Navid Asadi
Navid Asadi
Verified email at ece.ufl.edu - Homepage
Title
Cited by
Cited by
Year
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
1672016
Quality control and authentication of packaged integrated circuits using enhanced-spatial-resolution terahertz time-domain spectroscopy and imaging
K Ahi, S Shahbazmohamadi, N Asadizanjani
Optics and Lasers in Engineering 104, 274-284, 2018
1142018
Terahertz characterization of electronic components and comparison of terahertz imaging with X-ray imaging techniques
K Ahi, N Asadizanjani, S Shahbazmohamadi, M Tehranipoor, M Anwar
SPIE Sensing Technology+ Applications, 2015
572015
Pcb reverse engineering using nondestructive x-ray tomography and advanced image processing
N Asadizanjani, M Tehranipoor, D Forte
IEEE Transactions on Components, Packaging and Manufacturing Technology 7 (2 …, 2017
372017
The key is left under the mat: On the inappropriate security assumption of logic locking schemes
MT Rahman, S Tajik, MS Rahman, M Tehranipoor, N Asadizanjani
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
292020
Non-destructive PCB reverse engineering using X-ray micro computed tomography
N Asadizanjani, S Shahbazmohamadi, M Tehranipoor, D Forte
41st International symposium for testing and failure analysis, ASM, 1-5, 2015
262015
Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning
N Vashistha, H Lu, Q Shi, MT Rahman, H Shen, DL Woodard, ...
ISTFA 2018: Proceedings from the 44th International Symposium for Testing …, 2018
252018
Defense-in-depth: A recipe for logic locking to prevail
MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil, F Farahmandi, ...
Integration 72, 39-57, 2020
242020
Counterfeit electronics detection using image processing and machine learning
N Asadizanjani, M Tehranipoor, D Forte
Journal of physics: conference series 787 (1), 012023, 2017
212017
Physical inspection & attacks: New frontier in hardware security
MT Rahman, Q Shi, S Tajik, H Shen, DL Woodard, M Tehranipoor, ...
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 93-102, 2018
202018
Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication
B Shakya, N Asadizanjani, D Forte, M Tehranipoor
Proceedings of the 35th International Conference on Computer-Aided Design, 1-8, 2016
192016
A layout-driven framework to assess vulnerability of ICs to microprobing attacks
Q Shi, N Asadizanjani, D Forte, MM Tehranipoor
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
192016
Nanopyramid: An optical scrambler against backside probing attacks
H Shen, N Asadizanjani, M Tehranipoor, D Forte
ISTFA 2018: Proceedings from the 44th International Symposium for Testing …, 2018
182018
Steps toward automated deprocessing of integrated circuits
EL Principe, N Asadizanjani, D Forte, M Tehranipoor, R Chivas, ...
ISTFA 2017: Proceedings from the 43rd International Symposium for Testing …, 2017
162017
Investigation of Surface Geometry Thermal Barrier Coatings using Computed X‐Ray Tomography
N Asadizanjani, S Shahbazmohamadi, EH Jordan
Developments in Strategic Materials and Computational Design V: A Collection …, 2014
162014
Investigation of Surface Geometry Thermal Barrier Coatings using Computed X‐Ray Tomography
N Asadizanjani, S Shahbazmohamadi, EH Jordan
Developments in Strategic Materials and Computational Design V: A Collection …, 2014
162014
Hardware trust and assurance through reverse engineering: A survey and outlook from image analysis and machine learning perspectives
UJ Botero, R Wilson, H Lu, MT Rahman, MA Mallaiyan, F Ganji, ...
arXiv preprint arXiv:2002.04210, 2020
152020
Flower-like boehmite nanostructure formation in two-steps
N Zanganeh, S Zanganeh, A Rajabi, M Allahkarami, ...
Journal of Coordination Chemistry 67 (3), 555-562, 2014
142014
Detecting hardware trojans inserted by untrusted foundry using physical inspection and advanced image processing
N Vashistha, MT Rahman, H Shen, DL Woodard, N Asadizanjani, ...
Journal of Hardware and Systems Security 2 (4), 333-344, 2018
112018
THZ Techniques: A Promising Platform for Authentication of Electronic Components
K Ahi, N Asadizanjani, S Shahbazmohamadi, M Tehranipoor, M Anwar
CHASE Conf. Trust. Syst. Supply Chain Assur., Storrs, Connecticut, USA, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20