Mark M. Tehranipoor
Mark M. Tehranipoor
Intel Charles E. Young Endowed Chair Professor, ECE, University of Florida
Verified email at - Homepage
Cited by
Cited by
A survey of hardware trojan taxonomy and detection
M Tehranipoor, F Koushanfar
IEEE design & test of computers 27 (1), 10-25, 2010
Trustworthy hardware: Identifying and classifying hardware trojans
R Karri, J Rajendran, K Rosenfeld, M Tehranipoor
Computer 43 (10), 39-46, 2010
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
U Guin, K Huang, D DiMase, JM Carulli, M Tehranipoor, Y Makris
Proceedings of the IEEE 102 (8), 1207-1228, 2014
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
Detecting malicious inclusions in secure hardware: Challenges and solutions
X Wang, M Tehranipoor, J Plusquellic
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 15-19, 2008
System-on-chip test architectures: nanometer design for testability
LT Wang, CE Stroud, NA Touba
Morgan Kaufmann, 2010
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE transactions on very large scale integration (VLSI) systems 20 (1), 112-125, 2011
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1, 85-102, 2017
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
U Guin, D DiMase, M Tehranipoor
Journal of Electronic Testing 30, 9-23, 2014
Power-aware testing and test strategies for low power devices
P Girard, N Nicolici, X Wen
Springer Science & Business Media, 2010
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 67-70, 2011
Counterfeit integrated circuits
M Tehranipoor, U Guin, D Forte, M Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits: Detection and Avoidance, 15-36, 2015
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
RM Rad, X Wang, M Tehranipoor, J Plusquellic
2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639, 2008
Hardware security: a hands-on learning approach
S Bhunia, MM Tehranipoor
Morgan Kaufmann, 2018
Sensitivity analysis to hardware Trojans using power supply transient signals
R Rad, J Plusquellic, M Tehranipoor
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 3-7, 2008
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
X Xu, B Shakya, MM Tehranipoor, D Forte
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20