Adib Nahiyan

According to our database1, Adib Nahiyan authored at least 14 papers between 2016 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks.
ACM Trans. Design Autom. Electr. Syst., 2021

2020
SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation.
ACM Trans. Design Autom. Electr. Syst., 2020

Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation.
ACM Trans. Design Autom. Electr. Syst., 2020

A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

SeRFI: Secure Remote FPGA Initialization in an Untrusted Environment.
Proceedings of the 38th IEEE VLSI Test Symposium, 2020

2019
Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design.
IACR Cryptol. ePrint Arch., 2019

RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level.
Proceedings of the 37th IEEE VLSI Test Symposium, 2019

FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

2017
Hardware trojan detection through information flow security verification.
Proceedings of the IEEE International Test Conference, 2017

Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Security vulnerability analysis of design-for-test exploits for asset protection in SoCs.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

2016
Security Rule Checking in IC Design.
Computer, 2016

AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs.
Proceedings of the 53rd Annual Design Automation Conference, 2016


  Loading...