1. How to flip a bit?
2. Design of Totally Self-Checking Check Circuits for m-Out-of-n Codes
3. From IC debug to hardware security risk: The power of backside access and optical interaction
4. Ferdinand Brasser , Urs Müller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017. Software grand exposure:{SGX} cache attacks are practical . In 11th {USENIX} Workshop on Offensive Technologies. Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure:{SGX} cache attacks are practical. In 11th {USENIX} Workshop on Offensive Technologies.
5. Muhtadi Choudhury , Domenic Forte , and Shahin Tajik . 2021 . PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs. In 2021 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 569–574 . Muhtadi Choudhury, Domenic Forte, and Shahin Tajik. 2021. PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 569–574.