Kamu erişimi zorunlu olan makaleler - Kaveh ShamsiDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 3
TimingSAT: Decamouflaging timing-based logic obfuscation
M Li, K Shamsi, Y Jin, DZ Pan
2018 IEEE International Test Conference (ITC), 1-10, 2018
Zorunlu olanlar: US Department of Defense
On-chip analog trojan detection framework for microprocessor trustworthiness
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
Zorunlu olanlar: National Natural Science Foundation of China
In praise of exact-functional-secrecy in circuit locking
K Shamsi, Y Jin
IEEE Transactions on Information Forensics and Security 16, 5225-5238, 2021
Zorunlu olanlar: US Department of Energy, US Department of Defense
Bir yerde sunuluyor: 10
KC2: Key-condition crunching for fast sequential circuit deobfuscation
K Shamsi, M Li, DZ Pan, Y Jin
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019
Zorunlu olanlar: US Department of Defense
On the approximation resiliency of logic locking and IC camouflaging schemes
K Shamsi, T Meade, M Li, DZ Pan, Y Jin
IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018
Zorunlu olanlar: US Department of Defense
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
K Shamsi, M Li, DZ Pan, Y Jin
Proceedings of the 2018 Great Lakes Symposium on VLSI, 147-152, 2018
Zorunlu olanlar: US Department of Defense
On the impossibility of approximation-resilient circuit locking
K Shamsi, DZ Pan, Y Jin
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
Zorunlu olanlar: US Department of Defense
IcySAT: Improved SAT-based attacks on cyclic locked circuits
K Shamsi, DZ Pan, Y Jin
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2019
Zorunlu olanlar: US National Science Foundation, US Department of Defense
R2D2: Runtime reassurance and detection of A2 Trojan
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
Zorunlu olanlar: National Natural Science Foundation of China
The old frontier of reverse engineering: Netlist partitioning
T Meade, K Shamsi, T Le, J Di, S Zhang, Y Jin
Journal of Hardware and Systems Security 2, 201-213, 2018
Zorunlu olanlar: US National Science Foundation
Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning
K Shamsi, G Zhao
Proceedings of the Great Lakes Symposium on VLSI 2023, 345-350, 2023
Zorunlu olanlar: US National Science Foundation
TC-CPS Newsletter
L Wang, SK Khatamifard, UR Karpuzcu, S Köse, EOCP Delivery, ...
TC 4 (1), 2019
Zorunlu olanlar: US National Science Foundation
Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform
K Ly, O Arias, J Wurm, K Hoang, K Shamsi, Y Jin
2016 IEEE 34th International Conference on Computer Design (ICCD), 149-152, 2016
Zorunlu olanlar: US National Science Foundation
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir