Year |
Citation |
Score |
2021 |
Shayan M, Bhattacharjee S, Wille R, Chakrabarty K, Karri R. How Secure Are Checkpoint-Based Defenses in Digital Microfluidic Biochips? Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 40: 143-156. DOI: 10.1109/Tcad.2020.2988351 |
0.429 |
|
2020 |
Liang T, Shayan M, Chakrabarty K, Karri R. Secure Assay Execution on MEDA Biochips to Thwart Attacks Using Real-Time Sensing Acm Transactions On Design Automation of Electronic Systems. 25: 1-25. DOI: 10.1145/3374213 |
0.389 |
|
2020 |
Bhattacharjee S, Tang J, Poddar S, Ibrahim M, Karri R, Chakrabarty K. Bio-chemical Assay Locking to Thwart Bio-IP Theft Acm Transactions On Design Automation of Electronic Systems. 25: 1-20. DOI: 10.1145/3365579 |
0.769 |
|
2020 |
Liang T, Chakrabarty K, Karri R. Programmable Daisychaining of Microelectrodes to Secure Bioassay IP in MEDA Biochips Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 28: 1269-1282. DOI: 10.1109/Tvlsi.2020.2967029 |
0.439 |
|
2020 |
Ibrahim M, Liang T, Scott K, Chakrabarty K, Karri R. Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics Ieee Transactions On Information Forensics and Security. 15: 3595-3609. DOI: 10.1109/Tifs.2020.2994742 |
0.302 |
|
2020 |
Basu K, Hussain SS, Gupta U, Karri R. COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity Ieee Transactions On Information Forensics and Security. 15: 3213-3226. DOI: 10.1109/Tifs.2020.2983287 |
0.393 |
|
2020 |
Basu K, Krishnamurthy P, Khorrami F, Karri R. A Theoretical Study of Hardware Performance Counters-Based Malware Detection Ieee Transactions On Information Forensics and Security. 15: 512-525. DOI: 10.1109/Tifs.2019.2924549 |
0.363 |
|
2020 |
Krishnamurthy P, Karri R, Khorrami F. Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters Ieee Transactions On Information Forensics and Security. 15: 666-680. DOI: 10.1109/Tifs.2019.2923577 |
0.33 |
|
2020 |
Rangarajan N, Patnaik S, Knechtel J, Karri R, Sinanoglu O, Rakheja S. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2020.2991134 |
0.629 |
|
2020 |
Patel NK, Krishnamurthy P, Amrouch H, Henkel J, Shamouilian M, Karri R, Khorrami F. Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.2973959 |
0.348 |
|
2020 |
Tan B, Elnaggar R, Fung JM, Karri R, Chakrabarty K. Towards Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 1-1. DOI: 10.1109/Tcad.2020.3019772 |
0.354 |
|
2020 |
Elnaggar R, Karri R, Chakrabarty K. Security Against Data-Sniffing and Alteration Attacks in IJTAG Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 1-1. DOI: 10.1109/Tcad.2020.3019167 |
0.37 |
|
2020 |
Shayan M, Liang T, Bhattacharjee S, Chakrabarty K, Karri R. Towards Secure Checkpointing for Micro-Electrode-Dot-Array Biochips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 1-1. DOI: 10.1109/Tcad.2020.2979972 |
0.432 |
|
2020 |
Tang J, Ibrahim M, Chakrabarty K, Karri R. Analysis and Design of Tamper-Mitigating Microfluidic Routing Fabrics Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 39: 1003-1016. DOI: 10.1109/Tcad.2019.2907881 |
0.772 |
|
2020 |
Tang J, Ibrahim M, Chakrabarty K, Karri R. Synthesis of Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 39: 171-184. DOI: 10.1109/Tcad.2018.2883901 |
0.753 |
|
2020 |
Kumar H, Jabbari T, Krylov G, Basu K, Friedman EG, Karri R. Toward Increasing the Difficulty of Reverse Engineering of RSFQ Circuits Ieee Transactions On Applied Superconductivity. 30: 1-13. DOI: 10.1109/Tasc.2019.2901895 |
