Folgen
xingyu meng
xingyu meng
Bestätigte E-Mail-Adresse bei utdallas.edu
Titel
Zitiert von
Zitiert von
Jahr
Rtl-contest: Concolic testing on rtl for detecting security vulnerabilities
X Meng, S Kundu, AK Kanuparthi, K Basu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
222021
Explainable machine learning for intrusion detection via hardware performance counters
AP Kuruvila, X Meng, S Kundu, G Pandey, K Basu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
202022
Application of machine learning in hardware trojan detection
S Kundu, X Meng, K Basu
2021 22nd International Symposium on Quality Electronic Design (ISQED), 414-419, 2021
172021
SeVNoC: Security validation of system-on-chip designs with NoC fabrics
X Meng, K Raj, S Ray, K Basu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
62022
Unlocking hardware security assurance: The potential of llms
X Meng, A Srivastava, A Arunachalam, A Ray, PH Silva, R Psiakis, ...
arXiv preprint arXiv:2308.11042, 2023
52023
Circuit topology-aware vaccination-based hardware trojan detection
R Hassan, X Meng, K Basu, SMP Dinakarrao
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
52023
SoCCAR: Detecting system-on-chip security violations under asynchronous resets
X Meng, K Raj, APD Nath, K Basu, S Ray
2021 58th ACM/IEEE Design Automation Conference (DAC), 625-630, 2021
42021
Can overclocking detect hardware trojans?
X Meng, R Hassan, SMP Dinakrrao, K Basu
2021 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2021
32021
A Semi-formal Information Flow Validation for Analyzing Secret Asset Propagation in COTS IC Integrated Systems
X Meng, M Hasan, K Basu, T Hoque
Proceedings of the Great Lakes Symposium on VLSI 2022, 417-422, 2022
12022
System-On-Chip Information Flow Validation Under Asynchronous Resets
SS Miftah, K Raj, X Meng, S Ray, K Basu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024
2024
Ensuring Hardware Robustness via Security Verification
X Meng
2023
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans
X Meng, A Sengupta, K Basu
Cryptology ePrint Archive, 2023
2023
ICCD 2022
A Chakraborty, A Abdurrob, A Foshie, A Asghar, AN Khelejani, A Becher, ...
SPECIAL ISSUE ON HARDWARE SECURITY IN EMERGING TECHNOLOGIES: VULNERABILITIES, ATTACKS AND SOLUTIONS
N Karimi, K Basu, CH Chang, JM Fung, W Liu, X Wang, C Liu, J Fung, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14