2020
IEEE Access; Apr. 2020
US Patent 10,614,18; Apr. 2020
IEEE/ACM Design Automation Test in Europe Conference
; Mar. 2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020
32. GI/GMM/ITG-Workshop Testmethoden und Zuverlässigkeit von Schaltungen und Systemen; Feb. 2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Jan. 2020
arXiv preprint arXiv:2001.06724; Jan. 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 77-92; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 1-16; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 103-118; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 17-31; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 69-76; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 119-130; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 47-56; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 93-102; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 57-67; 2020
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 33-46; 2020
arXiv preprint arXiv:2003.07859; Mar. 2020
IEEE Access, pp. 23847-23862; Jan. 2020
IEEE Design & Test, pp. 103-110; Jan. 2020
29th {USENIX} Security Symposium Conference({USENIX} Security 20); to appear Aug. 2020
Journal of Cybersecurity, Volume 6, Issue 1; Jan. 2020
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-14; Apr. 2020
arXiv preprint arXiv:2004.01929; Apr. 2020
IEEE Transactions on Information Forensics and Security, pp. 3270-3282; Apr. 2020
arXiv preprint arXiv:2002.10123; Feb. 2020
arXiv preprint arXiv:2004.12492; Apr. 2020
IEEE Access; Apr. 2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Apr. 2020
IEEE Transactions on Information Forensics and Security, pp. 3213-3226; Mar. 2020
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020
IEEE Access, pp. 47322-47333; Mar. 2020
arXiv preprint arXiv:2002.08313; Feb. 2020
IEEE Transactions on Dependable and Secure Computing; Feb. 2020
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp. 1269-1282; Feb. 2020
ACM Transactions on Design Automation of Electronic Systems (TODAES), pp. 1-25; Jan. 2020
Springer International Publishing; 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 1-17; 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 109-133; 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 51-77; 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 19-49; 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 79-107; 2020
2019
International Conference on Information Technology and Communications Security, pp. 172-192; Nov. 2019
US Patent App. 16/087,911; Nov. 2019
Springer, pp. 1-xxi, 142 pages; Oct. 2019
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2019
Encrypted Domain Skin Tone Detection For Pornographic Image Filtering
15th International Conference on Advanced Video and Signal- based Surveillance (AVSS); to appear Nov. 2018
25th IEEE International Conference on Image Processing (ICIP); Sept. 2018
2018
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Aug. 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE); Aug. 2018
PHYLAX: Snapshot-based Profiling of Real-Time Embedded Devices via JTAG Interface
IEEE Design, Automation and Test in Europe; Accepted 2018
IEEE Transactions on Computers, pp.16-31; to appear Jul. 2018
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Jul. 2018
The NACE Workshop; Jul. 2018
IEEE Transactions on Computers, pp.16-31; to appear Jul. 2018
IEEE Transactions on Information Forensics and Security; May 2018
DATE 2018 Conference & Exhibition; Mar. 2018
DATE 2018 Conference & Exhibition; Mar. 2018
DATE 2018 Conference & Exhibition; Mar. 2018
DATE 2018 Conference & Exhibition; Mar. 2018
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Feb. 2018
The 11TH IAPR International Conference On Biometrics; Feb. 2018
IEEE Communications Surveys and Tutorials; to appear 2018
Cryptanalysis of 1-Round KECCAK
AfricaCrypt 2018; accepted 2018
Proceedings of IEEE Symposium on Security and Privacy (S&P); to appear 2018
User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”
European Workshop on Usable Security (EuroUSEC); to appear 2018
Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY); 2018
Proc. Asia South Pacific Design Automation Conference (ASPDAC); Feb. 2018
IEEE Transactions on Multi-Scale Computing Systems; Jan. 2018
ACM Transactions on Embedded Computing Systems (TECS); Jan. 2018
Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
Proc. Design Automation and Test in Europe (DATE); to appear 2018
2017
Efficient Gray-level Image Sharing Algorithm using Non- Recursive Hash Value based Stream Cipher
IET Information Security; Under review 2017
FPGA Prototype of non-recursive hash key based stream cipher using sequence folding technique
IACR Transactions on Symmetric Cryptology; Under review 2017