0.401 |
|
2020 |
Surabhi VR, Krishnamurthy P, Amrouch H, Basu K, Henkel J, Karri R, Khorrami F. Hardware Trojan Detection Using Controlled Circuit Aging Ieee Access. 8: 77415-77434. DOI: 10.1109/Access.2020.2989735 |
0.321 |
|
2020 |
Gupta N, Tiwari A, Bukkapatnam STS, Karri R. Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks Ieee Access. 8: 47322-47333. DOI: 10.1109/Access.2020.2978815 |
0.333 |
|
2020 |
Li W, Mac G, Tsoutsos NG, Gupta N, Karri R. Computer aided design (CAD) model search and retrieval using frequency domain file conversion Additive Manufacturing. 101554. DOI: 10.1016/J.Addma.2020.101554 |
0.315 |
|
2019 |
Basu K, Saeed SM, Pilato C, Ashraf M, Nabeel MT, Chakrabarty K, Karri R. CAD-Base Acm Transactions On Design Automation of Electronic Systems. 24: 1-30. DOI: 10.1145/3315574 |
0.414 |
|
2019 |
Saeed SM, Mahendran N, Zulehner A, Wille R, Karri R. Identification of Synthesis Approaches for IP/IC Piracy of Reversible Circuits Acm Journal On Emerging Technologies in Computing Systems. 15: 1-17. DOI: 10.1145/3289392 |
0.371 |
|
2019 |
Cui X, Zhang J(, Wu K, Garg S, Karri R. Split Manufacturing-Based Register Transfer-Level Obfuscation Acm Journal On Emerging Technologies in Computing Systems. 15: 1-22. DOI: 10.1145/3289156 |
0.419 |
|
2019 |
Saeed SM, Zulehner A, Wille R, Drechsler R, Karri R. Reversible Circuits: IC/IP Piracy Attacks and Countermeasures Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 27: 2523-2535. DOI: 10.1109/Tvlsi.2019.2934465 |
0.394 |
|
2019 |
Shayan M, Bhattacharjee S, Song Y, Chakrabarty K, Karri R. Toward Secure Microfluidic Fully Programmable Valve Array Biochips Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 27: 2755-2766. DOI: 10.1109/Tvlsi.2019.2924915 |
0.457 |
|
2019 |
Pilato C, Basu K, Regazzoni F, Karri R. Black-Hat High-Level Synthesis: Myth or Reality? Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 27: 913-926. DOI: 10.1109/Tvlsi.2018.2884742 |
0.438 |
|
2019 |
Shayan M, Bhattacharjee S, Tang J, Chakrabarty K, Karri R. Bio-Protocol Watermarking on Digital Microfluidic Biochips Ieee Transactions On Information Forensics and Security. 14: 2901-2915. DOI: 10.1109/Tifs.2019.2907185 |
0.759 |
|
2019 |
Shayan M, Tang J, Chakrabarty K, Karri R. Security Assessment of Micro-Electrode-Dot-Array Biochips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 38: 1831-1843. DOI: 10.1109/Tcad.2018.2864249 |
0.763 |
|
2019 |
Tang J, Ibrahim M, Chakrabarty K, Karri R. Toward Secure and Trustworthy Cyberphysical Microfluidic Biochips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 38: 589-603. DOI: 10.1109/Tcad.2018.2855132 |
0.759 |
|
2019 |
Pilato C, Wu K, Garg S, Karri R, Regazzoni F. TaintHLS: High-Level Synthesis for Dynamic Information Flow Tracking Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 38: 798-808. DOI: 10.1109/Tcad.2018.2834421 |
0.385 |
|
2019 |
Shayan M, Basu K, Karri R. Hardware Trojans Inspired IP Watermarks Ieee Design & Test. 36: 72-79. DOI: 10.1109/Mdat.2019.2929116 |
0.415 |
|
2018 |
Cui X, Koopahi E, Wu K, Karri R. Hardware Trojan Detection Using the Order of Path Delay Acm Journal On Emerging Technologies in Computing Systems. 14: 1-23. DOI: 10.1145/3229050 |
0.335 |
|
2018 |
Cui X, Saeed SM, Zulehner A, Wille R, Wu K, Drechsler R, Karri R. On the Difficulty of Inserting Trojans in Reversible Computing Architectures Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2018.2823315 |
0.437 |
|
2018 |
Tang J, Ibrahim M, Chakrabarty K, Karri R. Secure Randomized Checkpointing for Digital Microfluidic Biochips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 37: 1119-1132. DOI: 10.1109/Tcad.2017.2748030 |
0.781 |
|
2018 |
Pilato C, Garg S, Wu K, Karri R, Regazzoni F. Securing Hardware Accelerators: A New Challenge for High-Level Synthesis Ieee Embedded Systems Letters. 10: 77-80. DOI: 10.1109/Les.2017.2774800 |
0.455 |
|
2017 |
Backer J, Hely D, Karri R. Secure and Flexible Trace-Based Debugging of Systems-on-Chip Acm Transactions On Design Automation of Electronic Systems. 22: 1-25. DOI: 10.1145/2994601 |
0.442 |
|
2017 |
Waszecki P, Mundhenk P, Steinhorst S, Lukasiewycz M, Karri R, Chakraborty S. Automotive Electrical and Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 36: 1790-1803. DOI: 10.1109/Tcad.2017.2666605 |
0.363 |
|
2017 |
Maniatakos M, Cardenas AA, Karri R. Guest Editors’ Introduction: Cyber-Physical Systems Security and Privacy Ieee Design & Test. 34: 5-6. DOI: 10.1109/Mdat.2017.2705028 |
0.359 |
|
2016 |
Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M. Hardware trojans: Lessons learned after one decade of research Acm Transactions On Design Automation of Electronic Systems. 22. DOI: 10.1145/2906147 |
0.38 |
|
2016 |
Sinanoglu O, Karri R. Guest editorial special issue on secure and trustworthy computing Acm Journal On Emerging Technologies in Computing Systems. 13. DOI: 10.1145/2898433 |
0.608 |
|
2016 |
Wang X, Chai S, Isnardi M, Lim S, Karri R. Hardware performance counter-based malware identification and detection with adaptive compressive sensing Acm Transactions On Architecture and Code Optimization. 13. DOI: 10.1145/2857055 |
0.346 |
|
2016 |
Rajendran J, Sinanoglu O, Karri R. Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. DOI: 10.1109/Tvlsi.2016.2530092 |
0.611 |
|
2016 |
Guo X, Jin C, Zhang C, Papadimitriou A, Hely D, Karri R. Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults? Ieee Transactions On Emerging Topics in Computing. 4: 363-373. DOI: 10.1109/Tetc.2015.2434103 |
0.652 |
|
2016 |
Yasin M, Rajendran JJ, Sinanoglu O, Karri R. On Improving the Security of Logic Locking Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 35: 1411-1424. DOI: 10.1109/Tcad.2015.2511144 |
0.662 |
|
2016 |
Wang X, Karri R. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 35: 485-498. DOI: 10.1109/Tcad.2015.2474374 |
0.39 |
|
2016 |
Khorrami F, Krishnamurthy P, Karri R. Cybersecurity for Control Systems: A Process-Aware Perspective Ieee Design & Test. 33: 75-83. DOI: 10.1109/Mdat.2016.2594178 |
0.349 |
|
2016 |
Zeltmann SE, Gupta N, Tsoutsos NG, Maniatakos M, Rajendran J, Karri R. Manufacturing and Security Challenges in 3D Printing Jom. 1-10. DOI: 10.1007/S11837-016-1937-7 |
0.625 |
|
2015 |
Subidh Ali S, Ibrahim M, Sinanoglu O, Chakrabarty K, Karri R. Security Assessment of Cyberphysical DigitalMicrofluidic Biochips. Ieee/Acm Transactions On Computational Biology and Bioinformatics. PMID 28055893 DOI: 10.1109/TCBB.2015.2509991 |
0.6 |
|
2015 |
