Sotabase
Home
Researchers
Career
·
Software Engineer
,
New York University Abu Dhabi
2023–
Publications
(305)
Security analysis of logic obfuscation
DAC Design Automation Conference 2012 · 2012
474
cited
Fault Analysis-Based Logic Encryption
IEEE transactions on computers · 2015
414
cited
Security analysis of integrated circuit camouflaging
Conference on Computer and Communications Security · 2013
382
cited
SARLock: SAT attack resistant logic locking
IEEE International Symposium on Hardware Oriented Security and Trust · 2016
364
cited
Provably-Secure Logic Locking: From Theory To Practice
Conference on Computer and Communications Security · 2017
314
cited
On Improving the Security of Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems · 2016
298
cited
Removal Attacks on Logic Locking and Camouflaging Techniques
IEEE Transactions on Emerging Topics in Computing · 2020
212
cited
Is split manufacturing secure?
Design, Automation and Test in Europe · 2013
194
cited
Logic encryption: A fault analysis perspective
Design, Automation and Test in Europe · 2012
152
cited
Security analysis of Anti-SAT
Asia and South Pacific Design Automation Conference · 2017
135
cited
Sneak-Path Testing of Crossbar-Based Nonvolatile Random Access Memories
IEEE transactions on nanotechnology · 2013
110
cited
MAGIC
ACM Transactions on Architecture and Code Optimization (TACO) · 2015
104
cited
Keynote: A Disquisition on Logic Locking
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems · 2020
97
cited
What to Lock?: Functional and Parametric Locking
ACM Great Lakes Symposium on VLSI · 2017
97
cited
CamoPerturb: Secure IC camouflaging for minterm protection
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) · 2016
95
cited
Regaining Trust in VLSI Design: Design-for-Trust Techniques
Proceedings of the IEEE · 2014
91
cited
Design and analysis of ring oscillator based Design-for-Trust technique
IEEE VLSI Test Symposium · 2011
86
cited
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) – Unlocked
IEEE Transactions on Information Forensics and Security · 2019
84
cited
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems · 2022
80
cited
Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor Memories
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems · 2015
76
cited
Show all 305 papers →
Sotabase