Mark M. Tehranipoor
Mark M. Tehranipoor
Intel Charles E. Young Endowed Chair Professor, ECE, University of Florida
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey of hardware trojan taxonomy and detection
M Tehranipoor, F Koushanfar
IEEE design & test of computers 27 (1), 10-25, 2010
11022010
Trustworthy hardware: Identifying and classifying hardware trojans
R Karri, J Rajendran, K Rosenfeld, M Tehranipoor
Computer 43 (10), 39-46, 2010
4612010
Detecting malicious inclusions in secure hardware: Challenges and solutions
X Wang, M Tehranipoor, J Plusquellic
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 15-19, 2008
3742008
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
3272011
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
U Guin, K Huang, D DiMase, JM Carulli, M Tehranipoor, Y Makris
Proceedings of the IEEE 102 (8), 1207-1228, 2014
3132014
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (1), 112-125, 2011
2422011
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
2262008
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
2192016
Editors¿ Introduction, Beyond Global Discourse: The Rediscovery of Culture in Environmental Politics
MA Hajer
OxfordOxford University Press, 2003
198*2003
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
RM Rad, X Wang, M Tehranipoor, J Plusquellic
2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639, 2008
1932008
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 67-70, 2011
1882011
Sensitivity analysis to hardware Trojans using power supply transient signals
R Rad, J Plusquellic, M Tehranipoor
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 3-7, 2008
1762008
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
U Guin, D DiMase, M Tehranipoor
Journal of Electronic Testing 30 (1), 9-23, 2014
1672014
Nine-coded compression technique for testing embedded cores in SoCs
M Tehranipoor, M Nourani, K Chakrabarty
IEEE transactions on very large scale integration (VLSI) systems 13 (6), 719-731, 2005
1672005
RL-Huffman encoding for test compression and power reduction in scan applications
M Nourani, MH Tehranipour
ACM Transactions on Design Automation of Electronic Systems (TODAES) 10 (1 …, 2005
1602005
A low-cost solution for protecting IPs against scan-based side-channel attacks
J Lee, M Tebranipoor, J Plusquellic
24th IEEE VLSI Test Symposium, 6 pp.-99, 2006
1572006
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009
1492009
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
1382016
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
1372013
Securing designs against scan-based side-channel attacks
J Lee, M Tehranipoor, C Patel, J Plusquellic
IEEE transactions on dependable and secure computing 4 (4), 325-336, 2007
1342007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20