Mainak Banga, Ph.D.

Affiliations: 
2010 Virginia Polytechnic and State University, United States 
Area:
Computer Engineering
Google:
"Mainak Banga"

Parents

Sign in to add mentor
Michael S. Hsiao grad student 2010 Virginia Tech
 (Testing and Verification Strategies for Enhancing Trust in Third Party IPs.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bhunia S, Hsiao MS, Banga M, et al. (2014) Hardware trojan attacks: Threat analysis and countermeasures Proceedings of the Ieee. 102: 1229-1247
Banga M, Hsiao MS. (2011) ODETTE: A non-scan design-for-test methodology for Trojan detection in ICs 2011 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2011. 18-23
Banga M, Rahagude N, Hsiao MS. (2011) Design-for-test methodology for non-scan at-speed testing Proceedings -Design, Automation and Test in Europe, Date. 191-196
Banga M, Hsiao MS. (2010) Trusted RTL: Trojan detection methodology in pre-silicon designs Proceedings of the 2010 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2010. 56-59
Banga M, Hsiao MS. (2009) A novel sustained vector technique for the detection of hardware trojans Proceedings: 22nd International Conference On Vlsi Design - Held Jointly With 7th International Conference On Embedded Systems. 327-332
Donglikar S, Banga M, Chandrasekar M, et al. (2009) Fast circuit topology based method to configure the scan chains in Illinois scan architecture Proceedings - International Test Conference
Banga M, Hsiao MS. (2009) VITAMIN: Voltage inversion technique to ascertain malicious insertions in ICs 2009 Ieee International Workshop On Hardware-Oriented Security and Trust, Host 2009. 104-107
Hsiao MS, Banga M. (2009) Kiss the scan goodbye: A non-scan architecture for high coverage, low test data volume and low test application time Proceedings of the Asian Test Symposium. 225-230
Banga M, Chandrasekar M, Lei F, et al. (2008) Guided test generation for isolation and detection of embedded trojans in ICs Proceedings of the Acm Great Lakes Symposium On Vlsi, Glsvlsi. 363-366
Banga M, Hsiao MS. (2008) A region based approach for the identification of hardware Trojans 2008 Ieee International Workshop On Hardware-Oriented Security and Trust, Host. 40-47
See more...