default search action
Domenic Forte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte:
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource. Cryptogr. 8(2): 13 (2024) - [j81]Pallabi Ghosh, Gijung Lee, Mengdi Zhu, Olivia P. Dizon-Paradis, Ulbert J. Botero, Damon L. Woodard, Domenic Forte:
MaGNIFIES: Manageable GAN Image Augmentation Framework for Inspection of Electronic Systems. J. Hardw. Syst. Secur. 8(1): 44-59 (2024) - [j80]Sourav Roy, JinHong Chen, Nima Maghari, Domenic Forte:
Recycled Counterfeit Chips Detection for AMS and Digital ICs Using Low-Area, Self-Contained, and Secure LDO Odometers. J. Hardw. Syst. Secur. 8(3): 145-159 (2024) - [j79]Mahmudul Hasan, Tamzidul Hoque, Fatemeh Ganji, Damon L. Woodard, Domenic Forte, Sumaiya Shomaji:
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication. J. Hardw. Syst. Secur. 8(3): 160-173 (2024) - [j78]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 574-602 (2024) - [j77]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 569-609 (2024) - [c103]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. ACNS (3) 2024: 325-354 - [c102]Hanqiu Wang, Max Panoff, Zihao Zhan, Shuo Wang, Christophe Bobda, Domenic Forte:
Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization. DATE 2024: 1-6 - [c101]Tasnuva Farheen, Sourav Roy, Andrew Cannon, Jia Di, Shahin Tajik, Domenic Forte:
Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack. ACM Great Lakes Symposium on VLSI 2024: 564-568 - [c100]Tasnuva Farheen, Sourav Roy, Jia Di, Shahin Tajik, Domenic Forte:
Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks. HOST 2024: 211-221 - [c99]Jiaming Wu, Olivia P. Dizon-Paradis, M. Sazadur Rahman, Damon L. Woodard, Domenic Forte:
DOSCrack: Deobfuscation Using Oracle-Guided Symbolic Execution and Clustering of Binary Security Keys. HOST 2024: 227-232 - [i28]Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik:
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations. CoRR abs/2401.08925 (2024) - [i27]Hanqiu Wang, Max Panoff, Zihao Zhan, Shuo Wang, Christophe Bobda, Domenic Forte:
Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization. CoRR abs/2401.12193 (2024) - [i26]Saleh Khalaj Monfared, Kyle Mitard, Andrew Cannon, Domenic Forte, Shahin Tajik:
LaserEscape: Detecting and Mitigating Optical Probing Attacks. CoRR abs/2405.03632 (2024) - [i25]Yunkai Bai, Rabin Yu Acharya, Domenic Forte:
SPERO: Simultaneous Power/EM Side-channel Dataset Using Real-time and Oscilloscope Setups. CoRR abs/2405.06571 (2024) - [i24]Md. Mashfiq Rizvee, Tanvir Hossain, Tamzidul Hoque, Domenic Forte, Sumaiya Shomaji:
A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs. CoRR abs/2408.16950 (2024) - [i23]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Cryptol. ePrint Arch. 2024: 72 (2024) - 2023
- [j76]Ronald Wilson, Olivia P. Dizon-Paradis, Domenic Forte, Damon L. Woodard:
SECURE: A Segmentation Quality Evaluation Metric on SEM Images for Reverse Engineering on Integrated Circuits. IEEE Access 11: 137798-137809 (2023) - [j75]David Selasi Koblah, Ulbert J. Botero, Sean P. Costello, Olivia P. Dizon-Paradis, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images. ACM J. Emerg. Technol. Comput. Syst. 19(4): 34:1-34:20 (2023) - [j74]David Selasi Koblah, Olivia P. Dizon-Paradis, Justin Schubeck, Ulbert J. Botero, Damon L. Woodard, Domenic Forte:
A Comprehensive Taxonomy of Visual Printed Circuit Board Defects. J. Hardw. Syst. Secur. 7(2): 25-43 (2023) - [j73]Jiaming Wu, Domenic Forte:
EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration. J. Hardw. Syst. Secur. 7(4): 147-164 (2023) - [j72]Troy Bryant, Yingjie Chen, David Selasi Koblah, Domenic Forte, Nima Maghari:
A Brief Tutorial on Mixed Signal Approaches to Combat Electronic Counterfeiting. IEEE Open J. Circuits Syst. 4: 99-114 (2023) - [j71]Minyan Gao, M. Sazadur Rahman, Nitin Varshney, Mark M. Tehranipoor, Domenic Forte:
iPROBE: Internal Shielding Approach for Protecting Against Front-Side and Back-Side Probing Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4541-4554 (2023) - [j70]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
