1. A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks;leontie;Journal of Information Assurance and Security,2010
2. Hardware Trojan Detection using Supervised Machine Learning;gowtham;Proc 6th Int Conf Communication and Electronics Systems (ICCES-2021),2021
3. Hardware Trojan Detection using Ring Oscillator;deepthi;Proc 6th Int Conf Communication and Electronics Systems (ICCES-2021),2021
4. Vivado v2017.4,0
5. Reducing logic encryption overhead through gate level key insertion