Kan Xiao
Kan Xiao
Verified email at engr.uconn.edu
Title
Cited by
Cited by
Year
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
3082016
BISA: Built-in self-authentication for preventing hardware Trojan insertion
K Xiao, M Tehranipoor
2013 IEEE international symposium on hardware-oriented security and trust …, 2013
1232013
Bit selection algorithm suitable for high-volume production of SRAM-PUF
K Xiao, MT Rahman, D Forte, Y Huang, M Su, M Tehranipoor
2014 IEEE international symposium on hardware-oriented security and trust …, 2014
1102014
A clock sweeping technique for detecting hardware trojans impacting circuits delay
K Xiao, X Zhang, M Tehranipoor
IEEE Design & Test 30 (2), 26-34, 2013
992013
Path-delay fingerprinting for identification of recovered ICs
X Zhang, K Xiao, M Tehranipoor
2012 IEEE International symposium on defect and fault tolerance in VLSI and …, 2012
892012
A novel built-in self-authentication technique to prevent inserting hardware trojans
K Xiao, D Forte, M Tehranipoor
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
872014
DRAM based intrinsic physical unclonable functions for system level security
F Tehranipoor, N Karimian, K Xiao, J Chandy
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 15-20, 2015
822015
Efficient and secure split manufacturing via obfuscated built-in self-authentication
K Xiao, D Forte, MM Tehranipoor
2015 IEEE International symposium on hardware oriented security and trust …, 2015
752015
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
732016
TI-TRNG: Technology independent true random number generator
MT Rahman, K Xiao, D Forte, X Zhang, J Shi, M Tehranipoor
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
582014
Advanced analysis of cell stability for reliable SRAM PUFs
A Hosey, MT Rahman, K Xiao, D Forte, M Tehranipoor
2014 IEEE 23rd Asian Test Symposium, 348-353, 2014
232014
Security rule checking in IC design
K Xiao, A Nahiyan, M Tehranipoor
Computer 49 (8), 54-61, 2016
192016
A study on the effectiveness of Trojan detection techniques using a red team blue team approach
X Zhang, K Xiao, M Tehranipoor, J Rajendran, R Karri
2013 IEEE 31st VLSI Test Symposium (VTS), 1-3, 2013
192013
A zero-overhead IC identification technique using clock sweeping and path delay analysis
N Tuzzio, K Xiao, X Zhang, M Tehranipoor
Proceedings of the great lakes symposium on VLSI, 95-98, 2012
122012
Obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Hardware Protection through Obfuscation, 263-289, 2017
92017
Security rule check
A Nahiyan, K Xiao, D Forte, M Tehranipoor
Hardware IP Security and Trust, 17-36, 2017
82017
Securing split manufactured ICs with wire lifting obfuscated built-in self-authentication
Q Shi, K Xiao, D Forte, MM Tehranipoor
Proceedings of the on Great Lakes Symposium on VLSI 2017, 339-344, 2017
72017
Circuit timing signature (CTS) for detection of counterfeit integrated circuits
K Xiao, D Forte, MM Tehranipoor
Secure System Design and Trustable Computing, 211-239, 2016
52016
Methods and systems for preventing hardware trojan insertion
M Tehranipoor, K Xiao
US Patent 9,218,506, 2015
32015
Techniques for improving security and trustworthiness of integrated circuits
K Xiao
32015
The system can't perform the operation now. Try again later.
Articles 1–20