Cited By
View all- Khalil KIdriss HIdriss TBayoumi MKhalil KIdriss HIdriss TBayoumi M(2025)Exploring Classic Security Attacks and Hardware IntricaciesLightweight Hardware Security and Physically Unclonable Functions10.1007/978-3-031-76328-1_2(25-34)Online publication date: 8-Jan-2025
- Gubbi KLatibari BChowdhury MJalilzadeh AHamedani ERafatirad SSasan AHomayoun HSalehi S(2024)Optimized and Automated Secure IC Design Flow: A Defense-in-Depth ApproachIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.336416071:5(2031-2044)Online publication date: May-2024
- Zhang YHe ALi JRezine APeng ZLarsson EYang TJiang JLi H(2024)On Modeling and Detecting Trojans in Instruction SetsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.338955843:10(3226-3239)Online publication date: Oct-2024
- Show More Cited By