Bicky Shakya
Bicky Shakya
Graduate Student, University of Florida
Verified email at
Cited by
Cited by
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1, 85-102, 2017
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
X Xu, B Shakya, MM Tehranipoor, D Forte
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme
B Shakya, X Xu, M Tehranipoor, D Forte
IACR Transactions on Cryptographic Hardware and Embedded Systems, 175-202, 2020
Electronics supply chain integrity enabled by blockchain
X Xu, F Rahman, B Shakya, A Vassilev, D Forte, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (3 …, 2019
Development and evaluation of hardware obfuscation benchmarks
S Amir, B Shakya, X Xu, Y Jin, S Bhunia, M Tehranipoor, D Forte
Journal of Hardware and Systems Security 2, 142-161, 2018
Covert gates: Protecting integrated circuits with undetectable camouflaging
B Shakya, H Shen, M Tehranipoor, D Forte
IACR transactions on cryptographic hardware and embedded systems, 86-118, 2019
Introduction to hardware obfuscation: Motivation, methods and evaluation
B Shakya, MM Tehranipoor, S Bhunia, D Forte
Hardware Protection through Obfuscation, 3-32, 2017
Comparative analysis of hardware obfuscation for IP protection
S Amir, B Shakya, D Forte, M Tehranipoor, S Bhunia
Proceedings of the on Great Lakes Symposium on VLSI 2017, 363-368, 2017
Security beyond CMOS: fundamentals, applications, and roadmap
F Rahman, B Shakya, X Xu, D Forte, M Tehranipoor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017
Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication
B Shakya, N Asadizanjani, D Forte, M Tehranipoor
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2016
Performance optimization for on-chip sensors to detect recycled ICs
B Shakya, U Guin, M Tehranipoor, D Forte
2015 33rd IEEE International Conference on Computer Design (ICCD), 289-295, 2015
EMFORCED: EM-based fingerprinting framework for counterfeit detection with demonstration on remarked and cloned ICs
A Stern, U Botero, B Shakya, H Shen, D Forte, M Tehranipoor
2018 IEEE International Test Conference (ITC), 1-9, 2018
Circuit edit and obfuscation for trusted chip fabrication
MM Tehranipoor, DJ Forte, B Shakya, N Asadizanjani
US Patent 11,030,348, 2021
Defeating cas-unlock
B Shakya, X Xu, M Tehranipoor, D Forte
Cryptology ePrint Archive, 2020
Poly-Si-based physical unclonable functions
H Shen, F Rahman, B Shakya, X Xu, M Tehranipoor, D Forte
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (11 …, 2017
Hardware IP Watermarking
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 203-222, 2015
Resistance drift and crystallization in suspended and On-oxide phase change memory line cells
A Gorbenko, N Noor, S Muneer, RS Khan, F Dirisaglik, A Cywar, ...
2019 IEEE 19th International Conference on Nanotechnology (IEEE-NANO), 417-420, 2019
A new methodology to protect PCBs from nondestructive reverse engineering
Z Guo, B Shakya, H Shen, S Bhunia, N Asadizanjani, M Tehranipoor, ...
ISTFA 2016, 347-356, 2016
Selective enhancement of randomness at the materials level: Poly-Si based physical unclonable functions (PUFs)
HT Shen, F Rahman, B Shakya, M Tehranipoor, D Forte
2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 188-193, 2016
Development of an electrolarynx capable of supporting tonal distinctions in mandarin
B Shakya, V Bharam, A Merchen
The system can't perform the operation now. Try again later.
Articles 1–20