Cited By
View all- Klix SAlbartus NSpeith JStaat PVerstege AWilde ALammers DLangheinrich JKison CSester-Wehle SHolcomb DPaar CLuo BLiao XXu JKirda ELie D(2024)Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse EngineeringProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690235(3391-3405)Online publication date: 2-Dec-2024
- Rahman MGeist JXing DLiu YSrivastava AMeade TJin YBhunia S(2024)Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team PracticeACM Transactions on Design Automation of Electronic Systems10.1145/364046129:3(1-18)Online publication date: 5-Mar-2024
- Pagliarini SAikata AImran MSinha Roy SQuek TGao DZhou JCardenas A(2024)REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum CryptographyProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657016(533-547)Online publication date: 1-Jul-2024
- Show More Cited By