1. SCOPE: Synthesis-based constant propagation attack on logic locking;Abdulrahman Alaql;IEEE Transactions on Very Large Scale Integration (VLSI) Systems (,2021
2. Abdulrahman Alaql et al. "Sweep to the secret: A constant propagation attack on logic locking ". In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE. 2019 . Abdulrahman Alaql et al. "Sweep to the secret: A constant propagation attack on logic locking". In: 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE. 2019.
3. Strong logic obfuscation with low overhead against IC reverse engineering attacks;Qutaiba Alasad;ACM Transactions on Design Automation of Electronic Systems (TODAES) (,2020
4. OMLA: An oracle-less machine learning-based attack on logic locking;Lilas Alrahis;IEEE Transactions on Circuits and Systems II: Express Briefs (,2021
5. Eric Brier et al. "Correlation power analysis with a leakage model ". In: International workshop on cryptographic hardware and embedded systems. Springer. 2004 . Eric Brier et al. "Correlation power analysis with a leakage model". In: International workshop on cryptographic hardware and embedded systems. Springer. 2004.