Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
hardware security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
14
Look more..
(2/119)
Export
export all inquiry results
(14)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
book article
2
book article
Development of a power electronics controller with RISC-V based core for security-critical applications
Swakath, S. U.
;
Kshirsagar, Abhijit
;
Kondepu, Koteswararao
;
Banavath, Satish Naik
;
Chub, Andrii
;
Vinnikov, Dmitri
2022 IEEE 63th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON): conference proceedings
2022
/
p. 1-5
https://doi.org/10.1109/RTUCON56726.2022.9978737
book article
3
journal article EST
/
journal article ENG
EFIC-ME : a fast emulation based fault injection control and monitoring enhancement
Abideen, Zain Ul
;
Rashid, Muhammad Haroon
IEEE Access
2020
/
p. 207705-207716
https://doi.org/10.1109/ACCESS.2020.3038198
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
4
journal article EST
/
journal article ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
5
book article
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
book article
6
journal article
Impact of orientation on the bias of SRAM-based PUFs
Abideen, Zain Ul
;
Wang, Rui
;
Perez, Tiago Diadami
;
Schrijen, Geert-Jan
;
Pagliarini, Samuel Nascimento
IEEE design & test
2023
/
1 p
https://doi.org/10.1109/MDAT.2023.3322621
journal article
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
7
book article
Leveraging layout-based effects for locking analog ICs
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel Nascimento
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
2022
/
p. 5-13
https://doi.org/10.1145/3560834.3563826
book article
8
journal article
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
journal article
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
9
book article EST
/
book article ENG
A pragmatic methodology for blind hardware trojan insertion in finalized layouts
Hepp, Alexander
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
;
Sigl, Georg
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
2022
/
art. 69, p. 1-9 : ill
https://doi.org/10.1145/3508352.3549452
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
10
journal article EST
/
journal article ENG
Ransomware attack as Hardware Trojan : a feasibility and demonstration study
Almeida, Felipe
;
Imran, Malik
;
Raik, Jaan
;
Pagliarini, Samuel Nascimento
IEEE Access
2022
/
p. 44827-44839
https://doi.org/10.1109/ACCESS.2022.3168991
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
11
book article
Representing gate-level SET faults by multiple SEU faults on RT-level
Bagbaba, Ahmet Cagri
;
Jenihhin, Maksim
;
Ubar, Raimund-Johannes
;
Sauer, Christian
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), 13-15 July 2020 : proceedings
2020
/
art. 19889351, 6 p. : ill
https://doi.org/10.1109/IOLTS50870.2020.9159715
book article
Seotud publikatsioonid
1
Methods to optimize functional safety assessment for automotive integrated circuits = Meetodid autotööstuse kiipide funktsionaalse ohutuse hindamise optimeerimiseks
12
book article
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
book article
13
book article EST
/
book article ENG
Side-channel Trojan insertion - a practical foundry-side attack via ECO
Perez, Tiago Diadami
;
Imran, Malik
;
Vaz, Pablo
;
Pagliarini, Samuel Nascimento
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings
2021
/
5 p. : ill
https://doi.org/10.1109/ISCAS51556.2021.9401481
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
14
journal article EST
/
journal article ENG
A survey on split manufacturing : attacks, defenses, and challenges
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Access
2020
/
p. 184013-184035
https://doi.org/10.1109/ACCESS.2020.3029339
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
Number of records 14, displaying
1 - 14
keyword
117
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
crypto-hardware
7.
Embedded hardware
8.
hardware
9.
hardware accelerator
10.
hardware close programming
11.
hardware customization
12.
hardware design
13.
hardware for the IoT
14.
hardware implementation
15.
hardware in the loop
16.
hardware Obfuscation
17.
hardware rejuvenation
18.
hardware trojan horse
19.
Hardware Trojan Horses
20.
hardware trojans
21.
Hardware Verification
22.
hardware/software co-design
23.
hardware-in-the loop simulation
24.
Hardware-in-the-Loop simulation
25.
open hardware
26.
open source hardware
27.
opensource hardware
28.
open-source hardware
29.
power-hardware-in-the-loop
30.
reconfigurable hardware
31.
software/hardware partitioning
32.
software/hardware systems
33.
special-purpose hardware
34.
trustworthy hardware
35.
ad-hoc sensor networks security
36.
Blockchain security
37.
cache security
38.
communication system security
39.
comprehensive system of economic security
40.
computer security
41.
cooperative security dilemma
42.
cyber security
43.
cyber security education
44.
cyber security exercises
45.
cyber security strategies
46.
cyber-security
47.
data security
48.
development of security cameras
49.
drinking water security
50.
economic security
51.
economic security of enterprise
52.
emotional security
53.
energy security
54.
energy security indicator
55.
graded security
56.
human security
57.
information security
58.
internal security
59.
international security
60.
investment and innovation security
61.
IPv6 security
62.
IT security
63.
job security
64.
long-term security
65.
metadata model for security measures
66.
Middle Eastern security
67.
Mobile security
68.
national cyber security strategy
69.
national security
70.
NATO. Science for Peace and Security Program
71.
network security
72.
network security monitoring
73.
OSCE (Organization for Security and Co-operation in Europe)
74.
passenger’s security
75.
policy-based routing security
76.
political and security cultures
77.
post-quantum security
78.
power system security
79.
quantitative security
80.
regional security
81.
security
82.
security and privacy
83.
security and privacy in smart grids
84.
security closure
85.
Security Coverage
86.
security dataset
87.
security dilemma
88.
Security evaluation
89.
security log analysis
90.
security management
91.
security model
92.
security monitoring
93.
security notion
94.
security objectives
95.
security of data
96.
security of supply
97.
security operation center
98.
security patterns
99.
security problem definition
100.
security proof
101.
security protocols
102.
security requirements
103.
security requirements engineering
104.
security risk assessment
105.
security risk management
106.
security strategies
107.
security systems for military objects
108.
security testing
109.
security training
110.
security verification
111.
social security planning
112.
societal security
113.
system of economic security
114.
system security
115.
terrorism security
116.
transmission System Security
117.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT