Kaveh Shamsi

Orcid: 0000-0002-9952-4597

According to our database1, Kaveh Shamsi authored at least 34 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Trojan Localization in Generic AMS Circuits from Combined Power and Functional Queries.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2025

A Hybrid Machine Learning and Numeric Optimization Approach to Analog Circuit Deobfuscation.
Proceedings of the 30th Asia and South Pacific Design Automation Conference, 2025

2024
Towards Machine-Learning-based Oracle-Guided Analog Circuit Deobfuscation.
Proceedings of the IEEE International Test Conference, 2024

On Hardware Trojan Detection using Oracle-Guided Circuit Learning.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

TIPLock: Key-Compressed Logic Locking using Through-Input-Programmable Lookup-Tables.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation.
Cryptogr., 2022

A Security Analysis of Circuit Clock Obfuscation.
Cryptogr., 2022

Graph Neural Network based Netlist Operator Detection under Circuit Rewriting.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

An Oracle-Less Machine-Learning Attack against Lookup-Table-based Logic Locking.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

2021
In Praise of Exact-Functional-Secrecy in Circuit Locking.
IEEE Trans. Inf. Forensics Secur., 2021

Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

2019
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview.
ACM Trans. Design Autom. Electr. Syst., 2019

On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes.
IEEE Trans. Inf. Forensics Secur., 2019

On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits.
Proceedings of the International Conference on Computer-Aided Design, 2019

On the Impossibility of Approximation-Resilient Circuit Locking.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
The Old Frontier of Reverse Engineering: Netlist Partitioning.
J. Hardw. Syst. Secur., 2018

TimingSAT: Decamouflaging Timing-based Logic Obfuscation.
Proceedings of the IEEE International Test Conference, 2018

R2D2: Runtime reassurance and detection of A2 Trojan.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

2017
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs.
IEEE Trans. Emerg. Top. Comput., 2017

AppSAT: Approximately deobfuscating integrated circuits.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

Cyclic Obfuscation for Creating SAT-Unresolvable Circuits.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

2016
Emerging Technology-Based Design of Primitives for Hardware Security.
ACM J. Emerg. Technol. Comput. Syst., 2016

Security of emerging non-volatile memories: Attacks and defenses.
Proceedings of the 34th IEEE VLSI Test Symposium, 2016

Hardware Security Challenges Beyond CMOS: Attacks and Remedies.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

Provably secure camouflaging strategy for IC protection.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

Enhancing Hardware Security with Emerging Transistor Technologies.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

Leverage Emerging Technologies For DPA-Resilient Block Cipher Design.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2015
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015


  Loading...