Follow
Hassan Salmani
Hassan Salmani
Verified email at howard.edu - Homepage
Title
Cited by
Cited by
Year
A novel technique for improving hardware trojan detection and reducing trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
IEEE transactions on very large scale integration (VLSI) systems 20 (1), 112-125, 2011
3492011
On design vulnerability analysis and trust benchmarks development
H Salmani, M Tehranipoor, R Karri
2013 IEEE 31st international conference on computer design (ICCD), 471-474, 2013
3032013
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1, 85-102, 2017
2982017
Hardware Trojan detection and isolation using current integration and localized current analysis
X Wang, H Salmani, M Tehranipoor, J Plusquellic
2008 IEEE international symposium on defect and fault tolerance of VLSI …, 2008
2792008
COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist
H Salmani
IEEE Transactions on Information Forensics and Security 12 (2), 338-350, 2016
2232016
New design strategy for improving hardware Trojan detection and reducing Trojan activation time
H Salmani, M Tehranipoor, J Plusquellic
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 66-73, 2009
1902009
Trustworthy hardware: Trojan detection and design-for-trust challenges
M Tehranipoor, H Salmani, X Zhang, M Wang, R Karri, J Rajendran, ...
Computer 44 (7), 66-74, 2010
1362010
Layout-aware switching activity localization to enhance hardware Trojan detection
H Salmani, M Tehranipoor
IEEE Transactions on Information Forensics and Security 7 (1), 76-87, 2011
1132011
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level
H Salmani, M Tehranipoor
2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2013
1072013
Integrated circuit authentication
M Tehranipoor, H Salmani, X Zhang
Switzerland: Springer, Cham. doi 10, 978-3, 2014
962014
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits
H Salmani, M Tehranipoor, J Plusquellic
2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010
782010
Vulnerability analysis of a circuit layout to hardware trojan insertion
H Salmani, MM Tehranipoor
IEEE Transactions on Information Forensics and Security 11 (6), 1214-1225, 2016
642016
Hybrid STT-CMOS designs for reverse-engineering prevention
T Winograd, H Salmani, H Mahmoodi, K Gaj, H Homayoun
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
592016
Contribution of controller area networks controllers to masquerade failures
H Salmani, SG Miremadi
11th Pacific Rim International Symposium on Dependable Computing (PRDC'05 …, 2005
182005
Assessment of message missing failures in CAN-based systems
H Salmani, SG Miremadi
Parallel and Distributed Computing and Networks: Proceedings of the 23 rd …, 2005
112005
Trusted Digital Circuits
H Salmani, Salmani, Glaser
Springer, 2018
102018
Hardware trojan attacks and countermeasures
H Salmani
Fundamentals of IP and SoC Security: Design, Verification, and Debug, 247-276, 2017
102017
Hardware trojan detection: Untrusted third-party ip cores
M Tehranipoor, H Salmani, X Zhang, M Tehranipoor, H Salmani, X Zhang
Integrated Circuit Authentication: Hardware Trojans and Counterfeit …, 2014
102014
Gradual-N-Justification (GNJ) to reduce false-positive hardware Trojan detection in gate-level Netlist
H Salmani
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30 (4), 515-525, 2022
82022
Counterfeit ICs: Taxonomies, assessment, and challenges
M Tehranipoor, H Salmani, X Zhang, M Tehranipoor, H Salmani, X Zhang
Integrated Circuit Authentication: Hardware Trojans and Counterfeit …, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20