MERO: A Statistical Approach for Hardware Trojan Detection RS Chakraborty, F Wolff, S Paul, C Papachristou, S Bhunia International Workshop on Cryptographic Hardware and Embedded Systems, 396-410, 2009 | 593 | 2009 |
Towards Trojan-free trusted ICs: Problem analysis and detection scheme F Wolff, C Papachristou, S Bhunia, RS Chakraborty 2008 Design, Automation and Test in Europe, 1362-1365, 2008 | 452 | 2008 |
Hardware Trojan detection by multiple-parameter side-channel analysis S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ... IEEE Transactions on computers 62 (11), 2183-2195, 2012 | 285 | 2012 |
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ... 2010 IEEE international symposium on hardware-oriented security and trust …, 2010 | 182 | 2010 |
Multiscan-based test compression and hardware decompression using LZ77 FG Wolff, C Papachristou Proceedings. International Test Conference, 331-339, 2002 | 131 | 2002 |
An experiment with WWW interactive learning in university education DR McIntyre, FG Wolff Computers & Education 31 (3), 255-264, 1998 | 131 | 1998 |
Process reliability based trojans through NBTI and HCI effects Y Shiyanovskii, F Wolff, A Rajendran, C Papachristou, D Weyer, W Clay 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 215-222, 2010 | 128 | 2010 |
Dynamic evaluation of hardware trust D McIntyre, F Wolff, C Papachristou, S Bhunia, D Weyer 2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009 | 114 | 2009 |
Estimation of software reliability by stratified sampling A Podgurski, W Masri, Y McCleese, FG Wolff, C Yang ACM Transactions on Software Engineering and Methodology (TOSEM) 8 (3), 263-283, 1999 | 113 | 1999 |
An efficient BICS design for SEUs detection and correction in semiconductor memories B Gill, M Nicolaidis, F Wolff, C Papachristou, S Garverick Design, Automation and Test in Europe, 592-597, 2005 | 95 | 2005 |
A robust authentication methodology using physically unclonable functions in DRAM arrays MS Hashemian, B Singh, F Wolff, D Weyer, S Clay, C Papachristou 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 647-652, 2015 | 65 | 2015 |
A technique for high ratio LZW compression [logic test vector compression] MJ Knieser, FG Wolff, CA Papachristou, DJ Weyer, DR McIntyre 2003 Design, Automation and Test in Europe Conference and Exhibition, 116-121, 2003 | 60 | 2003 |
Node sensitivity analysis for soft errors in CMOS logic BS Gill, C Papachristou, FG Wolff, N Seifert IEEE International Conference on Test, 2005., 9 pp.-972, 2005 | 47 | 2005 |
Soft delay error effects in cmos combinational circuits BS Gill, C Papachristou, FG Wolff 22nd IEEE VLSI Test Symposium, 2004. Proceedings., 325-330, 2004 | 44 | 2004 |
A new asymmetric SRAM cell to reduce soft errors and leakage power in FPGA BS Gill, C Papachristou, FG Wolff 2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007 | 41 | 2007 |
Fast and compact binary-to-BCD conversion circuits for decimal multiplication O Al-Khaleel, Z Al-Qudah, M Al-Khaleel, CA Papachristou, FG Wolff 2011 IEEE 29th International Conference on Computer Design (ICCD), 226-231, 2011 | 35 | 2011 |
High-level low power FPGA design methodology FG Wolff, MJ Knieser, DJ Weyer, CA Papachristou Proceedings of the IEEE 2000 National Aerospace and Electronics Conference …, 2000 | 32 | 2000 |
SRAM cell design protected from SEU upsets Y Shiyanovskii, F Wolff, C Papachristou 2008 14th IEEE International On-Line Testing Symposium, 169-170, 2008 | 26 | 2008 |
Exploiting semiconductor properties for hardware trojans Y Shiyanovskii, F Wolff, C Papachristou, D Weyer, W Clay arXiv preprint arXiv:0906.3834, 2009 | 21 | 2009 |
An elliptic curve cryptosystem design based on FPGA pipeline folding O Al-Khaleel, C Papachristou, F Wolff, K Pekmestzi 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 71-78, 2007 | 21 | 2007 |