Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
hardware security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
17
Vaata veel..
(2/169)
Ekspordi
ekspordi kõik päringu tulemused
(17)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
ACM computing surveys
2024
/
art. 299, 35 p. : ill
https://doi.org/10.1145/3677118
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
3
artikkel kogumikus
Development of a power electronics controller with RISC-V based core for security-critical applications
Swakath, S. U.
;
Kshirsagar, Abhijit
;
Kondepu, Koteswararao
;
Banavath, Satish Naik
;
Chub, Andrii
;
Vinnikov, Dmitri
2022 IEEE 63th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON): conference proceedings
2022
/
p. 1-5
https://doi.org/10.1109/RTUCON56726.2022.9978737
artikkel kogumikus
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
EFIC-ME : a fast emulation based fault injection control and monitoring enhancement
Abideen, Zain Ul
;
Rashid, Muhammad Haroon
IEEE Access
2020
/
p. 207705-207716
https://doi.org/10.1109/ACCESS.2020.3038198
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
6
artikkel kogumikus
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
artikkel kogumikus
7
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Impact of orientation on the bias of SRAM-based PUFs
Abideen, Zain Ul
;
Wang, Rui
;
Perez, Tiago Diadami
;
Schrijen, Geert-Jan
;
Pagliarini, Samuel Nascimento
IEEE design & test
2024
/
p. 14-20
https://doi.org/10.1109/MDAT.2023.3322621
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
8
artikkel kogumikus
Leveraging layout-based effects for locking analog ICs
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel Nascimento
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
2022
/
p. 5-13
https://doi.org/10.1145/3560834.3563826
artikkel kogumikus
9
artikkel ajakirjas
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
artikkel ajakirjas
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
10
artikkel kogumikus EST
/
artikkel kogumikus ENG
A pragmatic methodology for blind hardware trojan insertion in finalized layouts
Hepp, Alexander
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
;
Sigl, Georg
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
2022
/
art. 69, p. 1-9 : ill
https://doi.org/10.1145/3508352.3549452
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
11
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ransomware attack as Hardware Trojan : a feasibility and demonstration study
Almeida, Felipe
;
Imran, Malik
;
Raik, Jaan
;
Pagliarini, Samuel Nascimento
IEEE Access
2022
/
p. 44827-44839
https://doi.org/10.1109/ACCESS.2022.3168991
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
12
artikkel kogumikus
Representing gate-level SET faults by multiple SEU faults on RT-level
Bagbaba, Ahmet Cagri
;
Jenihhin, Maksim
;
Ubar, Raimund-Johannes
;
Sauer, Christian
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), 13-15 July 2020 : proceedings
2020
/
art. 19889351, 6 p. : ill
https://doi.org/10.1109/IOLTS50870.2020.9159715
artikkel kogumikus
Seotud publikatsioonid
1
Methods to optimize functional safety assessment for automotive integrated circuits = Meetodid autotööstuse kiipide funktsionaalse ohutuse hindamise optimeerimiseks
13
artikkel kogumikus
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
14
artikkel ajakirjas
SALSy : security-aware layout synthesis
Eslami, Mohammad
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
arXiv.org
2024
/
13 p. : ill
https://doi.org/10.48550/arXiv.2308.06201
artikkel ajakirjas
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
15
artikkel kogumikus EST
/
artikkel kogumikus ENG
Side-channel Trojan insertion - a practical foundry-side attack via ECO
Perez, Tiago Diadami
;
Imran, Malik
;
Vaz, Pablo
;
Pagliarini, Samuel Nascimento
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings
2021
/
5 p. : ill
https://doi.org/10.1109/ISCAS51556.2021.9401481
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
16
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A survey on split manufacturing : attacks, defenses, and challenges
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Access
2020
/
p. 184013-184035
https://doi.org/10.1109/ACCESS.2020.3029339
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
17
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Utilizing layout effects for analog logic locking
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel
Journal of Cryptographic Engineering
2024
/
p. 311-324
https://doi.org/10.1007/s13389-024-00350-8
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 17, kuvan
1 - 17
võtmesõna
167
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
Computer software and hardware
7.
crypto-hardware
8.
