Domenic Forte
Domenic Forte
Associate Professor of ECE, University of Florida
Verified email at - Homepage
Cited by
Cited by
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
A survey on chip to system reverse engineering
SE Quadir, J Chen, D Forte, N Asadizanjani, S Shahbazmohamadi, ...
ACM journal on emerging technologies in computing systems (JETC) 13 (1), 1-34, 2016
Counterfeit integrated circuits
MM Tehranipoor, U Guin, D Forte
Counterfeit Integrated Circuits, 15-36, 2015
Benchmarking of hardware trojans and maliciously affected circuits
B Shakya, T He, H Salmani, D Forte, S Bhunia, M Tehranipoor
Journal of Hardware and Systems Security 1 (1), 85-102, 2017
Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks
X Xu, B Shakya, MM Tehranipoor, D Forte
International conference on cryptographic hardware and embedded systems, 189-210, 2017
Temperature tracking: An innovative run-time approach for hardware Trojan detection
D Forte, C Bao, A Srivastava
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 532-539, 2013
On application of one-class SVM to reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
Fifteenth International Symposium on Quality Electronic Design, 47-54, 2014
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
ARO-PUF: An aging-resistant ring oscillator PUF design
MT Rahman, D Forte, J Fahrny, M Tehranipoor
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
An aging-resistant RO-PUF for reliable key generation
MT Rahman, F Rahman, D Forte, M Tehranipoor
IEEE Transactions on Emerging Topics in Computing 4 (3), 335-348, 2015
On reverse engineering-based hardware Trojan detection
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
Memristor PUF—A security primitive: Theory and experiment
A Mazady, MT Rahman, D Forte, M Anwar
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5 (2 …, 2015
Anti-counterfeit techniques: From design to resign
U Guin, D Forte, M Tehranipoor
2013 14th International workshop on microprocessor test and verification, 89-94, 2013
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
Highly reliable key generation from electrocardiogram (ECG)
N Karimian, Z Guo, M Tehranipoor, D Forte
IEEE Transactions on Biomedical Engineering 64 (6), 1400-1411, 2016
Low-cost on-chip structures for combating die and IC recycling
U Guin, X Zhang, D Forte, M Tehranipoor
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
Temperature tracking: Toward robust run-time detection of hardware Trojans
C Bao, D Forte, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly
MT Rahman, D Forte, Q Shi, GK Contreras, M Tehranipoor
2014 IEEE International symposium on defect and fault tolerance in VLSI and …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20