Benchmarking of hardware trojans and maliciously affected circuits B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor Journal of Hardware and Systems Security 1, 85-102, 2017 | 348 | 2017 |
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks X Xu, B Shakya, MM Tehranipoor, D Forte Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 222 | 2017 |
CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme B Shakya, X Xu, M Tehranipoor, D Forte IACR Transactions on Cryptographic Hardware and Embedded Systems, 175-202, 2020 | 107 | 2020 |
Electronics supply chain integrity enabled by blockchain X Xu, F Rahman, B Shakya, A Vassilev, D Forte, M Tehranipoor ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (3 …, 2019 | 106 | 2019 |
Development and evaluation of hardware obfuscation benchmarks S Amir, B Shakya, X Xu, Y Jin, S Bhunia, M Tehranipoor, D Forte Journal of Hardware and Systems Security 2, 142-161, 2018 | 76 | 2018 |
Covert gates: Protecting integrated circuits with undetectable camouflaging B Shakya, H Shen, M Tehranipoor, D Forte IACR transactions on cryptographic hardware and embedded systems, 86-118, 2019 | 61 | 2019 |
Introduction to hardware obfuscation: Motivation, methods and evaluation B Shakya, MM Tehranipoor, S Bhunia, D Forte Hardware Protection through Obfuscation, 3-32, 2017 | 43 | 2017 |
Security beyond CMOS: fundamentals, applications, and roadmap F Rahman, B Shakya, X Xu, D Forte, M Tehranipoor IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017 | 34 | 2017 |
Comparative analysis of hardware obfuscation for IP protection S Amir, B Shakya, D Forte, M Tehranipoor, S Bhunia Proceedings of the on Great Lakes Symposium on VLSI 2017, 363-368, 2017 | 33 | 2017 |
Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication B Shakya, N Asadizanjani, D Forte, M Tehranipoor 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2016 | 21 | 2016 |
Performance optimization for on-chip sensors to detect recycled ICs B Shakya, U Guin, M Tehranipoor, D Forte 2015 33rd IEEE International Conference on Computer Design (ICCD), 289-295, 2015 | 15 | 2015 |
Emforced: Em-based fingerprinting framework for counterfeit detection with demonstration on remarked and cloned ics A Stern, U Botero, B Shakya, H Shen, D Forte, M Tehranipoor 2018 IEEE International Test Conference (ITC), 1-9, 2018 | 13 | 2018 |
Circuit edit and obfuscation for trusted chip fabrication MM Tehranipoor, DJ Forte, B Shakya, N Asadizanjani US Patent 11,030,348, 2021 | 9 | 2021 |
Defeating cas-unlock B Shakya, X Xu, M Tehranipoor, D Forte Cryptology ePrint Archive, 2020 | 9 | 2020 |
Poly-Si-based physical unclonable functions H Shen, F Rahman, B Shakya, X Xu, M Tehranipoor, D Forte IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (11 …, 2017 | 7 | 2017 |
Hardware IP Watermarking MM Tehranipoor, U Guin, D Forte Counterfeit Integrated Circuits, 203-222, 2015 | 7 | 2015 |
Selective enhancement of randomness at the materials level: Poly-Si based physical unclonable functions (PUFs) HT Shen, F Rahman, B Shakya, M Tehranipoor, D Forte 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 188-193, 2016 | 6 | 2016 |
Resistance drift and crystallization in suspended and On-oxide phase change memory line cells A Gorbenko, N Noor, S Muneer, RS Khan, F Dirisaglik, A Cywar, ... 2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO), 417-420, 2019 | 4 | 2019 |
A new methodology to protect PCBs from nondestructive reverse engineering Z Guo, B Shakya, H Shen, S Bhunia, N Asadizanjani, M Tehranipoor, ... International Symposium for Testing and Failure Analysis 81368, 347-356, 2016 | 4 | 2016 |
Development of an electrolarynx capable of supporting tonal distinctions in mandarin B Shakya, V Bharam, A Merchen | 4 | 2014 |