Kaveh Shamsi

Orcid: 0000-0002-9952-4597

According to our database1, Kaveh Shamsi authored at least 30 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Solver-based Generic Side-Channel Analysis with Machine Learning.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

TIPLock: Key-Compressed Logic Locking using Through-Input-Programmable Lookup-Tables.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation.
Cryptogr., 2022

A Security Analysis of Circuit Clock Obfuscation.
Cryptogr., 2022

Graph Neural Network based Netlist Operator Detection under Circuit Rewriting.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

An Oracle-Less Machine-Learning Attack against Lookup-Table-based Logic Locking.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

2021
In Praise of Exact-Functional-Secrecy in Circuit Locking.
IEEE Trans. Inf. Forensics Secur., 2021

Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021

2019
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview.
ACM Trans. Design Autom. Electr. Syst., 2019

On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes.
IEEE Trans. Inf. Forensics Secur., 2019

Provably Secure Camouflaging Strategy for IC Protection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits.
Proceedings of the International Conference on Computer-Aided Design, 2019

On the Impossibility of Approximation-Resilient Circuit Locking.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
The Old Frontier of Reverse Engineering: Netlist Partitioning.
J. Hardw. Syst. Secur., 2018

TimingSAT: Decamouflaging Timing-based Logic Obfuscation.
Proceedings of the IEEE International Test Conference, 2018

R2D2: Runtime reassurance and detection of A2 Trojan.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

2017
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs.
IEEE Trans. Emerg. Top. Comput., 2017

AppSAT: Approximately deobfuscating integrated circuits.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

Cyclic Obfuscation for Creating SAT-Unresolvable Circuits.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

2016
Emerging Technology-Based Design of Primitives for Hardware Security.
ACM J. Emerg. Technol. Comput. Syst., 2016

Security of emerging non-volatile memories: Attacks and defenses.
Proceedings of the 34th IEEE VLSI Test Symposium, 2016

Hardware Security Challenges Beyond CMOS: Attacks and Remedies.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

Enhancing Hardware Security with Emerging Transistor Technologies.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

Leverage Emerging Technologies For DPA-Resilient Block Cipher Design.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2015
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015


  Loading...