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec); Jul. 2017
IEEE International Conference on Computer Design, pp.673-680; Nov. 2017
Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests
IEEE Asian Hardware Oriented Security and Trust Symposium, pp.1-6; Oct. 2017
BlackHat USA; Apr. 2017
Obligations for Social Media Companies
International Association for Computing and Philosophy; accepted for publication 2017
Cryptology ePrint Archive, report 2017/1218; Dec. 2017
Information Forensics and Security (WIFS), IEEE Workshop; Dec. 2017
IEEE Transactions on Information Forensics and Security (TIFS), vol 12, issue 12, pp. 3065 – 3080; Dec. 2017
ACM SIGSAC Conference; Nov. 2017
ACM SIGSAC Conference on Computer and Communications Security, pp. 1273-1284; Nov. 2017
ASHES ’17 Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, pp. 7-16; Nov. 2017
IEEE Embedded Systems Letters, vol pp, issue 99, pp. 1-1; Nov. 2017
IEEE/ACM International Conference on Computer-Aided Design (ICCAD); Nov. 2017
Computer Design (ICCD); Nov. 2017
Compilers, Architectures and Synthesis For Embedded Systems (CASES); Nov. 2017
Conference Paper; VLSI SOC Abu Dhabi; Nov. 2017
Cryptology ePrint Archive; Nov. 2017
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 11, pp. 2668-2682; Nov. 2017
IET Book Data Security in Cloud Computing (Book Chapter), pp. 45-64; Oct. 2017
CoRR; Oct. 2017
IEEE Transactions on Multi-Scale Computing Systems, vol. 4, issue 1, pp. 55-68; Oct. 2017
IEEE Transactions on Circuits and Systems I (TCSI): Regular Papers, vol. 64, issue 9, pp. 2624-2637; Sep. 2017
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 9, pp. 2013-2025; Sep. 2017
Simulation Modelling Practice and Theory, vol. 77, pp. 407-423; Sep. 2017
14th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 6, pp. 525-533; Aug. 2017
IEEE Transactions on Emerging Topics in Computing (TETC), vol. PP, issue 99, pp. 1-1; Aug. 2017
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 7-17; Aug. 2017
IPSJ Transactions System LSI Design Methodology (TSLDM), vol. 10, pp. 45-62; Aug. 2017
IET Cyber-Physical Systems: Theory and Applications, pp. 1-7; Aug. 2017
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1; Aug. 2017
IEEE Signal Processing Letters, vol. 24, issue 10; Aug. 2017
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 5-6; Aug. 2017
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 302-303; Jul. 2017
IEEE Transactions on Information Forensics and Security, vol. 12, issue 12, pp. 2875-2889; Jul. 2017
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2017
IEEE Signal Processing Magazine, vol. 34, issue 4, pp. 194-196; Jul. 2017
SOUPS; Jul. 2017
SOUPS; Jul. 2017
IEEE Transactions on Computers (TC), vol. 67, issue 1, pp. 16-31; Jul. 2017
IEEE Design & Test, vol. 34, issue 4, pp. 5-6; Jun. 2017
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 36, issue 6, pp. 1043-1053; Jun. 2017
ACM/EDAC/IEEE 54th Annual Design Automation Conference (DAC), pp. 82:1-82:6; Jun. 2017
Annales des Telecommunications, vol. 72, issue 5-6, pp. 335-345; Jun. 2017
IEEE/ACM 54th Annual Design Automation Conference (DAC), pp. 12:1-12:6; Jun. 2017
IEEE Transactions on Multi-Scale Computing Systems, vol. 2, issue 3, pp. 160-173; May 2017
Computers & Security, vol. 65, pp. 153-165; May 2017
Computers & Security, vol. 66, pp. 115-128; May 2017
4th International Conference on Software Defined Systems (SDS), pp. 54-60; May 2017
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 166-166; May 2017
ACM Great Lakes Symposium on VLSI (GLSVLSI), pp. 351-356; May 2017
Targeted Attacks Conference; Apr. 2017
CoRR; Apr. 2017
3rd ACM Workshop on Cyber-Physical System Security (CPSS), pp. 15- 20; Apr. 2017
Network and Distributed System Security (NDSS) Symposium, vol. 17; Mar. 2017
American Society of Mechanical Engineers (ASME) Dynamic Systems and Control Magazine, vol. 139, issue 3, pp. S13-S17; Mar. 2017
Computers and Security, vol. 65, pp. 14-28; Mar. 2017
ACM Transactions on Design Automation of Electronic Systems (TODAES) – Special Section of IDEA: Integrating Dataflow, Embedded Computing, and Architecture, vol. 22, issue 2; Mar. 2017
Automotive Electrical/Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. PP, issue 99, pp. 1-1; Feb. 2017
IEEE Design and Test (MDAT), vol. 34, issue 1, pp. 57-64; Feb. 2017
The Computer Journal; Feb. 2017
Asia and South Pacific Design Automation Conference, pp. 354-359; Jan. 2017
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, pp. 107-126; Jan. 2017
22nd Asia South Pacific Design Automation Conference (ASP-DAC), pp. 342-347 ; Jan. 2017
Fundamentals of IP and SoC Security: Design, Verification, and Debug, pp. 199-222; Jan. 2017
2016
IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6; Dec. 2016
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 2, pp. 31:1-31:25; Dec. 2016
IEEE International Test Conference (ITC), pp. 1-10; Nov. 2016
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 1, pp. 11:1-11:26; Nov. 2016
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 11, pp. 2542-2555; Nov. 2016
IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 1-8; Nov. 2016
IEEE Biomedical Circuits and Systems Conference (BioCAS), pp. 152-155; Oct. 2016
IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1-4; Oct. 2016
54th Annual Allerton Conference on Communication, Control, and Computing, pp. 1142-1148; Sep. 2016
Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing pp. 1116-1122; Sep. 2016
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 9, pp. 2123-2138; Sep. 2016
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 24, issue 9, pp. 2946-2959; Sep. 2016
21st European Symposium on Research in Computer Security (ESORICS), pp.3-26; Sep. 2016
IEEE Micro, vol. 36, issue 5, pp. 50-61; Sep. 2016
IEEE International Conference on Image Processing (ICIP), pp. 156-160; Sep. 2016
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 35, issue 9, pp. 1411-1424; Sep. 2016
IEEE Computer Magazine, vol. 49, issue 8, pp. 36-43; Aug. 2016
IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 164-169; Aug. 2016
12th Symposium on Usable Privacy and Security (SOUPS); Aug. 2016
IEEE Transactions on Multi- Scale Computing Systems (TMSCS), vol. 2, issue 3, pp. 160-173; Jul. 2016
Power and Energy Society General Meeting, (PES-GM), pp. 1-5; Jul. 2016
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2016
13th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 283-291; Jul. 2016
IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 215-218; Jul. 2016
The Journal of The Minerals, Metals & Materials Society (TMS), vol. 68, issue 7, pp. 1872–1881; Jul. 2016
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 4, issue 3, pp. 363-373; Jul. 2016
11th Annual Symposium on Information Assurance (ASIA); Jun. 2016
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 20, issue 3, pp. 46:1-46:18; Jun. 2016
System, Method and Computer-Accessible Medium for IC Camouflaging for Minterm Protection
U.S. Patent pending, filed Jun. 2016
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 13, issue 3, pp. 445-458; May 2016
11th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 723-734; May 2016
Proceedings of the IEEE, vol. 104, issue 5, pp. 1039-1057; May 2016
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236-241; May 2016
International Journal of Big Data Intelligence (IJBDI), vol. 3, issue 3, pp. 190-201; May 2016
17th Latin-American Test Symposium (LATS), pp.105-110; Apr. 2016
IEEE 34th VLSI Test Symposium (VTS), pp. 1-4; Apr. 2016
International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1-1; Apr. 2016
IEEE International Conference on Cloud Engineering Workshop (IC2EW), pp. 88-93; Apr. 2016
System, Method and Computer-Accessible Medium for Satisfiability Attack Resistant Logic Locking
U.S. Patent pending, filed Mar. 2016
IEEE/ACM Design Automation Test in Europe Conference (DATE), pp. 139-144; Mar. 2016
21st Asia and South Pacific Design Automation Conference (ASPDAC), pp. 511-518; Jan. 2016
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 21, issue 2, pp. 33:1-33:22; Jan. 2016
29th International Conference on VLSI Design (VLSID) and 15th International Conference on Embedded Systems, pp. 547-552; Jan. 2016
Secure System Design and Trustable Computing, pp. 163-208; 2016
2015
10th International Design and Test (IDT) Symposium, pp. 5-8; Dec. 2015
10th International Design and Test Symposium (IDT), pp. 1-4; Dec. 2015
28th Annual ACM Symposium on User Interface Software & Technology (UIST), pp. 213-222; Nov. 2015
IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 283-288; Nov. 2015
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, issue 11, pp. 2447-2460; Nov. 2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 11, pp. 1756-1769; Nov. 2015
IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 544-551; Nov. 2015
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 29-34; Oct. 2015
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2015
IEEE International Conference on Computer Design (ICCD); Oct. 2015
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 115-118; Oct. 2015
33rd IEEE International Conference on Computer Design (ICCD), pp. 266-272; Oct. 2015
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 264-269; Oct. 2015
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2015
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 97-102; Oct. 2015
