Follow
Swarup Bhunia
Title
Cited by
Cited by
Year
Hardware Trojan attacks: Threat analysis and countermeasures
S Bhunia, MS Hsiao, M Banga, S Narasimhan
Proceedings of the IEEE 102 (8), 1229-1247, 2014
8682014
Hardware Trojan: Threats and emerging solutions
RS Chakraborty, S Narasimhan, S Bhunia
2009 IEEE International high level design validation and test workshop, 166-171, 2009
5942009
MERO: A Statistical Approach for Hardware Trojan Detection
RS Chakraborty, F Wolff, S Paul, C Papachristou, S Bhunia
International Workshop on Cryptographic Hardware and Embedded Systems, 396-410, 2009
5862009
HARPOON: An obfuscation-based SoC design methodology for hardware protection
RS Chakraborty, S Bhunia
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2009
5852009
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5452016
Towards Trojan-free trusted ICs: Problem analysis and detection scheme
F Wolff, C Papachristou, S Bhunia, RS Chakraborty
Proceedings of the conference on Design, automation and test in Europe, 1362 …, 2008
4492008
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1, 85-102, 2017
3202017
Hardware Trojan detection by multiple-parameter side-channel analysis
S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ...
IEEE Transactions on computers 62 (11), 2183-2195, 2012
2782012
Electromechanical computing at 500 C with silicon carbide
TH Lee, S Bhunia, M Mehregany
Science 329 (5997), 1316-1318, 2010
2642010
Security against hardware Trojan through a novel application of design obfuscation
RS Chakraborty, S Bhunia
Proceedings of the 2009 International Conference on Computer-Aided Design …, 2009
2532009
Hardware security: a hands-on learning approach
S Bhunia, MM Tehranipoor
Morgan Kaufmann, 2018
2222018
Hardware protection and authentication through netlist level obfuscation
RS Chakraborty, S Bhunia
2008 IEEE/ACM International Conference on Computer-Aided Design, 674-677, 2008
1972008
Emerging trends in design and applications of memory-based computing and content-addressable memories
R Karam, R Puri, S Ghosh, S Bhunia
Proceedings of the IEEE 103 (8), 1311-1330, 2015
1942015
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ...
2010 IEEE international symposium on hardware-oriented security and trust …, 2010
1812010
Protection against hardware trojan attacks: Towards a comprehensive solution
S Bhunia, M Abramovici, D Agrawal, P Bradley, MS Hsiao, J Plusquellic, ...
IEEE Design & Test 30 (3), 6-17, 2013
1792013
Low-power scan design using first-level supply gating
S Bhunia, H Mahmoodi, D Ghosh, S Mukhopadhyay, K Roy
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13 (3), 384-395, 2005
1702005
TeSR: A robust temporal self-referencing approach for hardware Trojan detection
S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011
1672011
Deterministic clock gating for microprocessor power reduction
H Li, S Bhunia, Y Chen, TN Vijaykumar, K Roy
The Ninth International Symposium on High-Performance Computer Architecture …, 2003
1522003
Self-referencing: A scalable side-channel approach for hardware Trojan detection
D Du, S Narasimhan, RS Chakraborty, S Bhunia
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
1502010
RTL hardware IP protection using key-based control and data flow obfuscation
RS Chakraborty, S Bhunia
2010 23rd International Conference on VLSI Design, 405-410, 2010
1492010
The system can't perform the operation now. Try again later.
Articles 1–20