Yier Jin
Title
Cited by
Cited by
Year
Hardware Trojan detection using path delay fingerprint
Y Jin, Y Makris
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International …, 2008
6472008
Experiences in hardware Trojan design and implementation
Y Jin, N Kupp, Y Makris
2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 50-57, 2009
2392009
Privacy and security in internet of things and wearable devices
O Arias, J Wurm, K Hoang, Y Jin
IEEE Transactions on Multi-Scale Computing Systems 1 (2), 99-109, 2015
2362015
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
2192016
Security analysis on consumer and industrial IoT devices
J Wurm, K Hoang, O Arias, AR Sadeghi, Y Jin
2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 519-524, 2016
1742016
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2015
1672015
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
1662017
Smart nest thermostat: A smart spy in your home
G Hernandez, O Arias, D Buentello, Y Jin
Black Hat USA, 2014
1612014
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
E Love, Y Jin, Y Makris
IEEE Transactions on Information Forensics and Security 7 (1), 25-40, 2011
1412011
Hardware Trojans in wireless cryptographic ICs
Y Jin, Y Makris
Design & Test of Computers, IEEE 27 (1), 26-35, 2010
1362010
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and systems, 2017
1062017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
932017
The changing computing paradigm with internet of things: A tutorial introduction
S Ray, Y Jin, A Raychowdhury
IEEE Design & Test 33 (2), 76-96, 2016
832016
Proof carrying-based information flow tracking for data secrecy protection and hardware trust
Y Jin, Y Makris
2012 IEEE 30th VLSI Test Symposium (VTS), 252-257, 2012
692012
Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation
Y Liu, Y Jin, Y Makris
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 399-404, 2013
632013
Leveraging emerging technology for hardware security-case study on silicon nanowire fets and graphene symfets
Y Bi, PE Gaillardon, XS Hu, M Niemier, JS Yuan, Y Jin
2014 IEEE 23rd asian test symposium, 342-347, 2014
622014
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
J He, Y Zhao, X Guo, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017
612017
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
602016
Emerging technology-based design of primitives for hardware security
Y Bi, K Shamsi, JS Yuan, PE Gaillardon, GD Micheli, X Yin, XS Hu, ...
ACM Journal on Emerging Technologies in Computing Systems (JETC) 13 (1), 1-19, 2016
602016
Introduction to hardware security
Y Jin
Electronics 4 (4), 763-784, 2015
572015
The system can't perform the operation now. Try again later.
Articles 1–20