Folgen
Mark M. Tehranipoor
Mark M. Tehranipoor
Intel Charles E. Young Endowed Chair Professor, ECE, University of Florida
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey of hardware trojan taxonomy and detection
M Tehranipoor, F Koushanfar
IEEE design & test of computers 27 (1), 10-25, 2010
13882010
Trustworthy hardware: Identifying and classifying hardware trojans
R Karri, J Rajendran, K Rosenfeld, M Tehranipoor
Computer 43 (10), 39-46, 2010
5492010
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
U Guin, K Huang, D DiMase, JM Carulli, M Tehranipoor, Y Makris
Proceedings of the IEEE 102 (8), 1207-1228, 2014
4652014
Detecting malicious inclusions in secure hardware: Challenges and solutions
X Wang, M Tehranipoor, J Plusquellic
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 15-19, 2008
4252008
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
4232011
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
3582016
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20 (1), 112-125, 2011
3062011
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
2542008
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 67-70, 2011
2352011
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
U Guin, D DiMase, M Tehranipoor
Journal of Electronic Testing 30 (1), 9-23, 2014
2162014
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
RM Rad, X Wang, M Tehranipoor, J Plusquellic
2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639, 2008
2162008
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
2062013
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
2052016
Sensitivity analysis to hardware Trojans using power supply transient signals
R Rad, J Plusquellic, M Tehranipoor
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 3-7, 2008
2052008
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1 (1), 85-102, 2017
1832017
Nine-coded compression technique for testing embedded cores in SoCs
M Tehranipoor, M Nourani, K Chakrabarty
IEEE transactions on very large scale integration (VLSI) systems 13 (6), 719-731, 2005
1792005
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009
1762009
A low-cost solution for protecting IPs against scan-based side-channel attacks
J Lee, M Tebranipoor, J Plusquellic
24th IEEE VLSI Test Symposium, 6 pp.-99, 2006
1762006
Counterfeit integrated circuits
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 15-36, 2015
1752015
Securing designs against scan-based side-channel attacks
J Lee, M Tehranipoor, C Patel, J Plusquellic
IEEE transactions on dependable and secure computing 4 (4), 325-336, 2007
1672007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20