Lang Lin
Lang Lin
ANSYS, Intel, UMass
E-mail confirmado em - Página inicial
Citado por
Citado por
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
L Lin, M Kasper, T Güneysu, C Paar, W Burleson
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
MOLES: Malicious off-chip leakage enabled by side-channels
L Lin, W Burleson, C Paar
Proceedings of the 2009 international conference on computer-aided design …, 2009
Low-power sub-threshold design of secure physical unclonable functions
L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson
Proceedings of the 16th ACM/IEEE international symposium on Low power …, 2010
Design and validation of arbiter-based PUFs for sub-45-nm low-power security applications
L Lin, S Srivathsa, DK Krishnappa, P Shabadi, W Burleson
IEEE Transactions on Information Forensics and Security 7 (4), 1394-1403, 2012
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems
L Lin, W Burleson
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 252-255, 2008
Analysis and mitigation of process variation impacts on power-attack tolerance
L Lin, W Burleson
Proceedings of the 46th annual design automation conference, 238-243, 2009
Source cell-phone identification in the presence of additive noise from CQT domain
T Qin, R Wang, D Yan, L Lin
Information 9 (8), 205, 2018
Implementing hardware trojans: Experiences from a hardware trojan challenge
GT Becker, A Lakshminarasimhan, L Lin, S Srivathsa, VB Suresh, ...
2011 IEEE 29th International Conference on Computer Design (ICCD), 301-304, 2011
A fast side-channel leakage simulation technique based on IC chip power modeling
A Tsukioka, K Srinivasan, S Wan, L Lin, YS Li, N Chang, M Nagata
IEEE Letters on Electromagnetic Compatibility Practice and Applications 1 (4 …, 2019
Multiphysics simulation of em side-channels from silicon backside with ml-based auto-poi identification
L Lin, D Zhu, J Wen, H Chen, Y Lu, N Chang, C Chow, H Shrivastav, ...
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
Fast and comprehensive simulation methodology for layout-based power-noise side-channel leakage analysis
L Lin, D Selvakumaran, D Zhu, N Chang, C Chow, M Nagata, K Monta
2020 IEEE International Symposium on Smart Electronic Systems (iSES …, 2020
Security properties driven pre-silicon laser fault injection assessment
N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor
2022 IEEE International Symposium on Hardware Oriented Security and Trust …, 2022
A replay speech detection algorithm based on sub-band analysis
L Lin, R Wang, Y Diqun
Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018
Design optimization and security validation of sub-threshold PUFs
L Lin, D Holcomb, DK Krishnappa, P Shabadi, W Burleson
Proceedings of the Secure Component and System Identification Workshop …, 2010
Detection of replay attack based on normalized constant q cepstral feature
Y Ye, L Lao, D Yan, L Lin
2019 IEEE 4th International Conference on Cloud Computing and Big Data …, 2019
A robust method for speech replay attack detection
L Lin, R Wang, D Yan, L Dong
KSII Transactions on Internet and Information Systems (TIIS) 14 (1), 168-182, 2020
SPILL—Security Properties and Machine-Learning Assisted Pre-Silicon Laser Fault Injection Assessment
N Pundir, H Li, L Lin, N Chang, F Farahmandi, M Tehranipoor
ISTFA 2022, 225-236, 2022
Layout-based side-channel emission analysis
L Lin, DK Selvakumaran, N Chang, C Chow, D Zhu
US Patent 11,301,608, 2022
ML-augmented Methodology for Fast Thermal Side-channel Emission Analysis
N Chang, D Zhu, L Lin, D Selvakumaran, J Wen, S Pan, W Xia, H Chen, ...
Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021
Silicon-correlated simulation methodology of em side-channel leakage analysis
K Monta, L Lin, J Wen, H Shrivastav, C Chow, H Chen, J Geada, ...
ACM Journal on Emerging Technologies in Computing Systems 19 (1), 1-23, 2022
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20