Hardware trojans: Lessons learned after one decade of research K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016 | 561 | 2016 |
BISA: Built-in self-authentication for preventing hardware Trojan insertion K Xiao, M Tehranipoor 2013 IEEE international symposium on hardware-oriented security and trust …, 2013 | 170 | 2013 |
Bit selection algorithm suitable for high-volume production of SRAM-PUF K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor 2014 IEEE international symposium on hardware-oriented security and trust …, 2014 | 162 | 2014 |
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 129 | 2016 |
A novel built-in self-authentication technique to prevent inserting hardware trojans K Xiao, D Forte, M Tehranipoor IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014 | 124 | 2014 |
A clock sweeping technique for detecting hardware trojans impacting circuits delay K Xiao, X Zhang, M Tehranipoor IEEE Design & Test 30 (2), 26-34, 2013 | 123 | 2013 |
DRAM based intrinsic physical unclonable functions for system level security F Tehranipoor, N Karimian, K Xiao, J Chandy Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 15-20, 2015 | 110 | 2015 |
Path-delay fingerprinting for identification of recovered ICs X Zhang, K Xiao, M Tehranipoor 2012 IEEE International symposium on defect and fault tolerance in VLSI and …, 2012 | 110 | 2012 |
Efficient and secure split manufacturing via obfuscated built-in self-authentication K Xiao, D Forte, MM Tehranipoor 2015 IEEE International symposium on hardware oriented security and trust …, 2015 | 98 | 2015 |
TI-TRNG: Technology independent true random number generator MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 74 | 2014 |
Security rule checking in IC design K Xiao, A Nahiyan, M Tehranipoor Computer 49 (8), 54-61, 2016 | 38 | 2016 |
Advanced analysis of cell stability for reliable SRAM PUFs A Hosey, MT Rahman, K Xiao, D Forte, M Tehranipoor 2014 IEEE 23rd Asian Test Symposium, 348-353, 2014 | 32 | 2014 |
A study on the effectiveness of Trojan detection techniques using a red team blue team approach X Zhang, K Xiao, M Tehranipoor, J Rajendran, R Karri 2013 IEEE 31st VLSI Test Symposium (VTS), 1-3, 2013 | 27 | 2013 |
Securing split manufactured ICs with wire lifting obfuscated built-in self-authentication Q Shi, K Xiao, D Forte, MM Tehranipoor Proceedings of the on Great Lakes Symposium on VLSI 2017, 339-344, 2017 | 14 | 2017 |
A zero-overhead IC identification technique using clock sweeping and path delay analysis N Tuzzio, K Xiao, X Zhang, M Tehranipoor Proceedings of the great lakes symposium on VLSI, 95-98, 2012 | 14 | 2012 |
Obfuscated built-in self-authentication Q Shi, K Xiao, D Forte, MM Tehranipoor Hardware Protection through Obfuscation, 263-289, 2017 | 10 | 2017 |
Circuit timing signature (CTS) for detection of counterfeit integrated circuits K Xiao, D Forte, M Tehranipoor Secure System Design and Trustable Computing, 211-239, 2016 | 9 | 2016 |
Security rule check A Nahiyan, K Xiao, D Forte, M Tehranipoor Hardware IP Security and Trust, 17-36, 2017 | 8 | 2017 |
Methods and systems for preventing hardware trojan insertion M Tehranipoor, K Xiao US Patent 9,218,506, 2015 | 7 | 2015 |
Techniques for improving security and trustworthiness of integrated circuits K Xiao | 7 | 2015 |