Ali S, Ibrahim M, Sinanoglu O, Chakrabarty K, Karri R. Security Assessment of Cyberphysical Digital Microfluidic Biochips. Ieee/Acm Transactions On Computational Biology and Bioinformatics / Ieee, Acm. PMID 26701892 DOI: 10.1109/Tcbb.2015.2509991 |
0.638 |
|
2015 |
DeTrano A, Karimi N, Karri R, Guo X, Carlet C, Guilley S. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets. Thescientificworldjournal. 2015: 743618. PMID 26491717 DOI: 10.1155/2015/743618 |
0.624 |
|
2015 |
Kanuparthi A, Karri R. Reliable Integrity Checking in Multicore Processors Acm Transactions On Architecture and Code Optimization. 12: 1-23. DOI: 10.1145/2738052 |
0.48 |
|
2015 |
Karimi N, Kanuparthi AK, Wang X, Sinanoglu O, Karri R. MAGIC Acm Transactions On Architecture and Code Optimization. 12: 1-25. DOI: 10.1145/2724718 |
0.608 |
|
2015 |
Ali SS, Sinanoglu O, Karri R. AES design space exploration new line for scan attack resiliency Ieee/Ifip International Conference On Vlsi and System-On-Chip, Vlsi-Soc. 2015. DOI: 10.1109/VLSI-SoC.2014.7004193 |
0.604 |
|
2015 |
Karri R, Koushanfar F, Sinanoglu O, Makris Y, Mai K, Sadeghi AR, Bhunia S. Guest editorial special section on hardware security and trust Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 873-874. DOI: 10.1109/Tcad.2015.2432680 |
0.7 |
|
2015 |
Rajendran J, Ali A, Sinanoglu O, Karri R. Belling the CAD: Toward Security-Centric Electronic System Design Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 1756-1769. DOI: 10.1109/Tcad.2015.2428707 |
0.751 |
|
2015 |
Ali SS, Saeed SM, Sinanoglu O, Karri R. Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 808-821. DOI: 10.1109/Tcad.2015.2398423 |
0.637 |
|
2015 |
Kannan S, Karimi N, Karri R, Sinanoglu O. Modeling, detection, and diagnosis of faults in multilevel memristor memories Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 822-834. DOI: 10.1109/Tcad.2015.2394434 |
0.684 |
|
2015 |
Kannan S, Karimi N, Sinanoglu O, Karri R. Security vulnerabilities of emerging nonvolatile main memories and countermeasures Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 2-15. DOI: 10.1109/Tcad.2014.2369741 |
0.69 |
|
2015 |
Rajendran J, Karri R, Rose GS. Improving tolerance to variations in memristor-based applications using parallel memristors Ieee Transactions On Computers. 64: 733-746. DOI: 10.1109/Tc.2014.2308189 |
0.634 |
|
2015 |
Rajendran J, Zhang H, Zhang C, Rose GS, Pino Y, Sinanoglu O, Karri R. Fault Analysis-Based Logic Encryption Ieee Transactions On Computers. 64: 410-424. DOI: 10.1109/Tc.2013.193 |
0.765 |
|
2015 |
Guo X, Mukhopadhyay D, Jin C, Karri R. Security analysis of concurrent error detection against differential fault analysis Journal of Cryptographic Engineering. 5: 153-169. DOI: 10.1007/S13389-014-0092-8 |
0.617 |
|
2015 |
Ali S, Guo X, Karri R, Mukhopadhyay D. Fault attacks on AES and their countermeasures Secure System Design and Trustable Computing. 163-208. DOI: 10.1007/978-3-319-14971-4_5 |
0.586 |
|
2014 |
Chang D, Ozev S, Sinanoglu O, Karri R. Approximating the age of RF/analog circuits through re-characterization and statistical estimation Proceedings -Design, Automation and Test in Europe, Date. DOI: 10.7873/DATE2014.048 |
0.663 |
|
2014 |
Liu C, Rajendran J, Yang C, Karri R. Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling Ieee Transactions On Emerging Topics in Computing. 2: 461-472. DOI: 10.1109/Tetc.2014.2348182 |
0.715 |
|
2014 |