DNN hardware accelerator
9.
Embedded hardware
10.
hardware
11.
hardware acceleration
12.
hardware accelerator
13.
hardware close programming
14.
hardware customization
15.
hardware design
16.
hardware for the IoT
17.
hardware implementation
18.
hardware in the loop
19.
hardware Obfuscation
20.
hardware problems
21.
hardware rejuvenation
22.
hardware reliability
23.
Hardware Trojan
24.
hardware trojan horse
25.
Hardware Trojan Horses
26.
hardware trojans
27.
Hardware Trojans (HT)
28.
Hardware Verification
29.
hardware/software co-design
30.
hardware-in-the loop simulation
31.
hardware-in-the-loop
32.
Hardware-in-the-Loop simulation
33.
hardware-software integration in robotics
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
software/hardware systems
43.
special-purpose hardware
44.
trustworthy hardware
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
cloud security
50.
communication system security
51.
comprehensive system of economic security
52.
computer security
53.
cooperative security dilemma
54.
cyber security
55.
cyber security education
56.
cyber security exercises
57.
cyber security monitoring
58.
cyber security monitoring in maritime
59.
cyber security strategies
60.
cyber-physical system security
61.
cyber-security
62.
data and information security
63.
data security
64.
development of security cameras
65.
digital security practices
66.
drinking water security
67.
economic security
68.
economic security of enterprise
69.
emotional security
70.
energy security
71.
energy security indicator
72.
Estonian information security standard
73.
graded security
74.
high level of security
75.
Homeland security
76.
human security
77.
information security
78.
information security and privacy
79.
initial level of security
80.
internal security
81.
international security
82.
investment and innovation security
83.
IPv6 security
84.
IT security
85.
IT security management
86.
job security
87.
long-term security
88.
maritime cyber security
89.
maritime cyber security operations centers
90.
Maritime Security Operations Center (M-SOC)
91.
medium level of security
92.
metadata model for security measures
93.
Middle Eastern security
94.
Mobile security
95.
national cyber security strategy
96.
national security
97.
NATO. Science for Peace and Security Program
98.
network security
99.
network security monitoring
100.
OSCE (Organization for Security and Co-operation in Europe)
101.
passenger’s security
102.
policy-based routing security
103.
political and security cultures
104.
post-quantum security
105.
power system security
106.
quantitative security
107.
regional security
108.
RISC-V Security Verification
109.
Safety and Security in Sea Transportation
110.
safety and security testing
111.
security
112.
security adaptation
113.
security alert prioritization
114.
security analysis
115.
security and justice (AFSJ)
116.
Security and political science
117.
security and privacy
118.
security and privacy in smart grids
119.
Security Assertion
120.
Security Assertion Mining
121.
security closure
122.
Security Coverage
123.
security dataset
124.
security dilemma
125.
Security evaluation
126.
security evaluation instruments
127.
Security Level Evaluation
128.
Security limitations
129.
security log analysis
130.
security management
131.
security model
132.
security monitoring
133.
security notion
134.
security objectives
135.
security of data
136.
security of supply
137.
security operation center
138.
security operations center
139.
security patterns
140.
security policy
141.
security problem definition
142.
security proof
143.
security protocols
144.
security requirements
145.
security requirements engineering
146.
security research
147.
security risk assessment
148.
security risk management
149.
security risks
150.
security science and technology
151.
security strategies
152.
security systems for military objects
153.
security testing
154.
security training
155.
security verification
156.
security-by-design
157.
social security planning
158.
societal security
159.
software security
160.
software security level
161.
software security subcharacteristics
162.
sufficient level of security
163.
system of economic security
164.
system security
165.
terrorism security
166.
transmission System Security
167.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT