Author:
Krachenfels Thilo,Ganji Fatemeh,Moradi Amir,Tajik Shahin,Seifert Jean-Pierre
Funder
Deutsche Forschungsgemeinschaft
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Comparative Study of E-beam and Optical Probing Approaches in Attacking the ICs;Journal of Failure Analysis and Prevention;2024-08-28
2. Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis;Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security;2023-11-26
3. LeakyOhm: Secret Bits Extraction using Impedance Analysis;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. VIGILANT: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-11
5. Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch;2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD);2023-10-28