Hardware Trojan attacks: Threat analysis and countermeasures S Bhunia, MS Hsiao, M Banga, S Narasimhan Proceedings of the IEEE 102 (8), 1229-1247, 2014 | 857 | 2014 |
Hardware Trojan: Threats and emerging solutions RS Chakraborty, S Narasimhan, S Bhunia 2009 IEEE International high level design validation and test workshop, 166-171, 2009 | 586 | 2009 |
Hardware Trojan detection by multiple-parameter side-channel analysis S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ... IEEE Transactions on computers 62 (11), 2183-2195, 2012 | 276 | 2012 |
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ... 2010 IEEE international symposium on hardware-oriented security and trust …, 2010 | 177 | 2010 |
TeSR: A robust temporal self-referencing approach for hardware Trojan detection S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011 | 166 | 2011 |
Self-referencing: A scalable side-channel approach for hardware Trojan detection D Du, S Narasimhan, RS Chakraborty, S Bhunia Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010 | 150 | 2010 |
MECCA: A robust low-overhead PUF using embedded memory array AR Krishna, S Narasimhan, X Wang, S Bhunia Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 102 | 2011 |
Improving IC security against Trojan attacks through integration of security monitors S Narasimhan, W Yueh, X Wang, S Mukhopadhyay, S Bhunia IEEE Design & Test of Computers 29 (5), 37-46, 2012 | 93 | 2012 |
Protection of intellectual property cores through a design flow RS Chakraborty, S Narasimhan, S Bhunia US Patent 8,402,401, 2013 | 80 | 2013 |
Design and validation for FPGA trust under hardware trojan attacks S Mal-Sarkar, R Karam, S Narasimhan, A Ghosh, A Krishna, S Bhunia IEEE Transactions on Multi-Scale Computing Systems 2 (3), 186-198, 2016 | 74 | 2016 |
Golden-free hardware Trojan detection with high sensitivity under process noise T Hoque, S Narasimhan, X Wang, S Mal-Sarkar, S Bhunia Journal of Electronic Testing 33, 107-124, 2017 | 72 | 2017 |
Sequential hardware trojan: Side-channel aware design and placement X Wang, S Narasimhan, A Krishna, T Mal-Sarkar, S Bhunia 2011 IEEE 29th International Conference on Computer Design (ICCD), 297-300, 2011 | 67 | 2011 |
Role of power grid in side channel attack and power-grid-aware secure design X Wang, W Yueh, DB Roy, S Narasimhan, Y Zheng, S Mukhopadhyay, ... Proceedings of the 50th Annual Design Automation Conference, 1-9, 2013 | 58 | 2013 |
Software exploitable hardware Trojans in embedded processor X Wang, T Mal-Sarkar, A Krishna, S Narasimhan, S Bhunia 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2012 | 58 | 2012 |
Hardware trojan detection S Narasimhan, S Bhunia Introduction to Hardware Security and Trust, 339-364, 2011 | 53 | 2011 |
Ultra-low-power and robust digital-signal-processing hardware for implantable neural interface microsystems S Narasimhan, HJ Chiel, S Bhunia IEEE transactions on biomedical circuits and systems 5 (2), 169-178, 2010 | 47 | 2010 |
Hardware IP protection during evaluation using embedded sequential trojan S Narasimhan, R Chakraborty, S Bhunia IEEE Design & Test of Computers, 2011 | 46 | 2011 |
Hybridization of CMOS with CNT-based nano-electromechanical switch for low leakage and robust circuit design RS Chakraborty, S Narasimhan, S Bhunia IEEE Transactions on Circuits and Systems I: Regular Papers 54 (11), 2480-2488, 2007 | 40 | 2007 |
KiMS: Kids' Health Monitoring System at day-care centers using wearable sensors and vocabulary-based acoustic signal processing A Basak, S Narasimhan, S Bhunia 2011 IEEE 13th International Conference on e-Health Networking, Applications …, 2011 | 27 | 2011 |
Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, and Swarup Bhunia.“Hardware Trojan detection by multiple-parameter … S Narasimhan IEEE Transactions on computers 62 (11), 2183-2195, 2013 | 21 | 2013 |