Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
hardware security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
15
Vaata veel..
(2/133)
Ekspordi
ekspordi kõik päringu tulemused
(15)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Benchmarking advanced security closure of physical layouts
Eslami, Mohammad
;
Knechtel, Johann
;
Sinanoglu, Ozgur
;
Karri, Ramesh
;
Pagliarini, Samuel Nascimento
ISPD '23 : proceedings of the 2023 International Symposium on Physical Design
2023
/
p. 256-264
https://doi.org/10.1145/3569052.3578924
https://dl.acm.org/doi/pdf/10.1145/3569052.3578924
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
2
artikkel kogumikus
Development of a power electronics controller with RISC-V based core for security-critical applications
Swakath, S. U.
;
Kshirsagar, Abhijit
;
Kondepu, Koteswararao
;
Banavath, Satish Naik
;
Chub, Andrii
;
Vinnikov, Dmitri
2022 IEEE 63th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON): conference proceedings
2022
/
p. 1-5
https://doi.org/10.1109/RTUCON56726.2022.9978737
artikkel kogumikus
3
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
EFIC-ME : a fast emulation based fault injection control and monitoring enhancement
Abideen, Zain Ul
;
Rashid, Muhammad Haroon
IEEE Access
2020
/
p. 207705-207716
https://doi.org/10.1109/ACCESS.2020.3038198
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
4
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Hardware trojan insertion in finalized layouts : from methodology to a silicon demonstration
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2023
/
p. 2094-2107
https://doi.org/10.1109/TCAD.2022.3223846
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
5
artikkel kogumikus
Hardware Trojans for confidence reduction and misclassifications on neural networks
Grailoo, Mahdieh
;
Leier, Mairo
;
Pagliarini, Samuel Nascimento
Proceedings Of The Twenty Third International Symposium On Quality Electronic Design (ISQED 2022)
2022
/
art. 180541, p. 230-235
https://doi.org/10.1109/ISQED54688.2022.9806246
artikkel kogumikus
6
artikkel ajakirjas
Impact of orientation on the bias of SRAM-based PUFs
Abideen, Zain Ul
;
Wang, Rui
;
Perez, Tiago Diadami
;
Schrijen, Geert-Jan
;
Pagliarini, Samuel Nascimento
IEEE design & test
2024
/
p. 14-20
https://doi.org/10.1109/MDAT.2023.3322621
artikkel ajakirjas
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
7
artikkel kogumikus
Leveraging layout-based effects for locking analog ICs
Aljafar, Muayad J.
;
Azais, Florence
;
Flottes, Marie-Lise
;
Pagliarini, Samuel Nascimento
ASHES'22: Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security
2022
/
p. 5-13
https://doi.org/10.1145/3560834.3563826
artikkel kogumikus
8
artikkel ajakirjas
An overview of FPGA-inspired obfuscation techniques
Abideen, Zain Ul
;
Gokulanathan, Sumathi
;
Aljafar, Muayad J.
;
Pagliarini, Samuel Nascimento
arXiv.org
2023
/
30 p. : ill
https://doi.org/10.48550/arXiv.2305.15999
artikkel ajakirjas
Seotud publikatsioonid
1
Leveraging FPGA Reconfigurability as an Obfuscation Asset = FPGA ümberkonfigureeritavuse rakendamine hägustamise vahendina
9
artikkel kogumikus EST
/
artikkel kogumikus ENG
A pragmatic methodology for blind hardware trojan insertion in finalized layouts
Hepp, Alexander
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
;
Sigl, Georg
ICCAD '22: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design
2022
/
art. 69, p. 1-9 : ill
https://doi.org/10.1145/3508352.3549452
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
10
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Ransomware attack as Hardware Trojan : a feasibility and demonstration study
Almeida, Felipe
;
Imran, Malik
;
Raik, Jaan
;
Pagliarini, Samuel Nascimento
IEEE Access
2022
/
p. 44827-44839
https://doi.org/10.1109/ACCESS.2022.3168991
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
11
artikkel kogumikus
Representing gate-level SET faults by multiple SEU faults on RT-level
Bagbaba, Ahmet Cagri
;
Jenihhin, Maksim
;
Ubar, Raimund-Johannes
;
Sauer, Christian
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), 13-15 July 2020 : proceedings
2020
/
art. 19889351, 6 p. : ill
https://doi.org/10.1109/IOLTS50870.2020.9159715
artikkel kogumikus
Seotud publikatsioonid
1
Methods to optimize functional safety assessment for automotive integrated circuits = Meetodid autotööstuse kiipide funktsionaalse ohutuse hindamise optimeerimiseks
12
artikkel kogumikus
Reusing verification assertions as security checkers for Hardware Trojan detection
Eslami, Mohammad
;
Ghasempouri, Tara
;
Pagliarini, Samuel Nascimento
2022 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA : 06-07 April 2022
2022
/
p. 1-6 : ill
https://doi.org/10.1109/ISQED54688.2022.9806292
artikkel kogumikus
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
13
artikkel ajakirjas
SALSy : security-aware layout synthesis
Eslami, Mohammad
;
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
arXiv.org
2024
/
13 p. : ill
https://doi.org/10.48550/arXiv.2308.06201
artikkel ajakirjas
Seotud publikatsioonid
1
On the use of defensive schemes for hardware security = Kaitseskeemid riistvara turvalisuse tagamiseks
14
artikkel kogumikus EST
/
artikkel kogumikus ENG
Side-channel Trojan insertion - a practical foundry-side attack via ECO
Perez, Tiago Diadami
;
Imran, Malik
;
Vaz, Pablo
;
Pagliarini, Samuel Nascimento
2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Korea, May 22-28, 2021 : proceedings
2021
/
5 p. : ill
https://doi.org/10.1109/ISCAS51556.2021.9401481
Conference Proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
15
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
A survey on split manufacturing : attacks, defenses, and challenges
Perez, Tiago Diadami
;
Pagliarini, Samuel Nascimento
IEEE Access
2020
/
p. 184013-184035
https://doi.org/10.1109/ACCESS.2020.3029339
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Seotud publikatsioonid
1
Security-aware physical synthesis of integrated circuits = Integraallülituste turvateadlik füüsiline süntees
Kirjeid leitud 15, kuvan
1 - 15
võtmesõna
131
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
crypto-hardware
7.
DNN hardware accelerator
8.
Embedded hardware
9.
hardware
10.
hardware accelerator
11.
hardware close programming
12.
hardware customization
13.
hardware design
14.
hardware for the IoT
15.
hardware implementation
16.
hardware in the loop
17.
hardware Obfuscation
18.
hardware problems
19.
hardware rejuvenation
20.
Hardware Trojan
21.
hardware trojan horse
22.
Hardware Trojan Horses
23.
hardware trojans
24.
Hardware Verification
25.
hardware/software co-design
26.
hardware-in-the loop simulation
27.
hardware-in-the-loop
28.
Hardware-in-the-Loop simulation
29.
integer-only hardware
30.
open hardware
31.
open source hardware
32.
opensource hardware
33.
open-source hardware
34.
power-hardware-in-the-loop
35.
reconfigurable hardware
36.
software/hardware partitioning
37.
software/hardware systems
38.
special-purpose hardware
39.
trustworthy hardware
40.
ad-hoc sensor networks security
41.
Automatic Security Verification
42.
Blockchain security
43.
cache security
44.
communication system security
45.
comprehensive system of economic security
46.
computer security
47.
cooperative security dilemma
48.
cyber security
49.
cyber security education
50.
cyber security exercises
51.
cyber security strategies
52.
cyber-security
53.
data security
54.
development of security cameras
55.
drinking water security
56.
economic security
57.
economic security of enterprise
58.
emotional security
59.
energy security
60.
energy security indicator
61.
Estonian information security standard
62.
graded security
63.
human security
64.
information security
65.
internal security
66.
international security
67.
investment and innovation security
68.
IPv6 security
69.
IT security
70.
IT security management
71.
job security
72.
long-term security
73.
metadata model for security measures
74.
Middle Eastern security
75.
Mobile security
76.
national cyber security strategy
77.
national security
78.
NATO. Science for Peace and Security Program
79.
network security
80.
network security monitoring
81.
OSCE (Organization for Security and Co-operation in Europe)
82.
passenger’s security
83.
policy-based routing security
84.
political and security cultures
85.
post-quantum security
86.
power system security
87.
quantitative security
88.
regional security
89.
RISC-V Security Verification
90.
security
91.
security adaptation
92.
security and justice (AFSJ)
93.
security and privacy
94.
security and privacy in smart grids
95.
Security Assertion Mining
96.
security closure
97.
Security Coverage
98.
security dataset
99.
security dilemma
100.
Security evaluation
101.
security evaluation instruments
102.
security log analysis
103.
security management
104.
security model
105.
security monitoring
106.
security notion
107.
security objectives
108.
security of data
109.
security of supply
110.
security operation center
111.
security patterns
112.
security policy
113.
security problem definition
114.
security proof
115.
security protocols
116.
security requirements
117.
security requirements engineering
118.
security risk assessment
119.
security risk management
120.
security strategies
121.
security systems for military objects
122.
security testing
123.
security training
124.
security verification
125.
social security planning
126.
societal security
127.
system of economic security
128.
system security
129.
terrorism security
130.
transmission System Security
131.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT