing Hardware Security with Emerging Transistor Technologies. ACM Great Lakes Symposium on VLSI 2016: 305-310 - [c5]Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, David Z. Pan:
Provably secure camouflaging strategy for IC protection. ICCAD 2016: 28 - [c4]Kelvin Ly, Orlando Arias, Jacob Wurm, Khoa Hoang, Kaveh Shamsi, Yier Jin:
Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform. ICCD 2016: 149-152 - [c3]Kaveh Shamsi, Wujie Wen, Yier Jin:
Hardware Security Challenges Beyond CMOS: Attacks and Remedies. ISVLSI 2016: 200-205 - [c2]Kaveh Shamsi, Yier Jin:
Security of emerging non-volatile memories: Attacks and defenses. VTS 2016: 1-4 - 2015
- [c1]Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael T. Niemier, Xiaobo Sharon Hu:
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices. ICCD 2015: 343-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint