Follow
Mark M. Tehranipoor
Mark M. Tehranipoor
Intel Charles E. Young Endowed Chair Professor, ECE, University of Florida
Verified email at ufl.edu - Homepage
Title
Cited by
Cited by
Year
A survey of hardware trojan taxonomy and detection
M Tehranipoor, F Koushanfar
IEEE design & test of computers 27 (1), 10-25, 2010
14412010
Trustworthy hardware: Identifying and classifying hardware trojans
R Karri, J Rajendran, K Rosenfeld, M Tehranipoor
Computer 43 (10), 39-46, 2010
5672010
Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain
U Guin, K Huang, D DiMase, JM Carulli, M Tehranipoor, Y Makris
Proceedings of the IEEE 102 (8), 1207-1228, 2014
5052014
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer Science & Business Media, 2011
4382011
Detecting malicious inclusions in secure hardware: Challenges and solutions
X Wang, M Tehranipoor, J Plusquellic
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 15-19, 2008
4362008
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
3972016
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE transactions on very large scale integration (VLSI) systems 20 (1), 112-125, 2011
3142011
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
2592008
Case study: Detecting hardware Trojans in third-party digital IP cores
X Zhang, M Tehranipoor
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 67-70, 2011
2432011
Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead
U Guin, D DiMase, M Tehranipoor
Journal of Electronic Testing 30 (1), 9-23, 2014
2322014
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
2312016
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
2282013
Power supply signal calibration techniques for improving detection resolution to hardware Trojans
RM Rad, X Wang, M Tehranipoor, J Plusquellic
2008 IEEE/ACM International Conference on Computer-Aided Design, 632-639, 2008
2162008
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1 (1), 85-102, 2017
2142017
Sensitivity analysis to hardware Trojans using power supply transient signals
R Rad, J Plusquellic, M Tehranipoor
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 3-7, 2008
2072008
Counterfeit integrated circuits
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 15-36, 2015
1912015
Nine-coded compression technique for testing embedded cores in SoCs
M Tehranipoor, M Nourani, K Chakrabarty
IEEE transactions on very large scale integration (VLSI) systems 13 (6), 719-731, 2005
1832005
A low-cost solution for protecting IPs against scan-based side-channel attacks
J Lee, M Tebranipoor, J Plusquellic
24th IEEE VLSI Test Symposium, 6 pp.-99, 2006
1822006
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009
1772009
Securing designs against scan-based side-channel attacks
J Lee, M Tehranipoor, C Patel, J Plusquellic
IEEE transactions on dependable and secure computing 4 (4), 325-336, 2007
1752007
The system can't perform the operation now. Try again later.
Articles 1–20