67 results on '"Karimi, Naghmeh"'
Search Results
2. Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks
3. Security Order of Gate-Level Masking Schemes
4. Special Session: Security Verification & Testing for SR-Latch TRNGs
5. Collusion-resistant PUF-based Distributed Device Authentication Protocol for Internet of Things
6. SWeeT: Security Protocol for Wearables Embedded Devices’ Data Transmission
7. Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors
8. Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware
9. Does Aging Matter? The Curious Case of Fault Sensitivity Analysis
10. Leakage Power Analysis in Different S-Box Masking Protection Schemes
11. An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
12. Robust and Efficient Data Security Solution for Pervasive Data Sharing in IoT
13. Testing and Reliability Enhancement of Security Primitives
14. Countering PUF Modeling Attacks through Adversarial Machine Learning
15. Real-Time IC Aging Prediction via On-Chip Sensors
16. Hardware Assisted Smart Grid Authentication
17. Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips.
18. A Novel Modeling-Attack Resilient Arbiter-PUF Design
19. Using Digital Sensors to Leverage Chips' Security
20. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel
21. On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability
22. Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives.
23. Failure and Attack Detection by Digital Sensors
24. PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community
25. DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain
26. LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection
27. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations
28. On the Effect of Aging on Digital Sensors
29. Detecting Failures and Attacks via Digital Sensors.
30. Special Session: Countering IP Security threats in Supply chain
31. Real-Time Prediction for IC Aging Based on Machine Learning.
32. Design-Based Fingerprinting Using Side-Channel Power Analysis for Protection Against IC Piracy
33. On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis
34. Device aging: A reliability and security concern
35. Special session: Recent developments in hardware security
36. Impact of the switching activity on the aging of delay-PUFs
37. Prognosis of NBTI aging using a machine learning scheme
38. Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
39. Secure memristor-based main memory
40. Detection, diagnosis, and repair of faults in memristor-based memories
41. Special session 4B: Elevator talks
42. Testing of Clock-Domain Crossing Faults in Multi-core System-on-Chip
43. Impact analysis of performance faults in modern microprocessors
44. Instruction-Level Impact Comparison of RT- vs. Gate-Level Faults in a Modern Microprocessor Controller
45. Design and Evaluation of a Timestamp-Based Concurrent Error Detection Method (CED) in a Modern Microprocessor Controller
46. Reliable NoC architecture utilizing a robust rerouting algorithm
47. A Novel GA-Based High-Level Synthesis Technique to Enhance RT-Level Concurrent Testing
48. Online NoC Switch Fault Detection and Diagnosis Using a High Level Fault Model
49. Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor Memories.
50. Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.