Information Theory-based Evolution of Neural Networks for Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 401-437 (2023) - [j69]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. ACM Trans. Design Autom. Electr. Syst. 28(2): 16:1-16:57 (2023) - [j68]Muhtadi Choudhury, Minyan Gao, Avinash Varna, Elad Peer, Domenic Forte:
Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming. ACM Trans. Design Autom. Electr. Syst. 28(6): 93:1-93:26 (2023) - [j67]Tasnuva Farheen, Sourav Roy, Shahin Tajik, Domenic Forte:
A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack. IEEE Trans. Very Large Scale Integr. Syst. 31(1): 65-78 (2023) - [c98]Lejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. CCS 2023: 3664-3665 - [c97]Hanqiu Wang, Maximillian Kealoha Panoff, Shuo Wang, Domenic Forte:
HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels. ACM Great Lakes Symposium on VLSI 2023: 51-56 - [c96]Minyan Gao, Domenic Forte:
Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis. HOST 2023: 122-132 - [c95]Yunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation. HOST 2023: 133-143 - [c94]Pallabi Ghosh, Sumaiya Shomaji, Damon L. Woodard, Domenic Forte:
KinfaceNet: A New Deep Transfer Learning based Kinship Feature Extraction Framework. IJCB 2023: 1-10 - [c93]Andrew Cannon, Tasnuva Farheen, Sourav Roy, Shahin Tajik, Domenic Forte:
Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch. ICCAD 2023: 1-9 - [c92]Tasnuva Farheen, Shahin Tajik, Domenic Forte:
SPRED: Spatially Distributed Laser Fault Injection Resilient Design. ISQED 2023: 1-8 - [c91]Sourav Roy, Shahin Tajik, Domenic Forte:
Polymorphic Sensor to Detect Laser Logic State Imaging Attack. ISQED 2023: 1-8 - [c90]Ryan Holzhausen, Tasnuva Farheen, Morgan Thomas, Nima Maghari, Domenic Forte:
Laser Fault Injection Vulnerability Assessment and Mitigation with Case Study on PG-TVD Logic Cells. ITC 2023: 330-339 - [e2]Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte:
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - [i22]Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte:
Quantization-aware Neural Architectural Search for Intrusion Detection. CoRR abs/2311.04194 (2023) - [i21]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. IACR Cryptol. ePrint Arch. 2023: 1 (2023) - [i20]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. IACR Cryptol. ePrint Arch. 2023: 76 (2023) - 2022
- [j66]Yunkai Bai, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
Real-time instruction-level verification of remote IoT/CPS devices via side channels. Discov. Internet Things 2(1) (2022) - [j65]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical security in the post-quantum era. J. Cryptogr. Eng. 12(3): 267-303 (2022) - [j64]Sarah Amir, Domenic Forte:
EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12): 5207-5219 (2022) - [j63]Yunkai Bai, Andrew Stern, Jungmin Park, Mark M. Tehranipoor, Domenic Forte:
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems. ACM Trans. Design Autom. Electr. Syst. 27(6): 65:1-65:25 (2022) - [c89]Farhaan Fowze, Muhtadi Choudhury, Domenic Forte:
EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution. AsianHOST 2022: 1-6 - [c88]Minyan Gao, Domenic Forte:
iPROBE-O: FIB-aware Place and Route for Probing Protection Using Orthogonal Shields. AsianHOST 2022: 1-6 - [c87]Jiaming Wu, Farhaan Fowze, Domenic Forte:
EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security. AsianHOST 2022: 1-6 - [c86]David Selasi Koblah, Fatemeh Ganji, Domenic Forte, Shahin Tajik:
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities. MTD@CCS 2022: 25-36 - [c85]Chip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair:
ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security. CCS 2022: 3545-3547 - [c84]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. ICCAD 2022: 156:1-156:9 - [c83]Rabin Yu Acharya, Domenic Forte:
Joint Optimization of NCL PUF Using Frequency-based Analysis and Evolutionary Algorithm. ISQED 2022: 1-6 - [c82]Sourav Roy, Tasnuva Farheen, Shahin Tajik, Domenic Forte:
Self-timed Sensors for Detecting Static Optical Side Channel Attacks. ISQED 2022: 1-6 - [c81]Muhtadi Choudhury, Minyan Gao, Shahin Tajik, Domenic Forte:
TAMED: Transitional Approaches for LFI Resilient State Machine Encoding. ITC 2022: 46-55 - [c80]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation. SPACE 2022: 225-248 - [c79]Ronald Wilson, Hangwei Lu, Mengdi Zhu, Domenic Forte, Damon L. Woodard:
REFICS: A Step Towards Linking Vision with Hardware Assurance. WACV 2022: 3461-3470 - [e1]Chip-Hong Chang, Ulrich Rührmair, Debdeep Mukhopadhyay, Domenic Forte:
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, ASHES 2022, Los Angeles, CA, USA, 11 November 2022. ACM 2022, ISBN 978-1-4503-9884-8 [contents] - [i19]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. CoRR abs/2204.09579 (2022) - [i18]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation. CoRR abs/2208.03806 (2022) - [i17]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. CoRR abs/2208.03822 (2022) - 2021
- [j62]Ronald Wilson, Hangwei Lu, Mengdi Zhu, Domenic Forte, Damon L. Woodard:
REFICS: Assimilating Data-Driven Paradigms Into Reverse Engineering and Hardware Assurance on Integrated Circuits. IEEE Access 9: 131955-131976 (2021) - [j61]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j60]Domenic Forte, Debdeep Mukhopadhyay, Ilia Polian, Yunsi Fei, Rosario Cammarota:
Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 17(3): 29:1-29:4 (2021) - [j59]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives. ACM J. Emerg. Technol. Comput. Syst. 17(4): 62:1-62:53 (2021) - [j58]Sumaiya Shomaji, Zimu Guo, Fatemeh Ganji, Nima Karimian, Damon L. Woodard, Domenic Forte:
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person. J. Hardw. Syst. Secur. 5(3): 223-236 (2021) - [j57]Beomsoo Park, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A Metal-Via Resistance Based Physically Unclonable Function With Backend Incremental ADC. IEEE Trans. Circuits Syst. I Regul. Pap. 68(11): 4700-4709 (2021) - [j56]Sumaiya Shomaji, Pallabi Ghosh, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems. IEEE Trans. Inf. Forensics Secur. 16: 5294-5309 (2021) - [j55]M. Sazadur Rahman, Adib Nahiyan, Fahim Rahman, Saverio Fazzari, Kenneth Plaks, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks. ACM Trans. Design Autom. Electr. Syst. 26(4): 29:1-29:27 (2021) - [c78]Muhtadi Choudhury, Domenic Forte, Shahin Tajik:
PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs. DATE 2021: 569-574 - [c77]Rabin Yu Acharya, Noeloikeau F. Charlot, Md. Mahbub Alam, Fatemeh Ganji, Daniel J. Gauthier, Domenic Forte:
Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm. ISQED 2021: 426-431 - [c76]Muhtadi Choudhury, Shahin Tajik, Domenic Forte:
SPARSE: Spatially Aware LFI Resilient State Machine Encoding. HASP@MICRO 2021: 1:1-1:8 - [c75]Rabin Yu Acharya, Michael Valentin Levin, Domenic Forte:
LDO-based Odometer to Combat IC Recycling. SoCC 2021: 206-211 - [i16]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis. CoRR abs/2105.00117 (2021) - [i15]Ana Covic, Fatemeh Ganji, Domenic Forte:
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners. CoRR abs/2106.12714 (2021) - 2020
- [j54]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-depth: A recipe for logic locking to prevail. Integr. 72: 39-57 (2020) - [j53]Jungmin Park, Fahim Rahman, Apostol Vassilev, Domenic Forte, Mark M. Tehranipoor:
Leveraging Side-Channel Information for Disassembly and Security. ACM J. Emerg. Technol. Comput. Syst. 16(1): 6:1-6:21 (2020) - [j52]Zimu Guo, Sreeja Chowdhury, Mark M. Tehranipoor, Domenic Forte:
Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation. ACM J. Emerg. Technol. Comput. Syst. 16(2): 17:1-17:25 (2020) - [j51]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Recycled SoC Detection Using LDO Degradation. SN Comput. Sci. 1(6): 312 (2020) - [j50]Nima Karimian, Damon L. Woodard, Domenic Forte:
ECG Biometric: Spoofing and Countermeasures. IEEE Trans. Biom. Behav. Identity Sci. 2(3): 257-270 (2020) - [j49]Huanyu Wang, Qihang Shi, Adib Nahiyan, Domenic Forte, Mark M. Tehranipoor:
A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2152-2165 (2020) - [j48]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 175-202 (2020) - [j47]Tamzidul Hoque, Kai Yang, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(1): 4:1-4:32 (2020) - [j46]Adib Nahiyan, Jungmin Park, Miao Tony He, Yousef Iskander, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation. ACM Trans. Design Autom. Electr. Syst. 25(3): 26:1-26:27 (2020) - [j45]Md. Mahbub Alam, Adib Nahiyan, Mehdi Sadi, Domenic Forte, Mark M. Tehranipoor:
Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation. ACM Trans. Design Autom. Electr. Syst. 25(4): 35:1-35:22 (2020) - [j44]Andrew Stern, Ulbert Botero, Fahim Rahman, Domenic Forte, Mark M. Tehranipoor:
EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection Using Machine Learning Classification. IEEE Trans. Very Large Scale Integr. Syst. 28(2): 363-375 (2020) - [c74]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c73]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. HOST 2020: 284-294 - [c72]Sarah Amir, Domenic Forte:
Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security. ICCAD 2020: 49:1-49:9 - [c71]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Low-Cost Remarked Counterfeit IC Detection using LDO Regulators. ISCAS 2020: 1-5 - [c70]Sreeja Chowdhury, Rabin Yu Acharya, William Boullion, Andrew Felder, Mark Howard, Jia Di, Domenic Forte:
A Weak Asynchronous RESet (ARES) PUF Using Start-up Characteristics of Null Conventional Logic Gates. ITC 2020: 1-10 - [i14]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil Azhagan Mallaiyan Sathiaseelan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives. CoRR abs/2002.04210 (2020) - [i13]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. CoRR abs/2003.13904 (2020) - [i12]Ronald Wilson, Navid Asadizanjani, Domenic Forte, Damon L. Woodard:
Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images. CoRR abs/2004.13874 (2020) - [i11]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions. CoRR abs/2005.04344 (2020) - [i10]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Defeating CAS-Unlock. IACR Cryptol. ePrint Arch. 2020: 324 (2020)
2010 – 2019
- 2019
- [j43]Nima Karimian, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT. IEEE Access 7: 49135-49149 (2019) - [j42]Bashir M. Sabquat Bahar Talukder, Biswajit Ray, Domenic Forte, Md. Tauhidur Rahman:
PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures. IEEE Access 7: 81106-81120 (2019) - [j41]Fatemeh Ganji, Domenic Forte, Jean-Pierre Seifert:
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks. IEEE Access 7: 122513-122521 (2019) - [j40]Sumaiya Shomaji, Parisa Dehghanzadeh, Alex Roman, Domenic Forte, Swarup Bhunia, Soumyajit Mandal:
Early Detection of Cardiovascular Diseases Using Wearable Ultrasound Device. IEEE Consumer Electron. Mag. 8(6): 12-21 (2019) - [j39]Ulbert J. Botero, Mark M. Tehranipoor, Domenic Forte:
Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement. IEEE Des. Test 36(1): 14-22 (2019) - [j38]Pallabi Ghosh, Aritra Bhattacharya, Domenic Forte, Rajat Subhra Chakraborty:
Automated Defective Pin Detection for Recycled Microelectronics Identification. J. Hardw. Syst. Secur. 3(3): 250-260 (2019) - [j37]Adib Nahiyan, Farimah Farahmandi, Prabhat Mishra, Domenic Forte, Mark M. Tehranipoor:
Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(6): 1003-1016 (2019) - [j36]Qihang Shi, Mark M. Tehranipoor, Domenic Forte:
Obfuscated Built-In Self-Authentication With Secure and Efficient Wire-Lifting. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(11): 1981-1994 (2019) - [j35]Bicky Shakya, Hao-Ting Shen, Mark M. Tehranipoor, Domenic Forte:
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 86-118 (2019) - [j34]Xiaolin Xu, Fahim Rahman, Bicky Shakya, Apostol Vassilev, Domenic Forte, Mark M. Tehranipoor:
Electronics Supply Chain Integrity Enabled by Blockchain. ACM Trans. Design Autom. Electr. Syst. 24(3): 31:1-31:25 (2019) - [j33]Huanyu Wang, Qihang Shi, Domenic Forte, Mark M. Tehranipoor:
Probing Assessment Framework and Evaluation of Antiprobing Solutions. IEEE Trans. Very Large Scale Integr. Syst. 27(6): 1239-1252 (2019) - [j32]Md. Mahbub Alam, Mark M. Tehranipoor, Domenic Forte:
Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2897-2910 (2019) - [c69]Abdulrahman Alaql, Domenic Forte, Swarup Bhunia:
Sweep to the Secret: A Constant Propagation Attack on Logic Locking. AsianHOST 2019: 1-6 - [c68]Ana Covic, Qihang Shi, Hao-Ting Shen, Domenic Forte:
Contact-to-Silicide Probing Attacks on Integrated Circuits and Countermeasures. AsianHOST 2019: 1-6 - [c67]Sumaiya Shomaji, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems. BTAS 2019: 1-8 - [c66]Beomsoo Park, Mark M. Tehranipoor, Domenic Forte, Nima Maghari:
