A novel technique for improving hardware trojan detection and reducing trojan activation time H Salmani, M Tehranipoor, J Plusquellic IEEE transactions on very large scale integration (VLSI) systems 20 (1), 112-125, 2011 | 361 | 2011 |
Benchmarking of hardware trojans and maliciously affected circuits B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor Journal of Hardware and Systems Security 1, 85-102, 2017 | 346 | 2017 |
On design vulnerability analysis and trust benchmarks development H Salmani, M Tehranipoor, R Karri 2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013 | 339 | 2013 |
Hardware Trojan detection and isolation using current integration and localized current analysis X Wang, H Salmani, M Tehranipoor, J Plusquellic 2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008 | 287 | 2008 |
COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist H Salmani IEEE Transactions on Information Forensics and Security 12 (2), 338-350, 2016 | 243 | 2016 |
New design strategy for improving hardware Trojan detection and reducing Trojan activation time H Salmani, M Tehranipoor, J Plusquellic 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009 | 192 | 2009 |
Trustworthy hardware: Trojan detection and design-for-trust challenges M Tehranipoor, H Salmani, X Zhang, M Wang, R Karri, J Rajendran, ... Computer 44 (7), 66-74, 2010 | 145 | 2010 |
Layout-aware switching activity localization to enhance hardware Trojan detection H Salmani, M Tehranipoor IEEE Transactions on Information Forensics and Security 7 (1), 76-87, 2011 | 118 | 2011 |
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level H Salmani, M Tehranipoor 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2013 | 112 | 2013 |
Integrated circuit authentication M Tehranipoor, H Salmani, X Zhang Switzerland: Springer, Cham. doi 10, 978-3, 2014 | 102 | 2014 |
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits H Salmani, M Tehranipoor, J Plusquellic 2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010 | 83 | 2010 |
Vulnerability analysis of a circuit layout to hardware trojan insertion H Salmani, MM Tehranipoor IEEE Transactions on Information Forensics and Security 11 (6), 1214-1225, 2016 | 69 | 2016 |
Hybrid STT-CMOS designs for reverse-engineering prevention T Winograd, H Salmani, H Mahmoodi, K Gaj, H Homayoun Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 61 | 2016 |
Contribution of controller area networks controllers to masquerade failures H Salmani, SG Miremadi 11th Pacific Rim International Symposium on Dependable Computing (PRDC'05 …, 2005 | 18 | 2005 |
Trusted Digital Circuits H Salmani, Salmani, Glaser Springer, 2018 | 11 | 2018 |
Hardware trojan attacks and countermeasures H Salmani Fundamentals of IP and SoC Security: Design, Verification, and Debug, 247-276, 2017 | 11 | 2017 |
Assessment of message missing failures in CAN-based systems H Salmani, SG Miremadi Parallel and Distributed Computing and Networks: Proceedings of the 23 rd …, 2005 | 11 | 2005 |
Gradual-N-Justification (GNJ) to reduce false-positive hardware Trojan detection in gate-level Netlist H Salmani IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30 (4), 515-525, 2022 | 10 | 2022 |
Hardware trojan detection: Untrusted third-party ip cores M Tehranipoor, H Salmani, X Zhang, M Tehranipoor, H Salmani, X Zhang Integrated Circuit Authentication: Hardware Trojans and Counterfeit …, 2014 | 10 | 2014 |
Counterfeit ICs: Taxonomies, assessment, and challenges M Tehranipoor, H Salmani, X Zhang, M Tehranipoor, H Salmani, X Zhang Integrated Circuit Authentication: Hardware Trojans and Counterfeit …, 2014 | 8 | 2014 |