Follow
Kaveh Shamsi
Title
Cited by
Cited by
Year
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3382017
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
1832017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
1762017
Emerging technology-based design of primitives for hardware security
Y Bi, K Shamsi, JS Yuan, PE Gaillardon, GD Micheli, X Yin, XS Hu, ...
ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-19, 2016
952016
IP protection and supply chain security through logic obfuscation: A systematic overview
K Shamsi, M Li, K Plaks, S Fazzari, DZ Pan, Y Jin
ACM Transactions on Design Automation of Electronic Systems (TODAES) 24 (6 …, 2019
892019
KC2: Key-condition crunching for fast sequential circuit deobfuscation
K Shamsi, M Li, DZ Pan, Y Jin
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 534-539, 2019
842019
On the approximation resiliency of logic locking and IC camouflaging schemes
K Shamsi, T Meade, M Li, DZ Pan, Y Jin
IEEE Transactions on Information Forensics and Security 14 (2), 347-359, 2018
772018
Cross-lock: Dense layout-level interconnect locking using cross-bar architectures
K Shamsi, M Li, DZ Pan, Y Jin
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 147-152, 2018
662018
On the impossibility of approximation-resilient circuit locking
K Shamsi, DZ Pan, Y Jin
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
512019
Tunnel FET current mode logic for DPA-resilient circuit designs
Y Bi, K Shamsi, JS Yuan, Y Jin, M Niemier, XS Hu
IEEE Transactions on Emerging Topics in Computing 5 (3), 340-352, 2016
472016
Enhancing hardware security with emerging transistor technologies
Y Bi, XS Hu, Y Jin, M Niemier, K Shamsi, X Yin
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 305-310, 2016
362016
IcySAT: Improved SAT-based attacks on cyclic locked circuits
K Shamsi, DZ Pan, Y Jin
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2019
312019
Leverage emerging technologies for DPA-resilient block cipher design
Y Bi, K Shamsi, JS Yuan, FX Standaert, Y Jin
2016 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2016
312016
Security of emerging non-volatile memories: Attacks and defenses
K Shamsi, Y Jin
2016 IEEE 34th VLSI Test Symposium (VTS), 1-4, 2016
292016
R2D2: Runtime reassurance and detection of A2 Trojan
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
282018
The old frontier of reverse engineering: Netlist partitioning
T Meade, K Shamsi, T Le, J Di, S Zhang, Y Jin
Journal of Hardware and Systems Security 2, 201-213, 2018
222018
TimingSAT: Decamouflaging timing-based logic obfuscation
M Li, K Shamsi, Y Jin, DZ Pan
2018 IEEE International Test Conference (ITC), 1-10, 2018
192018
On-chip analog trojan detection framework for microprocessor trustworthiness
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
182018
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices
K Shamsi, Y Bi, Y Jin, PE Gaillardon, M Niemier, XS Hu
2015 33rd IEEE International Conference on Computer Design (ICCD), 343-350, 2015
182015
Circuit obfuscation and oracle-guided attacks: Who can prevail?
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 357-362, 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20