Mark M. Tehranipoor
Mark M. Tehranipoor
Intel Charles E. Young Endowed Chair Professor, ECE, University of Florida
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey of hardware trojan taxonomy and detection
M Tehranipoor, F Koushanfar
IEEE design & test of computers 27 (1), 10-25, 2010
12682010
Trustworthy hardware: Identifying and classifying hardware trojans
R Karri, J Rajendran, K Rosenfeld, M Tehranipoor
Computer 43 (10), 39-46, 2010
5182010
Detecting malicious inclusions in secure hardware: Challenges and solutions
X Wang, M Tehranipoor, J Plusquellic
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 15-19, 2008
4022008
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
U Guin, K Huang, D DiMase, JM Carulli, M Tehranipoor, Y Makris
Proceedings of the IEEE 102 (8), 1207-1228, 2014
3912014
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
3752011
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
2852016
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (1), 112-125, 2011
2832011
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
2442008
Editors¿ Introduction, Beyond Global Discourse: The Rediscovery of Culture in Environmental Politics
MA Hajer
OxfordOxford University Press, 2003
219*2003
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 67-70, 2011
2112011
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
RM Rad, X Wang, M Tehranipoor, J Plusquellic
2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639, 2008
2102008
Sensitivity analysis to hardware Trojans using power supply transient signals
R Rad, J Plusquellic, M Tehranipoor
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 3-7, 2008
1922008
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
U Guin, D DiMase, M Tehranipoor
Journal of Electronic Testing 30 (1), 9-23, 2014
1912014
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
1782016
Nine-coded compression technique for testing embedded cores in SoCs
M Tehranipoor, M Nourani, K Chakrabarty
IEEE transactions on very large scale integration (VLSI) systems 13 (6), 719-731, 2005
1782005
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
1762013
RL-Huffman encoding for test compression and power reduction in scan applications
M Nourani, MH Tehranipour
ACM Transactions on Design Automation of Electronic Systems (TODAES) 10 (1 …, 2005
1692005
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009
1682009
A low-cost solution for protecting IPs against scan-based side-channel attacks
J Lee, M Tebranipoor, J Plusquellic
24th IEEE VLSI Test Symposium, 6 pp.-99, 2006
1672006
Counterfeit integrated circuits
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 15-36, 2015
1582015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20