A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability. CICC 2019: 1-4 - [c65]Md. Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark M. Tehranipoor, Domenic Forte:
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions. FDTC 2019: 48-55 - [c64]Sreeja Chowdhury, Hao-Ting Shen, Beomsoo Park, Nima Maghari, Domenic Forte:
Aging Analysis of Low Dropout Regulator for Universal Recycled IC Detection. ISVLSI 2019: 604-609 - [c63]Sreeja Chowdhury, Fatemeh Ganji, Troy Bryant, Nima Maghari, Domenic Forte:
Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation. ITC 2019: 1-10 - [c62]Domenic Forte, Swarup Bhunia, Ramesh Karri, Jim Plusquellic, Mark M. Tehranipoor:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Past, Present, and Future. ITC 2019: 1-4 - [c61]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [c60]Abdulrahman Alaql, Tamzidul Hoque, Domenic Forte, Swarup Bhunia:
Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection. VTS 2019: 1-6 - [i9]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. CoRR abs/1904.09516 (2019) - [i8]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-Depth: A Recipe for Logic Locking to Prevail. CoRR abs/1907.08863 (2019) - [i7]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i6]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019) - [i5]M. Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark M. Tehranipoor:
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design. IACR Cryptol. ePrint Arch. 2019: 946 (2019) - 2018
- [j31]Md. Mahbub Alam, Sreeja Chowdhury, Beomsoo Park, David Joseph Munzer, Nima Maghari, Mark M. Tehranipoor, Domenic Forte:
Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security. J. Hardw. Syst. Secur. 2(1): 15-32 (2018) - [j30]Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2(2): 142-161 (2018) - [j29]Domenic Forte, Yousef Iskander:
Guest Editorial: Hardware Reverse Engineering and Obfuscation. J. Hardw. Syst. Secur. 2(4): 287-288 (2018) - [j28]Kun Yang, Hao-Ting Shen, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Hardware-Enabled Pharmaceutical Supply Chain Security. ACM Trans. Design Autom. Electr. Syst. 23(2): 23:1-23:26 (2018) - [j27]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain. ACM Trans. Design Autom. Electr. Syst. 23(3): 29:1-29:27 (2018) - [j26]Kun Yang, Ulbert Botero, Hao-Ting Shen, Damon L. Woodard, Domenic Forte, Mark M. Tehranipoor:
UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain. ACM Trans. Design Autom. Electr. Syst. 23(6): 74:1-74:24 (2018) - [j25]Zimu Guo, Xiaolin Xu, Md. Tauhidur Rahman, Mark M. Tehranipoor, Domenic Forte:
SCARe: An SRAM-Based Countermeasure Against IC Recycling. IEEE Trans. Very Large Scale Integr. Syst. 26(4): 744-755 (2018) - [j24]Xiaolin Xu, Shahrzad Keshavarz, Domenic Forte, Mark M. Tehranipoor, Daniel E. Holcomb:
Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs. IEEE Trans. Very Large Scale Integr. Syst. 26(11): 2431-2442 (2018) - [c59]Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark M. Tehranipoor, Domenic Forte:
A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks. AsianHOST 2018: 98-103 - [c58]Jungmin Park, Xiaolin Xu, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
Power-based side-channel instruction-level disassembler. DAC 2018: 119:1-119:6 - [c57]Andrew Stern, Ulbert Botero, Bicky Shakya, Hao-Ting Shen, Domenic Forte, Mark M. Tehranipoor:
EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs. ITC 2018: 1-9 - [i4]Adib Nahiyan, Mehdi Sadi, Rahul Vittal, Gustavo K. Contreras, Domenic Forte, Mark M. Tehranipoor:
Hardware Trojan Detection through Information Flow Security Verification. CoRR abs/1803.04102 (2018) - [i3]Nima Karimian, Zimu Guo, Fatemeh Tehranipoor, Damon L. Woodard, Mark M. Tehranipoor, Domenic Forte:
Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT. CoRR abs/1803.09710 (2018) - [i2]Bashir M. Sabquat Bahar Talukder, Biswajit Ray, Mark M. Tehranipoor, Domenic Forte, Md. Tauhidur Rahman:
LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. CoRR abs/1808.02584 (2018) - 2017
- [j23]Huanyu Wang, Domenic Forte, Mark M. Tehranipoor, Qihang Shi:
