Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
hardware security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
15
Look more..
(2/140)
Export
export all inquiry results
(15)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
book article
Related publications
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
2
book article
Development of a power electronics controller with RISC-V based core for security-critical applications
Swakath, S. U.
;
Kshirsagar, Abhijit
;
Kondepu, Koteswararao
;
Banavath, Satish Naik
;
Chub, Andrii
;
Vinnikov, Dmitri
2022 IEEE 63th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON): conference proceedings
2022
/
p. 1-5
https://doi.org/10.1109/RTUCON56726.2022.9978737
book article
3
journal article EST
/
journal article ENG
EFIC-ME : a fast emulation based fault injection control and monitoring enhancement
Abideen, Zain Ul
;
Rashid, Muhammad Haroon
IEEE Access
2020
/
p. 207705-207716
https://doi.org/10.1109/ACCESS.2020.3038198
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
5
book article
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
book article
6
journal article
Impact of orientation on the bias of SRAM-based PUFs
Abideen, Zain Ul
;
Wang, Rui
;
Perez, Tiago Diadami
;
Schrijen, Geert-Jan
;
Pagliarini, Samuel Nascimento
IEEE design & test
2024
/
p. 14-20
https://doi.org/10.1109/MDAT.2023.3322621
journal article
Related publications
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
7
book article
Leveraging layout-based effects for locking analog ICs
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel Nascimento
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
2022
/
p. 5-13
https://doi.org/10.1145/3560834.3563826
book article
8
journal article
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
journal article
Related publications
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
9
book article EST
/
book article ENG
A pragmatic methodology for blind hardware trojan insertion in finalized layouts
Hepp, Alexander
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
;
Sigl, Georg
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
2022
/
art. 69, p. 1-9 : ill
https://doi.org/10.1145/3508352.3549452
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
10
journal article EST
/
journal article ENG
Ransomware attack as Hardware Trojan : a feasibility and demonstration study
Almeida, Felipe
;
Imran, Malik
;
Raik, Jaan
;
Pagliarini, Samuel Nascimento
IEEE Access
2022
/
p. 44827-44839
https://doi.org/10.1109/ACCESS.2022.3168991
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
11
book article
Representing gate-level SET faults by multiple SEU faults on RT-level
Bagbaba, Ahmet Cagri
;
Jenihhin, Maksim
;
Ubar, Raimund-Johannes
;
Sauer, Christian
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), 13-15 July 2020 : proceedings
2020
/
art. 19889351, 6 p. : ill
https://doi.org/10.1109/IOLTS50870.2020.9159715
book article
Related publications
1
Methods to optimize functional safety assessment for automotive integrated circuits = Meetodid autotööstuse kiipide funktsionaalse ohutuse hindamise optimeerimiseks
12
book article
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
book article
Related publications
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
13
journal article
SALSy : security-aware layout synthesis
Eslami, Mohammad
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
arXiv.org
2024
/
13 p. : ill
https://doi.org/10.48550/arXiv.2308.06201
journal article
Related publications
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
14
book article EST
/
book article ENG
Side-channel Trojan insertion - a practical foundry-side attack via ECO
Perez, Tiago Diadami
;
Imran, Malik
;
Vaz, Pablo
;
Pagliarini, Samuel Nascimento
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings
2021
/
5 p. : ill
https://doi.org/10.1109/ISCAS51556.2021.9401481
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
15
journal article EST
/
journal article ENG
A survey on split manufacturing : attacks, defenses, and challenges
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Access
2020
/
p. 184013-184035
https://doi.org/10.1109/ACCESS.2020.3029339
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
Number of records 15, displaying
1 - 15
keyword
138
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
crypto-hardware
7.
DNN hardware accelerator
8.
Embedded hardware
9.
hardware
10.
hardware acceleration
11.
hardware accelerator
12.
hardware close programming
13.
hardware customization
14.
hardware design
15.
hardware for the IoT
16.
hardware implementation
17.
hardware in the loop
18.
hardware Obfuscation
19.
hardware problems
20.
hardware rejuvenation
21.
hardware reliability
22.
Hardware Trojan
23.
hardware trojan horse
24.
Hardware Trojan Horses
25.
hardware trojans
26.
Hardware Verification
27.
hardware/software co-design
28.
hardware-in-the loop simulation
29.
hardware-in-the-loop
30.
Hardware-in-the-Loop simulation
31.
integer-only hardware
32.
open hardware
33.
open source hardware
34.
opensource hardware
35.
open-source hardware
36.
power-hardware-in-the-loop
37.
reconfigurable hardware
38.
software/hardware partitioning
39.
software/hardware systems
40.
special-purpose hardware
41.
trustworthy hardware
42.
ad-hoc sensor networks security
43.
Automatic Security Verification
44.
Blockchain security
45.
cache security
46.
communication system security
47.
comprehensive system of economic security
48.
computer security
49.
cooperative security dilemma
50.
cyber security
51.
cyber security education
52.
cyber security exercises
53.
cyber security strategies
54.
cyber-security
55.
data security
56.
development of security cameras
57.
drinking water security
58.
economic security
59.
economic security of enterprise
60.
emotional security
61.
energy security
62.
energy security indicator
63.
Estonian information security standard
64.
graded security
65.
human security
66.
information security
67.
internal security
68.
international security
69.
investment and innovation security
70.
IPv6 security
71.
IT security
72.
IT security management
73.
job security
74.
long-term security
75.
metadata model for security measures
76.
Middle Eastern security
77.
Mobile security
78.
national cyber security strategy
79.
national security
80.
NATO. Science for Peace and Security Program
81.
network security
82.
network security monitoring
83.
OSCE (Organization for Security and Co-operation in Europe)
84.
passenger’s security
85.
policy-based routing security
86.
political and security cultures
87.
post-quantum security
88.
power system security
89.
quantitative security
90.
regional security
91.
RISC-V Security Verification
92.
safety and security testing
93.
security
94.
security adaptation
95.
security alert prioritization
96.
security analysis
97.
security and justice (AFSJ)
98.
security and privacy
99.
security and privacy in smart grids
100.
Security Assertion Mining
101.
security closure
102.
Security Coverage
103.
security dataset
104.
security dilemma
105.
Security evaluation
106.
security evaluation instruments
107.
security log analysis
108.
security management
109.
security model
110.
security monitoring
111.
security notion
112.
security objectives
113.
security of data
114.
security of supply
115.
security operation center
116.
security operations center
117.
security patterns
118.
security policy
119.
security problem definition
120.
security proof
121.
security protocols
122.
security requirements
123.
security requirements engineering
124.
security risk assessment
125.
security risk management
126.
security strategies
127.
security systems for military objects
128.
security testing
129.
security training
130.
security verification
131.
security-by-design
132.
social security planning
133.
societal security
134.
system of economic security
135.
system security
136.
terrorism security
137.
transmission System Security
138.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT