Author:
Farahmandi Farimah,Rahman M. Sazadur,Rajendran Sree Ranjani,Tehranipoor Mark
Publisher
Springer International Publishing
Reference40 articles.
1. S. Aftabjahani, R. Kastner, M. Tehranipoor, F. Farahmandi, J. Oberg, A. Nordstrom, N. Fern, A. Althoff, Special session: Cad for hardware security-automation is key to adoption of solutions, in 2021 IEEE 39th VLSI Test Symposium (VTS) (IEEE, 2021), pp. 1–10
2. B. Ahmed, F. Rahman, N. Hooten, F. Farahmandi, M. Tehranipoor, Automap: Automated mapping of security properties between different levels of abstraction in design flow, in 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (IEEE, 2021), pp. 1–9
3. A. Ardeshiricham, W. Hu, J. Marxen, R. Kastner, Register transfer level information flow tracking for provably secure hardware design, in Design, Automation Test in Europe Conference Exhibition (DATE), 2017 (2017), pp. 1691–1696. https://doi.org/10.23919/DATE.2017.7927266
4. A. Baratloo, N. Singh, T. Tsai, Transparent Run-Time Defense Against Stack Smashing Attacks (USENIX Association, USA, 2000)
5. A. Baratloo, T. Tsai, N. Singh, Libsafe: Protecting critical elements of stacks (2001)