Hardware trojans: Lessons learned after one decade of research K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016 | 476 | 2016 |
A survey on chip to system reverse engineering SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ... ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016 | 268 | 2016 |
Benchmarking of hardware trojans and maliciously affected circuits B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor Journal of Hardware and Systems Security 1, 85-102, 2017 | 258 | 2017 |
Counterfeit integrated circuits M Tehranipoor, U Guin, D Forte, M Tehranipoor, U Guin, D Forte Counterfeit Integrated Circuits: Detection and Avoidance, 15-36, 2015 | 217 | 2015 |
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks X Xu, B Shakya, MM Tehranipoor, D Forte Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 197 | 2017 |
On reverse engineering-based hardware Trojan detection C Bao, D Forte, A Srivastava IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 158 | 2015 |
On application of one-class SVM to reverse engineering-based hardware Trojan detection C Bao, D Forte, A Srivastava Fifteenth International Symposium on Quality Electronic Design, 47-54, 2014 | 156 | 2014 |
Temperature tracking: An innovative run-time approach for hardware Trojan detection D Forte, C Bao, A Srivastava 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 532-539, 2013 | 150 | 2013 |
Bit selection algorithm suitable for high-volume production of SRAM-PUF K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor 2014 IEEE international symposium on hardware-oriented security and trust …, 2014 | 149 | 2014 |
An aging-resistant RO-PUF for reliable key generation MT Rahman, F Rahman, D Forte, M Tehranipoor IEEE Transactions on Emerging Topics in Computing 4 (3), 335-348, 2015 | 139 | 2015 |
ARO-PUF: An aging-resistant ring oscillator PUF design MT Rahman, D Forte, J Fahrny, M Tehranipoor 2014 design, automation & test in Europe conference & exhibition (DATE), 1-6, 2014 | 124 | 2014 |
A novel built-in self-authentication technique to prevent inserting hardware trojans K Xiao, D Forte, M Tehranipoor IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014 | 113 | 2014 |
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 109 | 2016 |
Anti-counterfeit techniques: From design to resign U Guin, D Forte, M Tehranipoor 2013 14th International workshop on microprocessor test and verification, 89-94, 2013 | 104 | 2013 |
Highly reliable key generation from electrocardiogram (ECG) N Karimian, Z Guo, M Tehranipoor, D Forte IEEE Transactions on Biomedical Engineering 64 (6), 1400-1411, 2016 | 95 | 2016 |
Memristor PUF—A security primitive: Theory and experiment A Mazady, MT Rahman, D Forte, M Anwar IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5 (2 …, 2015 | 95 | 2015 |
Low-cost on-chip structures for combating die and IC recycling U Guin, X Zhang, D Forte, M Tehranipoor Proceedings of the 51st annual design automation conference, 1-6, 2014 | 93 | 2014 |
Efficient and secure split manufacturing via obfuscated built-in self-authentication K Xiao, D Forte, MM Tehranipoor 2015 IEEE International symposium on hardware oriented security and trust …, 2015 | 91 | 2015 |
Aging analysis for recycled FPGA detection H Dogan, D Forte, MM Tehranipoor 2014 IEEE international symposium on defect and fault tolerance in VLSI and …, 2014 | 91 | 2014 |
Hardware protection through obfuscation D Forte, S Bhunia, MM Tehranipoor Springer International Publishing, 2017 | 90 | 2017 |