Karri R, Potkonjak M. Special issue on emerging nanoscale architectures for hardware security, trust, and reliability: Part 1 Ieee Transactions On Emerging Topics in Computing. 2: 2-3. DOI: 10.1109/Tetc.2014.2318951 |
0.433 |
|
2014 |
Koushanfar F, Karri R. Can the SHIELD protect our integrated circuits? Midwest Symposium On Circuits and Systems. 350-353. DOI: 10.1109/MWSCAS.2014.6908424 |
0.313 |
|
2014 |
Rostami M, Koushanfar F, Karri R. A primer on hardware security: Models, methods, and metrics Proceedings of the Ieee. 102: 1283-1295. DOI: 10.1109/JPROC.2014.2335155 |
0.311 |
|
2014 |
Rajendran J, Sinanoglu O, Karri R. Regaining Trust in VLSI Design: Design-for-Trust Techniques Proceedings of the Ieee. 102: 1266-1282. DOI: 10.1109/JPROC.2014.2332154 |
0.549 |
|
2014 |
Ali SS, Sinanoglu O, Karri R. Test-mode-only scan attack using the boundary scan chain Proceedings - 2014 19th Ieee European Test Symposium, Ets 2014. DOI: 10.1109/ETS.2014.6847798 |
0.566 |
|
2014 |
Guo X, Karri R. Low-Cost Concurrent Error Detection for GCM and CCM Journal of Electronic Testing. 30: 725-737. DOI: 10.1007/S10836-014-5494-0 |
0.649 |
|
2013 |
Kannan S, Rajendran J, Karri R, Sinanoglu O. Sneak-Path Testing of Crossbar-Based Nonvolatile Random Access Memories Ieee Transactions On Nanotechnology. 12: 413-426. DOI: 10.1109/Tnano.2013.2253329 |
0.748 |
|
2013 |
Guo X, Karri R. Recomputing with Permuted Operands: A Concurrent Error Detection Approach Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 32: 1595-1608. DOI: 10.1109/Tcad.2013.2263037 |
0.665 |
|
2013 |
Rajendran J, Kanuparthi AK, Karri R, Zahran M, Addepalli SK, Ormazabal G. Securing processors against insider attacks: A circuit-microarchitecture co-design approach Ieee Design and Test. 30: 35-44. DOI: 10.1109/Mdat.2013.2249554 |
0.706 |
|
2013 |
Rostami M, Koushanfar F, Rajendran J, Karri R. Hardware security: Threat models and metrics Ieee/Acm International Conference On Computer-Aided Design, Digest of Technical Papers, Iccad. 819-823. DOI: 10.1109/ICCAD.2013.6691207 |
0.312 |
|
2013 |
Sinanoglu O, Karimi N, Rajendran J, Karri R, Jin Y, Huang K, Makris Y. Reconciling the IC test and security dichotomy Proceedings - 2013 18th Ieee European Test Symposium, Ets 2013. DOI: 10.1109/ETS.2013.6569368 |
0.735 |
|
2013 |
Rose GS, Rajendran J, McDonald N, Karri R, Potkonjak M, Wysocki B. Hardware security strategies exploiting nanoelectronic circuits Proceedings of the Asia and South Pacific Design Automation Conference, Asp-Dac. 368-372. DOI: 10.1109/ASPDAC.2013.6509623 |
0.345 |
|
2012 |
Potkonjak M, Karri R, Verbauwhede I, Itoh K. Guest editorial integrated circuit and system security Ieee Transactions On Information Forensics and Security. 7: 1-2. DOI: 10.1109/Tifs.2011.2180833 |
0.379 |
|
2012 |
Kanuparthi AK, Zahran M, Karri R. Architecture support for dynamic integrity checking Ieee Transactions On Information Forensics and Security. 7: 321-332. DOI: 10.1109/Tifs.2011.2166960 |
0.446 |
|
2012 |
Rajendran J, Manem H, Karri R, Rose GS. An Energy-Efficient Memristive Threshold Logic Circuit Ieee Transactions On Computers. 61: 474-487. DOI: 10.1109/Tc.2011.26 |
0.64 |
|
2012 |
Kanuparthi AK, Karri R, Ormazabal G, Addepalli SK. A survey of microarchitecture support for embedded processor security Proceedings - 2012 Ieee Computer Society Annual Symposium On Vlsi, Isvlsi 2012. 368-373. DOI: 10.1109/ISVLSI.2012.64 |
0.368 |
|
2012 |
Rajendran J, Rose GS, Karri R, Potkonjak M. Nano-PPUF: A memristor-based security primitive Proceedings - 2012 Ieee Computer Society Annual Symposium On Vlsi, Isvlsi 2012. 84-87. DOI: 10.1109/ISVLSI.2012.40 |
0.3 |
|
2012 |
Kanuparthi AK, Karri R, Ormazabal G, Addepalli SK. A high-performance, low-overhead microarchitecture for secure program execution Proceedings - Ieee International Conference On Computer Design: Vlsi in Computers and Processors. 102-107. DOI: 10.1109/ICCD.2012.6378624 |
0.318 |
|
2011 |
Liu Y, Wu K, Karri R. Scan-based attacks on linear feedback shift register based stream ciphers Acm Transactions On Design Automation of Electronic Systems. 16: 1-15. DOI: 10.1145/1929943.1929952 |
0.444 |
|
2011 |
Rao W, Yang C, Karri R, Orailoglu A. Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge Computer. 44: 46-53. DOI: 10.1109/Mc.2011.1 |
0.672 |
|
2011 |
Tehranipoor M, Salmani H, Zhang X, Wang M, Karri R, Rajendran J, Rosenfeld K. Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges Computer. 44: 66-74. DOI: 10.1109/Mc.2010.369 |
0.761 |
|
2010 |
Rosenfeld K, Karri R. Attacks and Defenses for JTAG Ieee Design & Test of Computers. 27: 36-47. DOI: 10.1109/Mdt.2010.9 |
0.689 |
|
2010 |
Karri R, Rajendran J, Rosenfeld K, Tehranipoor M. Trustworthy Hardware: Identifying and Classifying Hardware Trojans Computer. 43: 39-46. DOI: 10.1109/Mc.2010.299 |
0.758 |
|
2009 |
Rao W, Orailoglu A, Karri R. Logic Mapping in Crossbar-Based Nanoarchitectures Ieee Design & Test of Computers. 26: 68-77. DOI: 10.1109/Mdt.2009.14 |
0.644 |
|
2008 |
Kim K, Karri R, Orailoglu A. Design automation for hybrid CMOS-nanoelectronics crossbars 2007 Ieee International Symposium On Nanoscale Architectures, Nanoarch. 27-32. DOI: 10.1109/NANOARCH.2007.4400854 |
0.584 |
|
2007 |
Kim K, Wu K, Karri R. The Robust QCA Adder Designs Using Composable QCA Building Blocks Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 26: 176-183. DOI: 10.1109/Tcad.2006.883921 |
0.363 |
|
2007 |
Rao W, Orailoglu A, Karri R. Fault tolerant approaches to nanoelectronic programmable logic arrays Proceedings of the International Conference On Dependable Systems and Networks. 216-223. DOI: 10.1109/DSN.2007.49 |
0.582 |
|
2007 |
Wenjing R, Orailoglu A, Karri R. Logic level fault tolerance approaches targeting nanoelectronics PLAs Proceedings -Design, Automation and Test in Europe, Date. 865-869. DOI: 10.1109/DATE.2007.364401 |
0.59 |
|
2007 |
Rao W, Orailoglu A, Karri R. Towards nanoelectronics processor architectures Journal of Electronic Testing: Theory and Applications (Jetta). 23: 235-254. DOI: 10.1007/S10836-006-0555-7 |
0.717 |
|
2006 |
Rao W, Orailoglu A, Karri R. Topology aware mapping of logic functions onto nanowire-based crossbar architectures Proceedings - Design Automation Conference. 723-726. DOI: 10.1145/1146909.1147093 |
0.534 |
|
2006 |
Rao W, Orailoglu A, Karri R. Nanofabric topologies and reconfiguration algorithms to support dynamically adaptive fault tolerance Proceedings of the Ieee Vlsi Test Symposium. 2006: 214-219. DOI: 10.1109/VTS.2006.50 |
0.561 |
|
2006 |
Yang B, Wu K, Karri R. Secure Scan: A Design-for-Test Architecture for Crypto Chips Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 25: 2287-2293. DOI: 10.1109/Tcad.2005.862745 |
0.473 |
|
2006 |
Joshi N, Wu K, Sundararajan J, Karri R. Concurrent error detection for involutional functions with applications in fault-tolerant cryptographic hardware design Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 25: 1163-1169. DOI: 10.1109/Tcad.2005.855980 |
0.32 |
|
2006 |
Joshi N, Sundararajan J, Wu K, Yang B, Karri R. Tamper proofing by design using generalized involution-based concurrent error detection for involutional substitution permutation and feistel networks Ieee Transactions On Computers. 55: 1230-1239. DOI: 10.1109/Tc.2006.167 |
0.448 |
|
2006 |
Yang B, Karri R, McGrew DA. A high-speed hardware architecture for universal message authentication code Ieee Journal On Selected Areas in Communications. 24: 1831-1839. DOI: 10.1109/Jsac.2006.877133 |
0.374 |
|
2006 |
Rao W, Orailoglu A, Karri R. Fault identification in reconfigurable carry lookahead adders targeting nanoelectronic fabrics Proceedings - Eleventh Ieee European Test Symposium, Ets 2006. 2006: 63-68. DOI: 10.1109/ETS.2006.23 |
0.579 |
|
2006 |
Kim K, Wu K, Karri R. Quantum-Dot Cellular Automata Design Guideline Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 89: 1607-1614. DOI: 10.1093/Ietfec/E89-A.6.1607 |
0.353 |
|
2005 |
Yang B, Karri R, McGrew DA. Divide-and-concatenate: An architecture-level optimization technique for universal hash functions Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 24: 1740-1746. DOI: 10.1109/Tcad.2005.852455 |
0.356 |
|
2005 |
Wang H, Veeraraghavan M, Karri R, Li T. Design of a high-performance RSVP-TE hardware signaling accelerator Ieee Journal On Selected Areas in Communications. 23: 1588-1595. DOI: 10.1109/Jsac.2005.852241 |
0.37 |
|
2005 |
Rao W, Orailoglu A, Karri R. Architectural-level fault tolerant computation in nanoelectronic processors Proceedings - Ieee International Conference On Computer Design: Vlsi in Computers and Processors. 2005: 533-539. DOI: 10.1109/ICCD.2005.27 |
0.609 |
|
2004 |
Hong I, Potkonjak M, Karri R. A heterogeneous built-in self-repair approach using system-level synthesis flexibility Ieee Transactions On Reliability. 53: 93-101. DOI: 10.1109/Tr.2003.819047 |
0.39 |
|
2004 |
Wu K, Karri R. Fault Secure Datapath Synthesis Using Hybrid Time and Hardware Redundancy Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 23: 1476-1484. DOI: 10.1109/Tcad.2004.835132 |
0.474 |
|
2004 |
Sonecha D, Yang B, Karri R, MCGrew DA. High speed architectures for leviathan: A binary tree based stream cipher Microprocessors and Microsystems. 28: 573-584. DOI: 10.1016/J.Micpro.2004.08.006 |
0.378 |
|
2003 |
Wu K, Karri R. Selectively breaking data dependences to improve the utilization of idle cycles in algorithm level re-computing data paths Ieee Transactions On Reliability. 52: 501-511. DOI: 10.1109/Tr.2003.821942 |
0.382 |
|
2003 |
Karri R, Mishra P. Mobile Networks and Applications. 8: 177-185. DOI: 10.1023/A:1022241315935 |
0.377 |
|
2003 |
Wu K, Mishra P, Karri R. Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher Microelectronics Journal. 34: 31-39. DOI: 10.1016/S0026-2692(02)00126-X |
0.422 |
|
2002 |
Karri R, Wu K. Algorithm level re-computing using implementation diversity: a register transfer level concurrent error detection technique Ieee Transactions On Very Large Scale Integration Systems. 10: 864-875. DOI: 10.1109/Tvlsi.2002.808440 |