Probing Attacks on Integrated Circuits: Challenges and Research Opportunities. IEEE Des. Test 34(5): 63-71 (2017) - [j22]Bicky Shakya, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Benchmarking of Hardware Trojans and Maliciously Affected Circuits. J. Hardw. Syst. Secur. 1(1): 85-102 (2017) - [j21]Md. Tauhidur Rahman, Alison Hosey, Zimu Guo, Jackson Carroll, Domenic Forte, Mark M. Tehranipoor:
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation. J. Hardw. Syst. Secur. 1(2): 137-155 (2017) - [j20]Nima Karimian, Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Highly Reliable Key Generation From Electrocardiogram (ECG). IEEE Trans. Biomed. Eng. 64(6): 1400-1411 (2017) - [j19]Ujjwal Guin, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor:
SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware. IEEE Trans. Dependable Secur. Comput. 14(3): 265-278 (2017) - [j18]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain. ACM Trans. Design Autom. Electr. Syst. 22(3): 42:1-42:31 (2017) - [j17]Zimu Guo, Jia Di, Mark M. Tehranipoor, Domenic Forte:
Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering. ACM Trans. Design Autom. Electr. Syst. 22(3): 54:1-54:31 (2017) - [j16]Hao-Ting Shen, Fahim Rahman, Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Poly-Si-Based Physical Unclonable Functions. IEEE Trans. Very Large Scale Integr. Syst. 25(11): 3207-3217 (2017) - [j15]Fahim Rahman, Bicky Shakya, Xiaolin Xu, Domenic Forte, Mark M. Tehranipoor:
Security Beyond CMOS: Fundamentals, Applications, and Roadmap. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3420-3433 (2017) - [c56]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
MPA: Model-assisted PCB attestation via board-level RO and temperature compensation. AsianHOST 2017: 25-30 - [c55]Kun Yang, Ulbert Botero, Hao-Ting Shen, Domenic Forte, Mark M. Tehranipoor:
A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security. AsianHOST 2017: 61-66 - [c54]Gustavo K. Contreras, Adib Nahiyan, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor:
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. ASP-DAC 2017: 617-622 - [c53]Nima Karimian, Mark M. Tehranipoor, Domenic Forte:
Non-fiducial PPG-based authentication for healthcare application. BHI 2017: 429-432 - [c52]Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark M. Tehranipoor:
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. CCS 2017: 1533-1546 - [c51]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. CHES 2017: 189-210 - [c50]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
FFD: A Framework for Fake Flash Detection. DAC 2017: 8:1-8:6 - [c49]Qihang Shi, Kan Xiao, Domenic Forte, Mark M. Tehranipoor:
Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication. ACM Great Lakes Symposium on VLSI 2017: 339-344 - [c48]Sarah Amir, Bicky Shakya, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Comparative Analysis of Hardware Obfuscation for IP Protection. ACM Great Lakes Symposium on VLSI 2017: 363-368 - [c47]Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A stochastic all-digital weak physically unclonable function for analog/mixed-signal applications. HOST 2017: 140-145 - [c46]Nima Karimian, Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Human recognition from photoplethysmography (PPG) based on non-fiducial features. ICASSP 2017: 4636-4640 - [c45]Nima Karimian, Damon L. Woodard, Domenic Forte:
On the vulnerability of ECG verification to online presentation attacks. IJCB 2017: 143-151 - [c44]Adib Nahiyan, Mehdi Sadi, Rahul Vittal, Gustavo K. Contreras, Domenic Forte, Mark M. Tehranipoor:
Hardware trojan detection through information flow security verification. ITC 2017: 1-10 - [c43]Sreeja Chowdhury, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Aging resilient RO PUF with increased reliability in FPGA. ReConFig 2017: 1-7 - [i1]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks. IACR Cryptol. ePrint Arch. 2017: 621 (2017) - 2016
- [j14]Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia:
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]. Computer 49(8): 12-16 (2016) - [j13]Shahed E. Quadir, Junlin Chen, Domenic Forte, Navid Asadizanjani, Sina Shahbazmohamadi, Lei Wang, John A. Chandy, Mark M. Tehranipoor:
A Survey on Chip to System Reverse Engineering. ACM J. Emerg. Technol. Comput. Syst. 13(1): 6:1-6:34 (2016) - [j12]Chongxi Bao, Domenic Forte, Ankur Srivastava:
