High-Level Synthesis of Key Obfuscated RTL IP with DesignLockout and Camouflaging SA Islam, LK Sah, S Katkoori ACM Transactions on Design Automation of Electronic Systems (TODAES) 26 (1 …, 2020 | 23 | 2020 |
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs SA Islam, LK Sah, S Katkoori IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly …, 2019 | 9 | 2019 |
Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility SA Islam, LK Sah, S Katkoori Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 109-114, 2018 | 9 | 2018 |
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks LK Sah, SA Islam, S Katkoori Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2018 | 8 | 2018 |
A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs SA Islam, LK Sah, S Katkoori Springer Journal of Hardware and Systems Security 4, 246-262, 2020 | 7 | 2020 |
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack LK Sah, SA Islam, S Katkoori IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS …, 2019 | 5 | 2019 |
Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs SA Islam, LK Sah, S Katkoori 21st International Symposium on Quality Electronic Design (ISQED), 149-154, 2020 | 2 | 2020 |
Basic Block Encoding Based Run-time CFI Check for Embedded Software LK Sah, SA Islam, S Katkoori IEEE International Conference on Very Large Scale Integration (VLSI-SOC …, 2020 | 1 | 2020 |
VRT: A Runtime Protection Against Back-Edge CFI Violation SK Sah, LK Sah 67th International Midwest Symposium on Circuits and Systems (MWSCAS), 2024 | | 2024 |
Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table LK Sah, SA Islam, S Katkoori 22nd International Symposium on Quality Electronic Design (ISQED), 408-413, 2021 | | 2021 |
Micro-Architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks LK Sah University of South Florida, 2020 | | 2020 |