Anomaly and malware detection using side channel analysis

Denis Foo Kune , Benjamin Andrew Ransford , Daniel Edward Holcomb

43
2020
Anomaly and malware detection using side channel analysis

Denis Foo Kune , Benjamin Andrew Ransford , Daniel Edward Holcomb , Andrew Whitehouse DeOrio

3
2021
Counterexample-guided SMT-driven optimal buffer sizing

Holcomb , Brady , Seshia
2011 Design, Automation&Test in Europe 1 -6

2011
Abstraction-based performance verification of NoCs

Holcomb , Brady , Seshia
design automation conference 492 -497

2011
Design as you see FIT: system-level soft error analysis of sequential circuits

Sanjit A. Seshia , Wenchao Li , Daniel Holcomb
design, automation, and test in europe 785 -790

31
2009
Threshold-based obfuscated keys with quantifiable security against invasive readout

Daniel Holcomb , Shahrzad Keshavarz
international conference on computer aided design 57 -64

3
2017
Guest Editors’ Introduction: Competing to Secure SoCs

Jeyavijayan Jv Rajendran , Ahmad-Reza Sadeghi , Siddharth Garg , Daniel Holcomb
IEEE Design & Test of Computers 38 ( 1) 5 -6

2021
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

Jakub Szefer , Russell Tessier , Daniel Holcomb , Shanquan Tian
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 1 -1

2021
Jitter-based Adaptive True Random Number Generation for FPGAs in the Cloud

Russell Tessier , Daniel Holcomb , George Provelengios , Xiang Li
field programmable technology 112 -119

2020
Characterizing Power Distribution Attacks in Multi-User FPGA Environments

George Provelengios , Daniel Holcomb , Russell Tessier
field programmable logic and applications 194 -201

18
2019
Power Wasting Circuits for Cloud FPGA Attacks

George Provelengios , Daniel Holcomb , Russell Tessier
field programmable logic and applications 231 -235

26
2020
Loop Unrolling for Energy Efficiency in Low-Cost Field-Programmable Gate Arrays

Naveen Kumar Dumpala , Shivukumar B. Patil , Daniel Holcomb , Russell Tessier
ACM Transactions on Reconfigurable Technology and Systems 11 ( 4) 1 -23

2019
Design automation for obfuscated circuits with multiple viable functions

Shahrzad Keshavarz , Christof Paar , Daniel Holcomb
design, automation, and test in europe 886 -889

10
2017
Reverse engineering of irreducible polynomials in GF(2 m ) arithmetic

Cunxi Yu , Daniel Holcomb , Maciej Ciesielski
design, automation, and test in europe 1562 -1567

1
2017
Oracle-guided incremental SAT solving to reverse engineer camouflaged logic circuits

Duo Liu , Cunxi Yu , Xiangyu Zhang , Daniel Holcomb
design, automation, and test in europe 433 -438

33
2016
A provable key destruction scheme based on memristive crossbar arrays

Hao Jiang , Can Li , Rui Zhang , Peng Yan
Nature Electronics 1 ( 10) 548 -554

51
2018
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection

Shahrzad Keshavarz , Cunxi Yu , Samaneh Ghandali , Xiaolin Xu
Journal of Hardware and Systems Security 2 ( 3) 214 -224

5
2018