Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
hardware security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
17
Vaata veel..
(2/150)
Ekspordi
ekspordi kõik päringu tulemused
(17)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
ACM computing surveys
2024
/
art. 299, 35 p. : ill
https://doi.org/10.1145/3677118
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
2
artikkel kogumikus
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
3
artikkel kogumikus
Development of a power electronics controller with RISC-V based core for security-critical applications
Swakath, S. U.
;
Kshirsagar, Abhijit
;
Kondepu, Koteswararao
;
Banavath, Satish Naik
;
Chub, Andrii
;
Vinnikov, Dmitri
2022 IEEE 63th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON): conference proceedings
2022
/
p. 1-5
https://doi.org/10.1109/RTUCON56726.2022.9978737
artikkel kogumikus
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
EFIC-ME : a fast emulation based fault injection control and monitoring enhancement
Abideen, Zain Ul
;
Rashid, Muhammad Haroon
IEEE Access
2020
/
p. 207705-207716
https://doi.org/10.1109/ACCESS.2020.3038198
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
5
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
6
artikkel kogumikus
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
artikkel kogumikus
7
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Impact of orientation on the bias of SRAM-based PUFs
Abideen, Zain Ul
;
Wang, Rui
;
Perez, Tiago Diadami
;
Schrijen, Geert-Jan
;
Pagliarini, Samuel Nascimento
IEEE design & test
2024
/
p. 14-20
https://doi.org/10.1109/MDAT.2023.3322621
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
8
artikkel kogumikus
Leveraging layout-based effects for locking analog ICs
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel Nascimento
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
2022
/
p. 5-13
https://doi.org/10.1145/3560834.3563826
artikkel kogumikus
9
artikkel ajakirjas
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
artikkel ajakirjas
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
10
artikkel kogumikus EST
/
artikkel kogumikus ENG
A pragmatic methodology for blind hardware trojan insertion in finalized layouts
Hepp, Alexander
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
;
Sigl, Georg
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
2022
/
art. 69, p. 1-9 : ill
https://doi.org/10.1145/3508352.3549452
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
11
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ransomware attack as Hardware Trojan : a feasibility and demonstration study
Almeida, Felipe
;
Imran, Malik
;
Raik, Jaan
;
Pagliarini, Samuel Nascimento
IEEE Access
2022
/
p. 44827-44839
https://doi.org/10.1109/ACCESS.2022.3168991
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
12
artikkel kogumikus
Representing gate-level SET faults by multiple SEU faults on RT-level
Bagbaba, Ahmet Cagri
;
Jenihhin, Maksim
;
Ubar, Raimund-Johannes
;
Sauer, Christian
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), 13-15 July 2020 : proceedings
2020
/
art. 19889351, 6 p. : ill
https://doi.org/10.1109/IOLTS50870.2020.9159715
artikkel kogumikus
Seotud publikatsioonid
1
Methods to optimize functional safety assessment for automotive integrated circuits = Meetodid autotööstuse kiipide funktsionaalse ohutuse hindamise optimeerimiseks
13
artikkel kogumikus
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
14
artikkel ajakirjas
SALSy : security-aware layout synthesis
Eslami, Mohammad
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
arXiv.org
2024
/
13 p. : ill
https://doi.org/10.48550/arXiv.2308.06201
artikkel ajakirjas
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
15
artikkel kogumikus EST
/
artikkel kogumikus ENG
Side-channel Trojan insertion - a practical foundry-side attack via ECO
Perez, Tiago Diadami
;
Imran, Malik
;
Vaz, Pablo
;
Pagliarini, Samuel Nascimento
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings
2021
/
5 p. : ill
https://doi.org/10.1109/ISCAS51556.2021.9401481
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
16
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A survey on split manufacturing : attacks, defenses, and challenges
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Access
2020
/
p. 184013-184035
https://doi.org/10.1109/ACCESS.2020.3029339
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
17
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Utilizing layout effects for analog logic locking
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel
Journal of Cryptographic Engineering
2024
/
p. 311-324
https://doi.org/10.1007/s13389-024-00350-8
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 17, kuvan
1 - 17
võtmesõna
148
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
Computer software and hardware
7.
crypto-hardware
8.
DNN hardware accelerator
9.
Embedded hardware
10.
hardware
11.
hardware acceleration
12.
hardware accelerator
13.
hardware close programming
14.
hardware customization
15.
hardware design
16.
hardware for the IoT
17.
hardware implementation
18.
hardware in the loop
19.
hardware Obfuscation
20.
hardware problems
21.
hardware rejuvenation
22.
hardware reliability
23.
Hardware Trojan
24.
hardware trojan horse
25.
Hardware Trojan Horses
26.
hardware trojans
27.
Hardware Verification
28.
hardware/software co-design
29.
hardware-in-the loop simulation
30.
hardware-in-the-loop
31.
Hardware-in-the-Loop simulation
32.
integer-only hardware
33.
open hardware
34.
open source hardware
35.
opensource hardware
36.
open-source hardware
37.
power-hardware-in-the-loop
38.
reconfigurable hardware
39.
software/hardware partitioning
40.
software/hardware systems
41.
special-purpose hardware
42.
trustworthy hardware
43.
ad-hoc sensor networks security
44.
Automatic Security Verification
45.
Blockchain security
46.
cache security
47.
communication system security
48.
comprehensive system of economic security
49.
computer security
50.
cooperative security dilemma
51.
cyber security
52.
cyber security education
53.
cyber security exercises
54.
cyber security monitoring
55.
cyber security strategies
56.
cyber-security
57.
data and information security
58.
data security
59.
development of security cameras
60.
digital security practices
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
human security
70.
information security
71.
information security and privacy
72.
internal security
73.
international security
74.
investment and innovation security
75.
IPv6 security
76.
IT security
77.
IT security management
78.
job security
79.
long-term security
80.
metadata model for security measures
81.
Middle Eastern security
82.
Mobile security
83.
national cyber security strategy
84.
national security
85.
NATO. Science for Peace and Security Program
86.
network security
87.
network security monitoring
88.
OSCE (Organization for Security and Co-operation in Europe)
89.
passenger’s security
90.
policy-based routing security
91.
political and security cultures
92.
post-quantum security
93.
power system security
94.
quantitative security
95.
regional security
96.
RISC-V Security Verification
97.
Safety and Security in Sea Transportation
98.
safety and security testing
99.
security
100.
security adaptation
101.
security alert prioritization
102.
security analysis
103.
security and justice (AFSJ)
104.
Security and political science
105.
security and privacy
106.
security and privacy in smart grids
107.
Security Assertion Mining
108.
security closure
109.
Security Coverage
110.
security dataset
111.
security dilemma
112.
Security evaluation
113.
security evaluation instruments
114.
Security limitations
115.
security log analysis
116.
security management
117.
security model
118.
security monitoring
119.
security notion
120.
security objectives
121.
security of data
122.
security of supply
123.
security operation center
124.
security operations center
125.
security patterns
126.
security policy
127.
security problem definition
128.
security proof
129.
security protocols
130.
security requirements
131.
security requirements engineering
132.
security risk assessment
133.
security risk management
134.
security risks
135.
security science and technology
136.
security strategies
137.
security systems for military objects
138.
security testing
139.
security training
140.
security verification
141.
security-by-design
142.
social security planning
143.
societal security
144.
system of economic security
145.
system security
146.
terrorism security
147.
transmission System Security
148.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT