关注
Kan Xiao
Kan Xiao
在 engr.uconn.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5382016
BISA: Built-in self-authentication for preventing hardware Trojan insertion
K Xiao, M Tehranipoor
2013 IEEE international symposium on hardware-oriented security and trust …, 2013
1652013
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
1572014
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1252016
A clock sweeping technique for detecting hardware trojans impacting circuits delay
K Xiao, X Zhang, M Tehranipoor
IEEE Design & Test 30 (2), 26-34, 2013
1222013
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
1202014
Path-delay fingerprinting for identification of recovered ICs
X Zhang, K Xiao, M Tehranipoor
2012 IEEE International symposium on defect and fault tolerance in VLSI and …, 2012
1092012
DRAM based intrinsic physical unclonable functions for system level security
F Tehranipoor, N Karimian, K Xiao, J Chandy
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 15-20, 2015
1062015
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
962015
TI-TRNG: Technology independent true random number generator
MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
722014
Security rule checking in IC design
K Xiao, A Nahiyan, M Tehranipoor
Computer 49 (8), 54-61, 2016
352016
Advanced analysis of cell stability for reliable SRAM PUFs
A Hosey, MT Rahman, K Xiao, D Forte, M Tehranipoor
2014 IEEE 23rd Asian Test Symposium, 348-353, 2014
312014
A study on the effectiveness of Trojan detection techniques using a red team blue team approach
X Zhang, K Xiao, M Tehranipoor, J Rajendran, R Karri
2013 IEEE 31st VLSI Test Symposium (VTS), 1-3, 2013
262013
Securing split manufactured ICs with wire lifting obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Proceedings of the on Great Lakes Symposium on VLSI 2017, 339-344, 2017
142017
A zero-overhead IC identification technique using clock sweeping and path delay analysis
N Tuzzio, K Xiao, X Zhang, M Tehranipoor
Proceedings of the great lakes symposium on VLSI, 95-98, 2012
142012
Obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Hardware Protection through Obfuscation, 263-289, 2017
92017
Circuit timing signature (CTS) for detection of counterfeit integrated circuits
K Xiao, D Forte, M Tehranipoor
Secure System Design and Trustable Computing, 211-239, 2016
92016
Security rule check
A Nahiyan, K Xiao, D Forte, M Tehranipoor
Hardware IP Security and Trust, 17-36, 2017
82017
Techniques for improving security and trustworthiness of integrated circuits
K Xiao
72015
Methods and systems for preventing hardware trojan insertion
M Tehranipoor, K Xiao
US Patent 9,218,506, 2015
62015
系统目前无法执行此操作,请稍后再试。
文章 1–20