On Reverse Engineering-Based Hardware Trojan Detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1): 49-57 (2016) - [j11]Md. Tauhidur Rahman, Fahim Rahman, Domenic Forte, Mark M. Tehranipoor:
An Aging-Resistant RO-PUF for Reliable Key Generation. IEEE Trans. Emerg. Top. Comput. 4(3): 335-348 (2016) - [j10]Ujjwal Guin, Qihang Shi, Domenic Forte, Mark M. Tehranipoor:
FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs. ACM Trans. Design Autom. Electr. Syst. 21(4): 63:1-63:20 (2016) - [j9]Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, Mark M. Tehranipoor:
Hardware Trojans: Lessons Learned after One Decade of Research. ACM Trans. Design Autom. Electr. Syst. 22(1): 6:1-6:23 (2016) - [j8]Ujjwal Guin, Domenic Forte, Mark M. Tehranipoor:
Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling. IEEE Trans. Very Large Scale Integr. Syst. 24(4): 1233-1246 (2016) - [c42]Adib Nahiyan, Kan Xiao, Kun Yang, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs. DAC 2016: 89:1-89:6 - [c41]Thao Le, Jia Di, Mark M. Tehranipoor, Domenic Forte, Lei Wang:
Tracking Data Flow at Gate-Level through Structural Checking. ACM Great Lakes Symposium on VLSI 2016: 185-189 - [c40]Zimu Guo, Mark M. Tehranipoor, Domenic Forte:
Aging attacks for key extraction on permutation-based obfuscation. AsianHOST 2016: 1-6 - [c39]Md. Tauhidur Rahman, Domenic Forte, Xiaoxiao Wang, Mark M. Tehranipoor:
Enhancing noise sensitivity of embedded SRAMs for robust true random number generation in SoCs. AsianHOST 2016: 1-6 - [c38]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
UCR: An unclonable chipless RFID tag. HOST 2016: 7-12 - [c37]Qihang Shi, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor:
A layout-driven framework to assess vulnerability of ICs to microprobing attacks. HOST 2016: 155-160 - [c36]Zimu Guo, Md. Tauhidur Rahman, Mark M. Tehranipoor, Domenic Forte:
A zero-cost approach to detect recycled SoC chips using embedded SRAM. HOST 2016: 191-196 - [c35]Bicky Shakya, Navid Asadizanjani, Domenic Forte, Mark M. Tehranipoor:
Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication. ICCAD 2016: 30 - [c34]Zimu Guo, Nima Karimian, Mark M. Tehranipoor, Domenic Forte:
Hardware security meets biometrics for the age of IoT. ISCAS 2016: 1318-1321 - [c33]Hao-Ting Shen, Fahim Rahman, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs). ISVLSI 2016: 188-193 - [c32]Md. Mahbub Alam, Mark M. Tehranipoor, Domenic Forte:
Recycled FPGA detection using exhaustive LUT path delay characterization. ITC 2016: 1-10 - [c31]Troy Bryant, Sreeja Chowdhury, Domenic Forte, Mark M. Tehranipoor, Nima Maghari:
A stochastic approach to analog physical unclonable function. MWSCAS 2016: 1-4 - 2015
- [j7]Anas Mazady, Md. Tauhidur Rahman, Domenic Forte, Mehdi Anwar:
Memristor PUF - A Security Primitive: Theory and Experiment. IEEE J. Emerg. Sel. Topics Circuits Syst. 5(2): 222-229 (2015) - [j6]Chongxi Bao, Domenic Forte, Ankur Srivastava:
Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(10): 1577-1585 (2015) - [c30]Zimu Guo, Mark M. Tehranipoor, Domenic Forte, Jia Di:
Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. DAC 2015: 114:1-114:6 - [c29]Shuai Chen, Junlin Chen, Domenic Forte, Jia Di, Mark M. Tehranipoor, Lei Wang:
Chip-level anti-reverse engineering using transformable interconnects. DFTS 2015: 109-114 - [c28]Kan Xiao, Domenic Forte, Mark M. Tehranipoor:
Efficient and secure split manufacturing via obfuscated built-in self-authentication. HOST 2015: 14-19 - [c27]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
Protecting Endpoint Devices in IoT Supply Chain. ICCAD 2015: 351-356 - [c26]Bicky Shakya, Ujjwal Guin, Mark M. Tehranipoor, Domenic Forte:
Performance optimization for on-chip sensors to detect recycled ICs. ICCD 2015: 289-295 - [c25]Md. Tauhidur Rahman, Domenic Forte, Fahim Rahman, Mark M. Tehranipoor:
A pair selection algorithm for robust RO-PUF against environmental variations and aging. ICCD 2015: 415-418 - [c24]Bicky Shakya, Fahim Rahman, Mark M. Tehranipoor, Domenic Forte:
Harnessing Nanoscale Device Properties for Hardware Security. MTV 2015: 42-47 - [c23]Kun Yang, Domenic Forte, Mark M. Tehranipoor:
ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices. RFIDSec 2015: 32-49 - 2014
- [j5]Kan Xiao, Domenic Forte, Mohammad Tehranipoor:
