Follow
Domenic Forte
Title
Cited by
Cited by
Year
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5132016
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
3002016
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1, 85-102, 2017
2872017
Counterfeit integrated circuits
M Tehranipoor, U Guin, D Forte, M Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits: Detection and Avoidance, 15-36, 2015
2222015
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
X Xu, B Shakya, MM Tehranipoor, D Forte
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
2082017
On reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1792015
On application of one-class SVM to reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
Fifteenth International Symposium on Quality Electronic Design, 47-54, 2014
1662014
Temperature tracking: An innovative run-time approach for hardware Trojan detection
D Forte, C Bao, A Srivastava
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 532-539, 2013
1602013
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
1562014
An aging-resistant RO-PUF for reliable key generation
MT Rahman, F Rahman, D Forte, M Tehranipoor
IEEE Transactions on Emerging Topics in Computing 4 (3), 335-348, 2015
1502015
ARO-PUF: An aging-resistant ring oscillator PUF design
MT Rahman, D Forte, J Fahrny, M Tehranipoor
2014 design, automation & test in Europe conference & exhibition (DATE), 1-6, 2014
1282014
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
1192014
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1182016
Anti-counterfeit techniques: From design to resign
U Guin, D Forte, M Tehranipoor
2013 14th International workshop on microprocessor test and verification, 89-94, 2013
1082013
Highly reliable key generation from electrocardiogram (ECG)
N Karimian, Z Guo, M Tehranipoor, D Forte
IEEE Transactions on Biomedical Engineering 64 (6), 1400-1411, 2016
1072016
Probing attacks on integrated circuits: Challenges and research opportunities
H Wang, D Forte, MM Tehranipoor, Q Shi
IEEE Design & Test 34 (5), 63-71, 2017
982017
Memristor PUF—A security primitive: Theory and experiment
A Mazady, MT Rahman, D Forte, M Anwar
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5 (2 …, 2015
972015
Temperature tracking: Toward robust run-time detection of hardware Trojans
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
972015
Aging analysis for recycled FPGA detection
H Dogan, D Forte, MM Tehranipoor
2014 IEEE international symposium on defect and fault tolerance in VLSI and …, 2014
962014
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
952015
The system can't perform the operation now. Try again later.
Articles 1–20