Kaveh Shamsi
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
2062017
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
1242017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
1162017
Emerging technology-based design of primitives for hardware security
Y Bi, K Shamsi, JS Yuan, PE Gaillardon, GD Micheli, X Yin, XS Hu, ...
ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-19, 2016
662016
KC2: Key-condition crunching for fast sequential circuit deobfuscation
K Shamsi, M Li, DZ Pan, Y Jin
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019
352019
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
K Shamsi, M Li, DZ Pan, Y Jin
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 147-152, 2018
342018
On the approximation resiliency of logic locking and IC camouflaging schemes
K Shamsi, T Meade, M Li, DZ Pan, Y Jin
IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018
332018
Tunnel FET current mode logic for DPA-resilient circuit designs
Y Bi, K Shamsi, JS Yuan, Y Jin, M Niemier, XS Hu
IEEE Transactions on Emerging Topics in Computing 5 (3), 340-352, 2016
332016
Leverage emerging technologies for dpa-resilient block cipher design
Y Bi, K Shamsi, JS Yuan, FX Standaert, Y Jin
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2016
222016
Enhancing hardware security with emerging transistor technologies
Y Bi, XS Hu, Y Jin, M Niemier, K Shamsi, X Yin
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 305-310, 2016
212016
Security of emerging non-volatile memories: Attacks and defenses
K Shamsi, Y Jin
2016 IEEE 34th VLSI Test Symposium (VTS), 1-4, 2016
212016
IP protection and supply chain security through logic obfuscation: A systematic overview
K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan, Y Jin
ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (6 …, 2019
202019
On the impossibility of approximation-resilient circuit locking
K Shamsi, DZ Pan, Y Jin
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
182019
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices
K Shamsi, Y Bi, Y Jin, PE Gaillardon, M Niemier, XS Hu
2015 33rd IEEE International Conference on Computer Design (ICCD), 343-350, 2015
172015
R2D2: Runtime reassurance and detection of A2 Trojan
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
142018
TimingSAT: Decamouflaging timing-based logic obfuscation
M Li, K Shamsi, Y Jin, DZ Pan
2018 IEEE International Test Conference (ITC), 1-10, 2018
122018
Hardware security challenges beyond CMOS: Attacks and remedies
K Shamsi, W Wen, Y Jin
2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 200-205, 2016
122016
IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits
K Shamsi, DZ Pan, Y Jin
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2019
92019
Circuit obfuscation and oracle-guided attacks: Who can prevail?
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 357-362, 2017
92017
On-chip analog trojan detection framework for microprocessor trustworthiness
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
82018
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20