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12): 1778-1791 (2014) - [c22]Alison Hosey, Md. Tauhidur Rahman, Kan Xiao, Domenic Forte, Mohammad Tehranipoor:
Advanced Analysis of Cell Stability for Reliable SRAM PUFs. ATS 2014: 348-353 - [c21]Ujjwal Guin, Xuehui Zhang, Domenic Forte, Mohammad Tehranipoor:
Low-cost On-Chip Structures for Combating Die and IC Recycling. DAC 2014: 87:1-87:6 - [c20]Md. Tauhidur Rahman, Kan Xiao, Domenic Forte, Xuhei Zhang, Zhijie Jerry Shi, Mohammad Tehranipoor:
TI-TRNG: Technology Independent True Random Number Generator. DAC 2014: 179:1-179:6 - [c19]Md. Tauhidur Rahman, Domenic Forte, Jim Fahrny, Mohammad Tehranipoor:
ARO-PUF: An aging-resistant ring oscillator PUF design. DATE 2014: 1-6 - [c18]Md. Tauhidur Rahman, Domenic Forte, Quihang Shi, Gustavo K. Contreras, Mark Mohammad Tehranipoor:
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. DFT 2014: 46-51 - [c17]Halit Dogan, Domenic Forte, Mark Mohammad Tehranipoor:
Aging analysis for recycled FPGA detection. DFT 2014: 171-176 - [c16]Kan Xiao, Md. Tauhidur Rahman, Domenic Forte, Yu Huang, Mei Su, Mohammad Tehranipoor:
Bit selection algorithm suitable for high-volume production of SRAM-PUF. HOST 2014: 101-106 - [c15]Chongxi Bao, Domenic Forte, Ankur Srivastava:
On application of one-class SVM to reverse engineering-based hardware Trojan detection. ISQED 2014: 47-54 - [c14]Md. Tauhidur Rahman, Domenic Forte, Quihang Shi, Gustavo K. Contreras, Mohammad Tehranipoor:
CSST: An Efficient Secure Split-Test for Preventing IC Piracy. NATW 2014: 43-47 - [c13]Mohammad Tehranipoor, Domenic Forte:
Tutorial T4: All You Need to Know about Hardware Trojans and Counterfeit ICs. VLSID 2014: 9-10 - 2013
- [b1]Domenic Forte:
Design, Fabrication, and Run-time Strategies for Hardware-Assisted Security. University of Maryland, College Park, MD, USA, 2013 - [j4]Domenic Forte, Ankur Srivastava:
Improving the Quality of Delay-Based PUFs via Optical Proximity Correction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(12): 1879-1891 (2013) - [j3]Domenic Forte, Ankur Srivastava:
Energy- and Thermal-Aware Video Coding via Encoder/Decoder Workload Balancing. ACM Trans. Embed. Comput. Syst. 12(2s): 96:1-96:26 (2013) - [j2]Domenic Forte, Ankur Srivastava:
Resource-aware architectures for adaptive particle filter based visual target tracking. ACM Trans. Design Autom. Electr. Syst. 18(2): 22:1-22:27 (2013) - [j1]Domenic Forte, Ankur Srivastava:
Thermal-aware sensor scheduling for distributed estimation. ACM Trans. Sens. Networks 9(4): 53:1-53:31 (2013) - [c12]Domenic Forte, Chongxi Bao, Ankur Srivastava:
Temperature tracking: an innovative run-time approach for hardware Trojan detection. ICCAD 2013: 532-539 - [c11]Ujjwal Guin, Domenic Forte, Mohammad Tehranipoor:
Anti-counterfeit Techniques: From Design to Resign. MTV 2013: 89-94 - 2012
- [c10]Domenic Forte, Ankur Srivastava:
On improving the uniqueness of silicon-based physically unclonable functions via optical proximity correction. DAC 2012: 96-105 - [c9]Domenic Forte, Ankur Srivastava:
Manipulating Manufacturing Variations for Better Silicon-Based Physically Unclonable Functions. ISVLSI 2012: 171-176 - 2011
- [c8]Domenic Forte, Ankur Srivastava:
Adaptable video compression and transmission using lossy and workload balancing techniques. AHS 2011: 145-152 - [c7]Domenic Forte, Ankur Srivastava:
Energy-aware video coding of multiple views via workload balancing. AHS 2011: 295-302 - [c6]Domenic Forte, Ankur Srivastava:
Resource-aware architectures for particle filter based visual target tracking. IGCC 2011: 1-6 - [c5]Domenic Forte, Ankur Srivastava:
Energy-aware video storage and retrieval in server environments. IGCC 2011: 1-6 - [c4]Domenic Forte, Ankur Srivastava:
Adaptable architectures for distributed visual target tracking. ICCD 2011: 339-345 - [c3]Domenic Forte, Ankur Srivastava:
Energy-aware and quality-scalable data placement and retrieval for disks in video server environments. ICCD 2011: 457-458 - 2010
- [c2]Domenic Forte, Ankur Srivastava:
Thermal-Aware Sensor Scheduling for Distributed Estimation. DCOSS 2010: 116-129 - [c1]Domenic Forte, Ankur Srivastava:
Energy and thermal-aware video coding via encoder/decoder workload balancing. ISLPED 2010: 207-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint