Follow
Kan Xiao
Kan Xiao
Verified email at engr.uconn.edu
Title
Cited by
Cited by
Year
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5702016
BISA: Built-in self-authentication for preventing hardware Trojan insertion
K Xiao, M Tehranipoor
2013 IEEE international symposium on hardware-oriented security and trust …, 2013
1692013
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
1642014
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1322016
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
1242014
A clock sweeping technique for detecting hardware trojans impacting circuits delay
K Xiao, X Zhang, M Tehranipoor
IEEE Design & Test 30 (2), 26-34, 2013
1232013
Path-delay fingerprinting for identification of recovered ICs
X Zhang, K Xiao, M Tehranipoor
2012 IEEE International symposium on defect and fault tolerance in VLSI and …, 2012
1122012
DRAM based intrinsic physical unclonable functions for system level security
F Tehranipoor, N Karimian, K Xiao, J Chandy
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 15-20, 2015
1112015
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
992015
TI-TRNG: Technology independent true random number generator
MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
742014
Security rule checking in IC design
K Xiao, A Nahiyan, M Tehranipoor
Computer 49 (8), 54-61, 2016
402016
Advanced analysis of cell stability for reliable SRAM PUFs
A Hosey, MT Rahman, K Xiao, D Forte, M Tehranipoor
2014 IEEE 23rd Asian Test Symposium, 348-353, 2014
322014
A study on the effectiveness of Trojan detection techniques using a red team blue team approach
X Zhang, K Xiao, M Tehranipoor, J Rajendran, R Karri
2013 IEEE 31st VLSI Test Symposium (VTS), 1-3, 2013
272013
Securing split manufactured ICs with wire lifting obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Proceedings of the on Great Lakes Symposium on VLSI 2017, 339-344, 2017
142017
A zero-overhead IC identification technique using clock sweeping and path delay analysis
N Tuzzio, K Xiao, X Zhang, M Tehranipoor
Proceedings of the great lakes symposium on VLSI, 95-98, 2012
142012
Obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Hardware Protection through Obfuscation, 263-289, 2017
102017
Circuit timing signature (CTS) for detection of counterfeit integrated circuits
K Xiao, D Forte, M Tehranipoor
Secure System Design and Trustable Computing, 211-239, 2016
92016
Security rule check
A Nahiyan, K Xiao, D Forte, M Tehranipoor
Hardware IP Security and Trust, 17-36, 2017
82017
Techniques for improving security and trustworthiness of integrated circuits
K Xiao
72015
Methods and systems for preventing hardware trojan insertion
M Tehranipoor, K Xiao
US Patent 9,218,506, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20