Seetharam Narasimhan
Seetharam Narasimhan
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Hardware Trojan attacks: Threat analysis and countermeasures
S Bhunia, MS Hsiao, M Banga, S Narasimhan
Proceedings of the IEEE 102 (8), 1229-1247, 2014
Hardware Trojan: Threats and emerging solutions
RS Chakraborty, S Narasimhan, S Bhunia
2009 IEEE International high level design validation and test workshop, 166-171, 2009
Hardware Trojan detection by multiple-parameter side-channel analysis
S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ...
IEEE Transactions on computers 62 (11), 2183-2195, 2012
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ...
2010 IEEE international symposium on hardware-oriented security and trust …, 2010
TeSR: A robust temporal self-referencing approach for hardware Trojan detection
S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011
Self-referencing: A scalable side-channel approach for hardware Trojan detection
D Du, S Narasimhan, RS Chakraborty, S Bhunia
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
MECCA: A robust low-overhead PUF using embedded memory array
AR Krishna, S Narasimhan, X Wang, S Bhunia
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
Improving IC security against Trojan attacks through integration of security monitors
S Narasimhan, W Yueh, X Wang, S Mukhopadhyay, S Bhunia
IEEE Design & Test of Computers 29 (5), 37-46, 2012
Protection of intellectual property cores through a design flow
RS Chakraborty, S Narasimhan, S Bhunia
US Patent 8,402,401, 2013
Design and validation for FPGA trust under hardware trojan attacks
S Mal-Sarkar, R Karam, S Narasimhan, A Ghosh, A Krishna, S Bhunia
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 186-198, 2016
Sequential hardware trojan: Side-channel aware design and placement
X Wang, S Narasimhan, A Krishna, T Mal-Sarkar, S Bhunia
2011 IEEE 29th International Conference on Computer Design (ICCD), 297-300, 2011
Golden-free hardware Trojan detection with high sensitivity under process noise
T Hoque, S Narasimhan, X Wang, S Mal-Sarkar, S Bhunia
Journal of Electronic Testing 33, 107-124, 2017
Role of power grid in side channel attack and power-grid-aware secure design
X Wang, W Yueh, DB Roy, S Narasimhan, Y Zheng, S Mukhopadhyay, ...
Proceedings of the 50th Annual Design Automation Conference, 1-9, 2013
Software exploitable hardware Trojans in embedded processor
X Wang, T Mal-Sarkar, A Krishna, S Narasimhan, S Bhunia
2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2012
Hardware trojan detection
S Narasimhan, S Bhunia
Introduction to Hardware Security and Trust, 339-364, 2011
Hardware IP protection during evaluation using embedded sequential trojan
S Narasimhan, R Chakraborty, S Bhunia
IEEE Design & Test of Computers, 2011
Ultra-low-power and robust digital-signal-processing hardware for implantable neural interface microsystems
S Narasimhan, HJ Chiel, S Bhunia
IEEE transactions on biomedical circuits and systems 5 (2), 169-178, 2010
Hybridization of CMOS with CNT-based nano-electromechanical switch for low leakage and robust circuit design
RS Chakraborty, S Narasimhan, S Bhunia
IEEE Transactions on Circuits and Systems I: Regular Papers 54 (11), 2480-2488, 2007
KiMS: Kids' Health Monitoring System at day-care centers using wearable sensors and vocabulary-based acoustic signal processing
A Basak, S Narasimhan, S Bhunia
2011 IEEE 13th International Conference on e-Health Networking, Applications …, 2011
A supply-demand model based scalable energy management system for improved energy utilization efficiency
S Narasimhan, D McIntyre, F Wolff, Y Zhou, D Weyer, S Bhunia
International Conference on Green Computing, 97-105, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20