关注
Love Kumar Sah
Love Kumar Sah
Assistant Professor @ Western New England University
在 wne.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
High-Level Synthesis of Key Obfuscated RTL IP with DesignLockout and Camouflaging
SA Islam, LK Sah, S Katkoori
ACM Transactions on Design Automation of Electronic Systems (TODAES) 26 (1 …, 2020
232020
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
SA Islam, LK Sah, S Katkoori
IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly …, 2019
92019
Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility
SA Islam, LK Sah, S Katkoori
Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 109-114, 2018
92018
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
LK Sah, SA Islam, S Katkoori
Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2018
82018
A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs
SA Islam, LK Sah, S Katkoori
Springer Journal of Hardware and Systems Security 4, 246-262, 2020
72020
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
LK Sah, SA Islam, S Katkoori
IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS …, 2019
52019
Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs
SA Islam, LK Sah, S Katkoori
21st International Symposium on Quality Electronic Design (ISQED), 149-154, 2020
22020
Basic Block Encoding Based Run-time CFI Check for Embedded Software
LK Sah, SA Islam, S Katkoori
IEEE International Conference on Very Large Scale Integration (VLSI-SOC …, 2020
12020
VRT: A Runtime Protection Against Back-Edge CFI Violation
SK Sah, LK Sah
67th International Midwest Symposium on Circuits and Systems (MWSCAS), 2024
2024
Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table
LK Sah, SA Islam, S Katkoori
22nd International Symposium on Quality Electronic Design (ISQED), 408-413, 2021
2021
Micro-Architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks
LK Sah
University of South Florida, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–11