A first step towards automatic application of power analysis countermeasures AG Bayrak, F Regazzoni, P Brisk, FX Standaert, P Ienne Proceedings of the 48th Design Automation Conference, 230-235, 2011 | 115 | 2011 |
Sleuth: Automated verification of software power analysis countermeasures AG Bayrak, F Regazzoni, D Novo, P Ienne Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 99 | 2013 |
Automatic application of power analysis countermeasures AG Bayrak, F Regazzoni, D Novo, P Brisk, FX Standaert, P Ienne IEEE Transactions on Computers 64 (2), 329-341, 2013 | 61 | 2013 |
An architecture-independent instruction shuffler to protect against side-channel attacks AG Bayrak, N Velickovic, P Ienne, W Burleson ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-19, 2012 | 61 | 2012 |
An EDA-friendly protection scheme against side-channel attacks AG Bayrak, N Velickovic, F Regazzoni, D Novo, P Brisk, P Ienne 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 410-415, 2013 | 24 | 2013 |
Counting stream registers: An efficient and effective snoop filter architecture A Ranganathan, AG Bayrak, T Kluter, P Brisk, E Charbon, P Ienne 2012 International Conference on Embedded Computer Systems (SAMOS), 120-127, 2012 | 8 | 2012 |
Formation preserving path finding in 3-D terrains AG Bayrak, F Polat Applied Intelligence 36, 348-368, 2012 | 8 | 2012 |
Automated Side-Channel Vulnerability Discovery and Hardening: No-Cost Security Expertise for All AG Bayrak EPFL, 2014 | 1 | 2014 |
Formation preserving navigation of agent teams in 3-d terrains AG Bayrak Middle East Technical University, 2008 | 1 | 2008 |