Volgen
Yuanwen Huang
Yuanwen Huang
VMware, Software Engineer
Geverifieerd e-mailadres voor ufl.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
MERS: statistical test generation for side-channel analysis based Trojan detection
Y Huang, S Bhunia, P Mishra
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1272016
Scalable test generation for Trojan detection using side channel analysis
Y Huang, S Bhunia, P Mishra
IEEE Transactions on Information Forensics and Security 13 (11), 2746-2760, 2018
1202018
An automated configurable Trojan insertion framework for dynamic trust benchmarks
J Cruz, Y Huang, P Mishra, S Bhunia
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2018
932018
System-on-chip security
F Farahmandi, Y Huang, P Mishra
Cham, Switzerland: Springer, 2020
812020
Trojan localization using symbolic algebra
F Farahmandi, Y Huang, P Mishra
2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 591-597, 2017
742017
Trace buffer attack: Security versus observability study in post-silicon debug
Y Huang, A Chattopadhyay, P Mishra
2015 IFIP/IEEE International Conference on Very Large Scale Integration …, 2015
232015
Cache reconfiguration using machine learning for vulnerability-aware energy optimization
A Ahmed, Y Huang, P Mishra
ACM Transactions on Embedded Computing Systems (TECS) 18 (2), 1-24, 2019
192019
Trace buffer attack on the AES cipher
Y Huang, P Mishra
Journal of Hardware and Systems Security 1 (1), 68-84, 2017
192017
Reliability and energy-aware cache reconfiguration for embedded systems
Y Huang, P Mishra
2016 17th International Symposium on Quality Electronic Design (ISQED), 313-318, 2016
172016
Vulnerability-aware energy optimization for reconfigurable caches in multitasking systems
Y Huang, P Mishra
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
162018
Automated test generation for detection of malicious functionality
F Farahmandi, Y Huang, P Mishra, F Farahmandi, Y Huang, P Mishra
System-on-Chip Security: Validation and Verification, 153-171, 2020
102020
Formal approaches to hardware trust verification
F Farahmandi, Y Huang, P Mishra
The Hardware Trojan War: Attacks, Myths, and Defenses, 183-202, 2018
92018
Vulnerability-aware energy optimization using reconfigurable caches in multicore systems
Y Huang, P Mishra
2017 IEEE International Conference on Computer Design (ICCD), 241-248, 2017
82017
SoC security verification using property checking
F Farahmandi, Y Huang, P Mishra, F Farahmandi, Y Huang, P Mishra
System-on-Chip Security: Validation and Verification, 137-152, 2020
72020
Hardware trojan detection schemes using path delay and side-channel analysis
F Farahmandi, Y Huang, P Mishra, F Farahmandi, Y Huang, P Mishra
System-on-Chip Security: Validation and Verification, 221-271, 2020
62020
Trojan detection using machine learning
F Farahmandi, Y Huang, P Mishra, F Farahmandi, Y Huang, P Mishra
System-on-Chip Security: Validation and Verification, 173-188, 2020
52020
Vulnerability-aware dynamic reconfiguration of partially protected caches
Y Huang, P Mishra
2020 21st International Symposium on Quality Electronic Design (ISQED), 255-260, 2020
32020
System-on-Chip Security: Validation and Verification
Y Huang, P Mishra, F Farahmandi
Springer, 2020
32020
Test generation for detection of malicious parametric variations
Y Huang, P Mishra
Hardware IP Security and Trust, 325-340, 2017
32017
SoC Security Verification Challenges
F Farahmandi, Y Huang, P Mishra, F Farahmandi, Y Huang, P Mishra
System-on-Chip Security: Validation and Verification, 15-35, 2020
22020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20