Filters: Author is Y. Alkabani [Clear All Filters]
"A unified framework for multimodal submodular IC trojan detection", Information Hiding Conference, May, 2010.
"Provably secure obfuscation of diverse watermarks for sequential circuits", International Symposium on Hardware-Oriented Security and Trust (HOST), June, 2010.
"Real time emulations: foundation and applications", Design Automation Conference (DAC), June, 2010 .
"Consistency-based characterization for IC Trojan detection", IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 123-127, 2009.
"N-version temperature-aware scheduling and binding", International Symposium on Low Power Electronics and Designs (ISLPED), pp. 331 - 334, 2009.
"Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach", Information Hiding (IH), pp. 102 - 117, 2008///.
"Active Control and Digital Rights Management of Integrated Circuit IP Cores", Compilers, Architectures, and Synthesis for Embedded Systems (CASES), 2008.
"Input Vector Control for Post-Silicon Leakage Current Minimization in the Presence of Manufacturing Variability", Design Automation Conference (DAC), 2008.
Input Vector Control for Post-Silicon Leakage Current Minimization under Manufacturing Variations, : Rice University, Electrical and Computer Engineering Department, 2008.
"N-variant IC design: methodology and applications", Design Automation Conference (DAC), pp. 546 - 551, 2008.
"Remote activation of ICs for piracy prevention and digital right management", International Conference on Computer Aided Design (ICCAD), pp. 674 - 677, 2007///.
"Active Hardware Metering for Intellectual Property Protection and Security", USENIX Security Symposium, pp. 291-306, 2007.