Volgen
Kan Xiao
Kan Xiao
Geverifieerd e-mailadres voor engr.uconn.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5222016
BISA: Built-in self-authentication for preventing hardware Trojan insertion
K Xiao, M Tehranipoor
2013 IEEE international symposium on hardware-oriented security and trust …, 2013
1612013
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
1562014
A clock sweeping technique for detecting hardware trojans impacting circuits delay
K Xiao, X Zhang, M Tehranipoor
IEEE Design & Test 30 (2), 26-34, 2013
1212013
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1182016
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
1162014
DRAM based intrinsic physical unclonable functions for system level security
F Tehranipoor, N Karimian, K Xiao, J Chandy
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 15-20, 2015
1062015
Path-delay fingerprinting for identification of recovered ICs
X Zhang, K Xiao, M Tehranipoor
2012 IEEE International symposium on defect and fault tolerance in VLSI and …, 2012
1062012
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
962015
TI-TRNG: Technology independent true random number generator
MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
722014
Security rule checking in IC design
K Xiao, A Nahiyan, M Tehranipoor
Computer 49 (8), 54-61, 2016
342016
Advanced analysis of cell stability for reliable SRAM PUFs
A Hosey, MT Rahman, K Xiao, D Forte, M Tehranipoor
2014 IEEE 23rd Asian Test Symposium, 348-353, 2014
302014
A study on the effectiveness of Trojan detection techniques using a red team blue team approach
X Zhang, K Xiao, M Tehranipoor, J Rajendran, R Karri
2013 IEEE 31st VLSI Test Symposium (VTS), 1-3, 2013
252013
Securing split manufactured ICs with wire lifting obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Proceedings of the on Great Lakes Symposium on VLSI 2017, 339-344, 2017
142017
A zero-overhead IC identification technique using clock sweeping and path delay analysis
N Tuzzio, K Xiao, X Zhang, M Tehranipoor
Proceedings of the great lakes symposium on VLSI, 95-98, 2012
142012
Obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Hardware Protection through Obfuscation, 263-289, 2017
92017
Security rule check
A Nahiyan, K Xiao, D Forte, M Tehranipoor
Hardware IP Security and Trust, 17-36, 2017
82017
Circuit timing signature (CTS) for detection of counterfeit integrated circuits
K Xiao, D Forte, M Tehranipoor
Secure System Design and Trustable Computing, 211-239, 2016
82016
Techniques for improving security and trustworthiness of integrated circuits
K Xiao
72015
Methods and systems for preventing hardware trojan insertion
M Tehranipoor, K Xiao
US Patent 9,218,506, 2015
62015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20