Hasan Al Shaikh
Orcid: 0000-0002-6142-7329
According to our database1,
Hasan Al Shaikh
authored at least 11 papers
between 2022 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Des. Test, October, 2025
Re-Pen: Reinforcement Learning-Enforced Penetration Testing for SoC Security Verification.
IEEE Trans. Very Large Scale Integr. Syst., March, 2025
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models.
IACR Cryptol. ePrint Arch., 2025
ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification.
IACR Cryptol. ePrint Arch., 2025
Special Session: ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification.
Proceedings of the 43rd IEEE VLSI Test Symposium, 2025
2024
TDM: Time and Distance Metric for Quantifying Information Leakage Vulnerabilities in SoCs.
Proceedings of the 42nd IEEE International Conference on Computer Design, 2024
2023
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2023
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023
2022
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications.
IACR Cryptol. ePrint Arch., 2022
Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions.
IACR Cryptol. ePrint Arch., 2022