Hasan Al Shaikh

Orcid: 0000-0002-6142-7329

According to our database1, Hasan Al Shaikh authored at least 11 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Rethinking SoC Verification for Secure Cross-Layer Interactions.
IEEE Des. Test, October, 2025

Re-Pen: Reinforcement Learning-Enforced Penetration Testing for SoC Security Verification.
IEEE Trans. Very Large Scale Integr. Syst., March, 2025

SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models.
IACR Cryptol. ePrint Arch., 2025

ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification.
IACR Cryptol. ePrint Arch., 2025

Special Session: ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification.
Proceedings of the 43rd IEEE VLSI Test Symposium, 2025

2024
TDM: Time and Distance Metric for Quantifying Information Leakage Vulnerabilities in SoCs.
Proceedings of the 42nd IEEE International Conference on Computer Design, 2024

2023
Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2023

SHarPen: SoC Security Verification by Hardware Penetration Test.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

2022
Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications.
IACR Cryptol. ePrint Arch., 2022

Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions.
IACR Cryptol. ePrint Arch., 2022


  Loading...