default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2024
- Tanvir Hossain, Matthew Showers, Mahmudul Hasan, Tamzidul Hoque:
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor. CoRR abs/2402.09701 (2024) - 2023
- Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing. ACM J. Emerg. Technol. Comput. Syst. 19(3): 25:1-25:23 (2023) - Aritra Bhattacharyay, Shuo Yang, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
An Automated Framework for Board-Level Trojan Benchmarking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(2): 397-410 (2023) - Ashutosh Ghimire, Fathi H. Amsaad, Tamzidul Hoque, Kenneth M. Hopkinson, Md. Tauhidur Rahman:
Unsupervised IC Security with Machine Learning for Trojan Detection. MWSCAS 2023: 20-24 - 2022
- Abdulrahman Alaql, Saranyu Chattopadhyay, Prabuddha Chakraborty, Tamzidul Hoque, Swarup Bhunia:
LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4): 854-867 (2022) - Mahmudul Hasan, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Trojan Resilient Computing in COTS Processors Under Zero Trust. IEEE Trans. Very Large Scale Integr. Syst. 30(10): 1412-1424 (2022) - Shuo Yang, Tamzidul Hoque, Prabuddha Chakraborty, Swarup Bhunia:
Golden-Free Hardware Trojan Detection Using Self-Referencing. IEEE Trans. Very Large Scale Integr. Syst. 30(3): 325-338 (2022) - Mahmudul Hasan, Tamzidul Hoque:
KEATON: Assertion-guided Attack on Combinational and Sequential Locking without Scan Access. AsianHOST 2022: 1-6 - Xingyu Meng, Mahmudul Hasan, Kanad Basu, Tamzidul Hoque:
A Semi-formal Information Flow Validation for Analyzing Secret Asset Propagation in COTS IC Integrated Systems. ACM Great Lakes Symposium on VLSI 2022: 417-422 - 2021
- Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing. CoRR abs/2111.14956 (2021) - Mahmudul Hasan, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Software Variants for Hardware Trojan Detection and Resilience in COTS Processors. CoRR abs/2112.00304 (2021) - 2020
- Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in Microelectronics: The Concerns and the Countermeasures. IEEE Consumer Electron. Mag. 9(6): 72-83 (2020) - Tamzidul Hoque, Rajat Subhra Chakraborty, Swarup Bhunia:
Hardware Obfuscation and Logic Locking: A Tutorial Introduction. IEEE Des. Test 37(3): 59-77 (2020) - Tamzidul Hoque, Kai Yang, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(1): 4:1-4:32 (2020) - Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in COTS: The Challenges and Emerging Solution. ACM Great Lakes Symposium on VLSI 2020: 211-216 - Prabuddha Chakraborty, Robert Parker, Tamzidul Hoque, Jonathan Cruz, Swarup Bhunia:
P2C2: Peer-to-Peer Car Charging. VTC Spring 2020: 1-5 - Tamzidul Hoque, Shuo Yang, Aritra Bhattacharyay, Jonathan Cruz, Swarup Bhunia:
An Automated Framework for Board-level Trojan Benchmarking. CoRR abs/2003.12632 (2020) - 2019
- Shuo Yang, Abdulrahman Alaql, Tamzidul Hoque, Swarup Bhunia:
Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint. ICCE 2019: 1-6 - Abdulrahman Alaql, Tamzidul Hoque, Domenic Forte, Swarup Bhunia:
Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection. VTS 2019: 1-6 - Hassan Salmani, Tamzidul Hoque, Swarup Bhunia, Muhammad Yasin, Jeyavijayan (JV) Rajendran, Naghmeh Karimi:
Special Session: Countering IP Security threats in Supply chain. VTS 2019: 1-9 - Atul Prasad Deb Nath, Tamzidul Hoque, Sandip Ray, Swarup Bhunia:
An Adaptable System-on-Chip Security Architecture for Internet of Things Applications. Security and Fault Tolerance in Internet of Things 2019: 61-85 - 2018
- Tamzidul Hoque, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia:
Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify. ITC 2018: 1-10 - Tamzidul Hoque, Xinmu Wang, Abhishek Basak, Robert Karam, Swarup Bhunia:
Hardware Trojan attacks in embedded memory. VTS 2018: 1-6 - 2017
- Tamzidul Hoque, Seetharam Narasimhan, Xinmu Wang, Sanchita Mal-Sarkar, Swarup Bhunia:
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise. J. Electron. Test. 33(1): 107-124 (2017) - Robert Karam, Tamzidul Hoque, Kevin R. B. Butler, Swarup Bhunia:
Mixed-granular architectural diversity for device security in the Internet of Things. AsianHOST 2017: 73-78 - Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
MUTARCH: Architectural diversity for FPGA device and IP security. ASP-DAC 2017: 611-616 - 2016
- Sandip Ray, Tamzidul Hoque, Abhishek Basak, Swarup Bhunia:
The power play: Security-energy trade-offs in the IoT regime. ICCD 2016: 690-693 - Steven Paley, Tamzidul Hoque, Swarup Bhunia:
Active protection against PCB physical tampering. ISQED 2016: 356-361 - Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Technical demonstration session: Software toolflow for FPGA bitstream obfuscation. ReConFig 2016: 1-2 - Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation. ReConFig 2016: 1-8
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-17 20:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint