关注
Arash Nejat
Arash Nejat
Université Montpellier (UM) II, LIRMM: Le Laboratoire d’Informatique, de Robotique et de
在 lirmm.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting
A Nejat, SMH Shekarian, MS Zamani
Microprocessors and Microsystems 38 (4), 246-252, 2014
362014
Practical experiments to evaluate quality metrics of MRAM-based physical unclonable functions
A Nejat, F Ouattara, M Mohammadinodoushan, B Cambou, K Mackay, ...
IEEE Access 8, 176042-176049, 2020
162020
ESCALATION: Leveraging logic masking to facilitate path-delay-based hardware Trojan detection methods
A Nejat, D Hely, V Beroulle
Journal of Hardware and Systems Security 2, 83-96, 2018
152018
Facilitating side channel analysis by obfuscation for Hardware Trojan detection
A Nejat, D Hely, V Beroulle
2015 10th International Design & Test Symposium (IDT), 129-134, 2015
152015
Practical experiments on fabricated TAS-MRAM dies to evaluate the stochastic behavior of voltage-controlled TRNGs
F Ouattara, A Nejat, L Torres, K Mackay
IEEE Access 7, 59271-59277, 2019
62019
How logic masking can improve path delay analysis for Hardware Trojan detection
A Nejat, D Hely, V Beroulle
2016 IEEE 34th International Conference on Computer Design (ICCD), 424-427, 2016
52016
High output hamming-distance achievement by a greedy logic masking approach
SMS Samimi, E Aerabi, A Nejat, M Fazeli, D Hely, V Beroulle
2016 IEEE East-West Design & Test Symposium (EWDTS), 1-4, 2016
42016
Reusing logic masking to facilitate path-delay-based Hardware Trojan detection
A Nejat, D Hely, V Beroulle
2016 IEEE 22nd International Symposium on On-Line Testing and Robust System …, 2016
42016
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
A Nejat, Z Kazemi, V Beroulle, D Hely, M Fazeli
IEEE International Verification and Security Workshop (IVSW), 2019
32019
Leveraging Logic Masking to Facilitate Hardware Trojan Detection Methods
A Nejat
Université Grenoble Alpes, 2019
2019
Tirer parti du masquage logique pour faciliter les méthodes de détection des chevaux de Troie hardware
A Nejat
Université Grenoble Alpes (ComUE), 2019
2019
Reusing Logic Masking to Facilitate Hardware Trojan Detection
A Nejat, D Hely, V Beroulle
Workshop on Trustworthy Manufacturing and Utilization of Secure Devices …, 2015
2015
Aerabi, Ehsan 3-1 Ahmed, Mosabbah Mushir 3-1
O Amrani, D Bürger, S Bendre, V Beroulle, G Bhagwat, G Dimitrakopoulos, ...
系统目前无法执行此操作,请稍后再试。
文章 1–13