TeSR: A robust temporal self-referencing approach for hardware Trojan detection S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011 | 166 | 2011 |
MECCA: A robust low-overhead PUF using embedded memory array AR Krishna, S Narasimhan, X Wang, S Bhunia Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 102 | 2011 |
Improving IC security against Trojan attacks through integration of security monitors S Narasimhan, W Yueh, X Wang, S Mukhopadhyay, S Bhunia IEEE Design & Test of Computers 29 (5), 37-46, 2012 | 93 | 2012 |
Golden-free hardware Trojan detection with high sensitivity under process noise T Hoque, S Narasimhan, X Wang, S Mal-Sarkar, S Bhunia Journal of Electronic Testing 33, 107-124, 2017 | 72 | 2017 |
Sequential hardware trojan: Side-channel aware design and placement X Wang, S Narasimhan, A Krishna, T Mal-Sarkar, S Bhunia 2011 IEEE 29th International Conference on Computer Design (ICCD), 297-300, 2011 | 67 | 2011 |
IIPS: Infrastructure IP for secure SoC design X Wang, Y Zheng, A Basak, S Bhunia IEEE Transactions on Computers 64 (8), 2226-2238, 2014 | 62 | 2014 |
Role of power grid in side channel attack and power-grid-aware secure design X Wang, W Yueh, DB Roy, S Narasimhan, Y Zheng, S Mukhopadhyay, ... Proceedings of the 50th Annual Design Automation Conference, 1-9, 2013 | 58 | 2013 |
Software exploitable hardware Trojans in embedded processor X Wang, T Mal-Sarkar, A Krishna, S Narasimhan, S Bhunia 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2012 | 58 | 2012 |
Hardware trojan attacks in embedded memory T Hoque, X Wang, A Basak, R Karam, S Bhunia 2018 IEEE 36th VLSI Test Symposium (VTS), 1-6, 2018 | 41 | 2018 |
SACCI: Scan-based characterization through clock phase sweep for counterfeit chip detection Y Zheng, X Wang, S Bhunia IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23 (5), 831-841, 2014 | 32 | 2014 |
Implantable electronics: emerging design issues and an ultra light-weight security solution S Narasimhan, X Wang, S Bhunia 2010 Annual International Conference of the IEEE Engineering in Medicine and …, 2010 | 16 | 2010 |
High-temperature (> 500° C) reconfigurable computing using silicon carbide NEMS switches X Wang, S Narasimhan, A Krishna, FG Wolff, S Rajgopal, TH Lee, ... 2011 Design, Automation & Test in Europe, 1-6, 2011 | 15 | 2011 |
Nemtronics: Symbiotic integration of nanoelectronic and nanomechanical devices for energy-efficient adaptive computing X Wang, S Narasimhan, S Paul, S Bhunia 2011 IEEE/ACM International Symposium on Nanoscale Architectures, 210-217, 2011 | 11 | 2011 |
Hardware trojan attacks: Threat analysis and low-cost countermeasures through golden-free detection and secure design X Wang Case Western Reserve University, 2014 | 10 | 2014 |
SCARE: Side-channel analysis based reverse engineering for post-silicon validation X Wang, S Narasimhan, A Krishna, S Bhunia 2012 25th International Conference on VLSI Design, 304-309, 2012 | 9 | 2012 |