ACM Special Interest Group on Data Communication (SIGCOMM), pp. 509-522; Aug. 2015
Journal of Cryptographic Engineering, vol. 5, issue 3, pp. 153-169; Sep. 2015
25th International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 25-32; Sep. 2015
IEEE Transactions on Computers (TC), vol. 64, issue 9, pp. 2664-2674; Sep. 2015
24th USENIX Security Symposium, pp. 1025-1040; Aug. 2015
6th ACM Symposium on Cloud Computing (SOCC), pp. 168-173; Aug. 2015
1st Workshop on Computing within Limits (LIMITS); Jul. 2015
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 2, pp. 10:1-10:23; Jul. 2015
IEEE 21st International On-Line Testing Symposium (IOLTS), pp. 40-43; Jul. 2015
9th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies of UBICOMM; Jul. 2015
IEEE European Control Conference (ECC), pp. 1920-1925; Jul. 2015
4th Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pp. 7:1-7:5; Jun. 2015
52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 6, pp. 875-888; Jun. 2015
IEEE International Symposium on Circuits and Systems (ISCAS), pp. 37-40; May 2015
7th International Conference on Information and Communication Technology for Development (ICTD), pp. 13:1-13:10; May 2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 808-821; May 2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 822-834; May 2015
20th IEEE European Test Symposium (ETS), pp. 1-8; May 2015
Proceedings of the IEEE, vol. 103, issue 5, pp. 829-849; May 2015
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 124-129; May. 2015
CD Heitzenrater Proc. of SPIE-IS, vol. 9409, 940901-1; Apr. 2015
IEEE 33rd VLSI Test Symposium (VTS), pp. 1-4; Apr. 2015
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 1, pp. 5:1-5:25; Apr. 2015
20th Annual Network and Distributed System Security Symposium (NDSS); Feb. 2015
Social Science Research Network (SSRN); Jan. 2015
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 1, pp. 2-15; Jan. 2015
SPIE 9409, Media Watermarking, Security, and Forensics, vol. 9409, pp. 9409-9409-11; Mar. 2015
Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 333-338; Mar. 2015
IEEE Transactions on Computers (TC), vol. 64, issue 3, pp. 733-746; Mar. 2015
Proceedings of the GOMACTECH; Mar. 2015
Very Large Data Bases (VLDB) Journal, vol. 24, issue 1, pp. 1-24; Feb. 2015
IEEE Transactions on Computers (TC), vol. 64, issue 2, pp. 410-424; Feb. 2015
2014
5th ACM Symposium on Computing for Development (DEV), pp. 1-10; Dec. 2014
IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, issue 12, p. 2277-2290; Dec. 2014
IEEE 22nd International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 1-6; Oct. 2014
IEEE International Conference on Image Processing (ICIP), pp. 5332-5336; Oct. 2014
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2014
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2014
IEEE International Conference on Image Processing (ICIP), pp. 5537-5541; Oct. 2014
Messaging, Malware and Mobile Anti-Abuse Working Group (MAAWG); Aug. 2014
Proceedings of the IEEE, vol. 102, issue 8, pp. 1266-1282; Aug. 2014
Symposium On Usable Privacy and Security (SOUPS), pp. 129-142; Jul. 2014
51st ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2014
Speech Communication, vol. 61, issue 6, pp. 1-16; Jun. 2014
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 142-147; May 2014
19th IEEE European Test Symposium (ETS), pp. 1-6; May 2014
IEEE 32nd VLSI Test Symposium (VTS), pp. 1-6; Apr. 2014
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, issue 3, pp. 516-521; Mar. 2014
4th ACM conference on Data and Application Security and Privacy (CODASPY), pp. 289-296; Mar. 2014
2013
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 48-68; Oct. 2013
Elsevier Digital Signal Processing, vol. 23, issue 5, pp. 1720-1730; Sep. 2013
IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 272-277; Sep. 2013
22nd USENIX Security Symposium, pp. 589-604; Aug. 2013
Multimedia Communications, Services and Security (MCSS), pp. 71-81; Jun. 2013
18th IEEE European Test Symposium (ETS), pp. 1-6, May 2013
14th Latin American Test Workshop (LATW), pp. 1-1; Apr. 2013
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1259-1264; Mar. 2013
U.S. Patent No. US 8374386 B2; Feb. 2013
1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA’13), pp. 1-6; Feb. 2013
2012
IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, issue 4, pp. 1404-1413; Aug. 2012
49th ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 83-89; Jun. 2012
Government MicroCircuit Applications and Critical Technology Conference; Mar. 2012
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 953-958; Mar. 2012
2011
IEEE 29th VLSI Test Symposium, pp. 105-110; May 2011
2010
Proceedings of SPIE, Media Forensics and Security II, vol. 7541, pp. 7541-7541-8; Jan. 2010