Domenic Forte
Domenic Forte
Associate Professor of ECE, University of Florida
Bestätigte E-Mail-Adresse bei ece.ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
2192016
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
1382016
Counterfeit integrated circuits
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 15-36, 2015
1312015
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
X Xu, B Shakya, MM Tehranipoor, D Forte
International conference on cryptographic hardware and embedded systems, 189-210, 2017
1022017
Temperature tracking: An innovative run-time approach for hardware Trojan detection
D Forte, C Bao, A Srivastava
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 532-539, 2013
972013
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1 (1), 85-102, 2017
932017
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
922014
On application of one-class SVM to reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
Fifteenth International Symposium on Quality Electronic Design, 47-54, 2014
862014
ARO-PUF: An aging-resistant ring oscillator PUF design
MT Rahman, D Forte, J Fahrny, M Tehranipoor
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
832014
An aging-resistant RO-PUF for reliable key generation
MT Rahman, F Rahman, D Forte, M Tehranipoor
IEEE Transactions on Emerging Topics in Computing 4 (3), 335-348, 2015
802015
Anti-counterfeit techniques: From design to resign
U Guin, D Forte, M Tehranipoor
2013 14th International workshop on microprocessor test and verification, 89-94, 2013
732013
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
672014
Memristor PUF—A security primitive: Theory and experiment
A Mazady, MT Rahman, D Forte, M Anwar
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5 (2 …, 2015
652015
On reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
622015
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
602016
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
602015
Low-cost on-chip structures for combating die and IC recycling
U Guin, X Zhang, D Forte, M Tehranipoor
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
522014
Temperature tracking: Toward robust run-time detection of hardware Trojans
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
502015
TI-TRNG: Technology independent true random number generator
MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
482014
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly
MT Rahman, D Forte, Q Shi, GK Contreras, M Tehranipoor
2014 IEEE International symposium on defect and fault tolerance in VLSI and …, 2014
472014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20