A primer on hardware security: Models, methods, and metrics M Rostami, F Koushanfar, R Karri Proceedings of the IEEE 102 (8), 1283-1295, 2014 | 748 | 2014 |
Trustworthy hardware: Identifying and classifying hardware trojans R Karri, J Rajendran, K Rosenfeld, M Tehranipoor Computer 43 (10), 39-46, 2010 | 682 | 2010 |
Security analysis of logic obfuscation J Rajendran, Y Pino, O Sinanoglu, R Karri Proceedings of the 49th annual design automation conference, 83-89, 2012 | 597 | 2012 |
Fault analysis-based logic encryption J Rajendran, H Zhang, C Zhang, GS Rose, Y Pino, O Sinanoglu, R Karri IEEE Transactions on computers 64 (2), 410-424, 2013 | 538 | 2013 |
Hardware trojans: Lessons learned after one decade of research K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016 | 537 | 2016 |
Security analysis of integrated circuit camouflaging J Rajendran, M Sam, O Sinanoglu, R Karri Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 528 | 2013 |
Scan based side channel attack on dedicated hardware implementations of data encryption standard B Yang, K Wu, R Karri 2004 International Conferce on Test, 339-344, 2004 | 442 | 2004 |
The cybersecurity landscape in industrial control systems S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ... Proceedings of the IEEE 104 (5), 1039-1057, 2016 | 408 | 2016 |
Secure scan: A design-for-test architecture for crypto chips B Yang, K Wu, R Karri Proceedings of the 42nd Annual Design Automation Conference, 135-140, 2005 | 388 | 2005 |
On improving the security of logic locking M Yasin, JJV Rajendran, O Sinanoglu, R Karri IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 384 | 2015 |
On design vulnerability analysis and trust benchmarks development H Salmani, M Tehranipoor, R Karri 2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013 | 313 | 2013 |
Manufacturing and security challenges in 3D printing SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri Jom 68 (7), 1872-1881, 2016 | 303 | 2016 |
The robust QCA adder designs using composable QCA building blocks K Kim, K Wu, R Karri IEEE transactions on computer-aided design of integrated circuits and …, 2006 | 287 | 2006 |
Asleep at the keyboard? assessing the security of github copilot’s code contributions H Pearce, B Ahmad, B Tan, B Dolan-Gavitt, R Karri 2022 IEEE Symposium on Security and Privacy (SP), 754-768, 2022 | 278 | 2022 |
Is split manufacturing secure? J Rajendran, O Sinanoglu, R Karri 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2013 | 259 | 2013 |
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers R Karri, K Wu, P Mishra, Y Kim IEEE Transactions on computer-aided design of integrated circuits and …, 2002 | 236 | 2002 |
Attacks and defenses for JTAG K Rosenfeld, R Karri IEEE Design & Test of Computers 27 (1), 36-47, 2010 | 195 | 2010 |
Logic encryption: A fault analysis perspective J Rajendran, Y Pino, O Sinanoglu, R Karri 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), 953-958, 2012 | 190 | 2012 |
Hardware security: Threat models and metrics M Rostami, F Koushanfar, J Rajendran, R Karri 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 819-823, 2013 | 180 | 2013 |
Examining zero-shot vulnerability repair with large language models H Pearce, B Tan, B Ahmad, R Karri, B Dolan-Gavitt 2023 IEEE Symposium on Security and Privacy (SP), 2339-2356, 2023 | 176 | 2023 |