PUBLICATIONS

  • M. Tehranipoor, and F. Koushanfar, "A survey of hardware Trojan taxonomy and detection," IEEE Design and Test of Computers 27, no. 1 (2010): 10-25. PDF
  • R. S. Chakraborty, S. Narasimhan, and S. Bhunia, "Hardware Trojan: Threats and emerging solutions," High Level Design Validation and Test Workshop, 2009. HLDVT 2009. IEEE International, pp. 166-171. IEEE, 2009. PDF
  • Y. Jin, N. Kupp, and Y. Makris, "Experiences in hardware Trojan design and implementation," Hardware-Oriented Security and Trust, 2009. HOST'09. IEEE International Workshop, pp. 50-57. IEEE, 2009. PDF
  • A. Baumgarten, M. Steffen, M. Clausman, and J. Zambreno, "A case study in hardware Trojan design and implementation," International Journal of Information Security 10, no. 1 (2011): 1-14. PDF
  • S. Wei, K. Li, F. Koushanfar, and M. Potkonjak, "Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry," Proceedings of the 49th Annual Design Automation Conference, pp. 90-95. ACM, 2012. PDF
  • H. Salmani, M. Tehranipoor, and R. Karri, "On design vulnerability analysis and trust benchmarks development," 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471-474. IEEE, 2013. PDF
  • S. Bhunia, M. Abramovici, D. Agrawal, P. Bradley, M. S. Hsiao, J. Plusquellic, and M. Tehranipoor, "Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution," IEEE Design & Test 30, no. 3 (2013): 6-17. PDF
  • S. Bhunia, M. S. Hsiao, M. Banga, and S. Narasimhan, "Hardware Trojan attacks: threat analysis and countermeasures," Proceedings of the IEEE 102, no. 8 (2014): 1229-1247. PDF
  • C. Herder, M. Yu, F. Koushanfar, and S. Devadas, "Physical unclonable functions and applications: A tutorial," Proceedings of the IEEE 102, no. 8 (2014): 1126-1141. PDF
  • M. Rostami, F. Koushanfar, and R. Karri, "A primer on hardware security: Models, methods, and metrics," Proceedings of the IEEE 102, no. 8 (2014): 1283-1295. PDF
  • Xiao, K., D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, "Hardware Trojans: Lessons Learned after One Decade of Research," ACM Transactions on Design Automation of Electronic Systems (TODAES) 22, no. 1 (2016): 6. PDF
  • U. Guin, D. DiMase, and M. Tehranipoor, "A Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead," Journal of Electronic Testing: Theory and Applications (JETTA), 2014. PDF
  • S. Quadir, J. Chen, D. Forte, N. Asadi, S. Shahbaz, L. Wang, J. Chandy, and M. Tehranipoor, "A Survey on Chip to System Reverse Engineering," ACM Journal on Emerging Technologies in Computing Systems (JETC), 2015. PDF
  • J. Wurm, Y. Jin, Y. Liu, S. Hu, K. Heffner, F. Rahman, and M. Tehranipoor, "Introduction to Cyber Physical System Security: A Cross-Layer Perspective," IEEE Trans. On Multi-Scale Computing Systems (TMSCS), 2016.PDF