0.414 |
|
2002 |
Karri R, Wu K, Mishra P, Kim Y. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 21: 1509-1517. DOI: 10.1109/Tcad.2002.804378 |
0.434 |
|
2002 |
Wu K, Karri R. Algorithm level recomputing using allocation diversity: a register transfer level approach to time redundancy-based concurrent error detection Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 21: 1077-1087. DOI: 10.1109/Tcad.2002.801110 |
0.371 |
|
2002 |
Karri R, Iyer B, Koren I. Phantom redundancy: A register transfer level technique for gracefully degradable data path synthesis Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 21: 877-888. DOI: 10.1109/Tcad.2002.800450 |
0.321 |
|
2001 |
Karri R, Iyer B. Introspection: A register transfer level technique for concurrent error detection and diagnosis in data dominated designs Acm Transactions On Design Automation of Electronic Systems. 6: 501-515. DOI: 10.1145/502175.502179 |
0.349 |
|
2001 |
Karri R. Guest editor's introduction to special section on high-level design validation and test Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 20: 353-354. DOI: 10.1109/Tcad.2001.913753 |
0.401 |
|
2000 |
Potkonjak M, Kim K, Karri R. Computer aided design of fault-tolerant application specific programmable processors Ieee Transactions On Computers. 49: 1272-1284. DOI: 10.1109/12.895942 |
0.41 |
|
1999 |
Hong I, Potkonjak M, Karri R. Power optimization using divide-and-conquer techniques for minimization of the number of operations Acm Transactions On Design Automation of Electronic Systems (Todaes). 4: 405-429. DOI: 10.1145/323480.323489 |
0.317 |
|
1999 |
Karri R. Fault-tolerant vlsi systems Ieee Transactions On Reliability. 48: 106-107. DOI: 10.1109/Tr.1999.784265 |
0.327 |
|
1999 |
Mukherjee N, Chakraborty T, Karri R. Built in self test: a complete test solution for telecommunication systems Ieee Communications Magazine. 37: 72-78. DOI: 10.1109/35.769277 |
0.342 |
|
1998 |
Dasgupta A, Karri R. High-reliability, low-energy microarchitecture synthesis Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 17: 1273-1280. DOI: 10.1109/43.736567 |
0.3 |
|
1996 |
Karri R, Hogstedt K, Orailoglu A. Computer-aided design of fault-tolerant VLSI systems Ieee Design and Test of Computers. 13: 88-96. DOI: 10.1109/54.536099 |
0.622 |
|
1996 |
Karri R, Orailoglu A. Time-constrained scheduling during high-level synthesis of fault-secure VLSI digital signal processors Ieee Transactions On Reliability. 45: 404-412. DOI: 10.1109/24.536993 |
0.645 |
|
1996 |
Orailoglu A, Karri R. Automatic synthesis of self-recovering VLSI systems Ieee Transactions On Computers. 45: 131-142. DOI: 10.1109/12.485368 |
0.616 |
|
1994 |
Orailoglu A, Karri R. Coactive scheduling and checkpoint determination during high level synthesis of self-recovering microarchitectures Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 2: 304-311. DOI: 10.1109/92.311639 |
0.579 |
|
1994 |
Orailoǧlu A, Karri R. Synthesis of fault-tolerant and real-time microarchitectures Journal of Systems and Software. 25: 73-84. DOI: 10.1016/0164-1212(94)90058-2 |
0.616 |
|
1990 |
Karri R, Orailoglu A. Standard seven segmented display for burmese numerals Ieee Transactions On Consumer Electronics. 36: 959-961. DOI: 10.1109/30.61581 |
0.521 |
|
Show low-probability matches. |