AppSAT: Approximately deobfuscating integrated circuits K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 366 | 2017 |
Provably secure camouflaging strategy for IC protection M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan IEEE transactions on computer-aided design of integrated circuits and …, 2017 | 203 | 2017 |
Cyclic obfuscation for creating SAT-unresolvable circuits K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin Proceedings of the Great Lakes Symposium on VLSI 2017, 173-178, 2017 | 193 | 2017 |
IP protection and supply chain security through logic obfuscation: A systematic overview K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan, Y Jin ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (6 …, 2019 | 107 | 2019 |
Emerging technology-based design of primitives for hardware security Y Bi, K Shamsi, JS Yuan, PE Gaillardon, GD Micheli, X Yin, XS Hu, ... ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-19, 2016 | 102 | 2016 |
KC2: Key-condition crunching for fast sequential circuit deobfuscation K Shamsi, M Li, DZ Pan, Y Jin 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019 | 97 | 2019 |
On the approximation resiliency of logic locking and IC camouflaging schemes K Shamsi, T Meade, M Li, DZ Pan, Y Jin IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018 | 82 | 2018 |
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures K Shamsi, M Li, DZ Pan, Y Jin Proceedings of the 2018 on Great Lakes Symposium on VLSI, 147-152, 2018 | 75 | 2018 |
On the impossibility of approximation-resilient circuit locking K Shamsi, DZ Pan, Y Jin 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 65 | 2019 |
Tunnel FET current mode logic for DPA-resilient circuit designs Y Bi, K Shamsi, JS Yuan, Y Jin, M Niemier, XS Hu IEEE Transactions on Emerging Topics in Computing 5 (3), 340-352, 2016 | 50 | 2016 |
IcySAT: Improved SAT-based attacks on cyclic locked circuits K Shamsi, DZ Pan, Y Jin 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2019 | 37 | 2019 |
Enhancing hardware security with emerging transistor technologies Y Bi, XS Hu, Y Jin, M Niemier, K Shamsi, X Yin Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 305-310, 2016 | 37 | 2016 |
Security of emerging non-volatile memories: Attacks and defenses K Shamsi, Y Jin 2016 IEEE 34th VLSI Test Symposium (VTS), 1-4, 2016 | 36 | 2016 |
Leverage emerging technologies for DPA-resilient block cipher design Y Bi, K Shamsi, JS Yuan, FX Standaert, Y Jin 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2016 | 32 | 2016 |
R2D2: Runtime reassurance and detection of A2 Trojan Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu 2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018 | 31 | 2018 |
The old frontier of reverse engineering: Netlist partitioning T Meade, K Shamsi, T Le, J Di, S Zhang, Y Jin Journal of Hardware and Systems Security 2, 201-213, 2018 | 25 | 2018 |
TimingSAT: Decamouflaging timing-based logic obfuscation M Li, K Shamsi, Y Jin, DZ Pan 2018 IEEE International Test Conference (ITC), 1-10, 2018 | 21 | 2018 |
On-chip analog trojan detection framework for microprocessor trustworthiness Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 21 | 2018 |
Circuit obfuscation and oracle-guided attacks: Who can prevail? K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin Proceedings of the on Great Lakes Symposium on VLSI 2017, 357-362, 2017 | 18 | 2017 |
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices K Shamsi, Y Bi, Y Jin, PE Gaillardon, M Niemier, XS Hu 2015 33rd IEEE International Conference on Computer Design (ICCD), 343-350, 2015 | 18 | 2015 |