Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Fahim Rahman"'
Autor:
Md Sami Ul Islam Sami, Tao Zhang, Amit Mazumder Shuvo, Md Saad Ul Haque, Paul E. Calzada, Kimia Zamiri Azar, Hadi Mardani Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Publikováno v:
IEEE Access, Vol 12, Pp 48081-48107 (2024)
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to resp
Externí odkaz:
https://doaj.org/article/e06012ab5b6e46eab6276bb8384472df
Autor:
M. Sazadur Rahman, Rui Guo, Hadi M. Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Publikováno v:
IEEE Access, Vol 11, Pp 19741-19761 (2023)
Hardware obfuscating is a proactive design-for-trust technique against IC supply chain threats, i.e., IP piracy and overproduction. Many studies have evaluated numerous techniques for obfuscation purposes. Nevertheless, de-obfuscation attacks have de
Externí odkaz:
https://doaj.org/article/c0e35c5763fd48deae6b188a0813f9c5
Autor:
P. Kuwar Chhetri, Ahmed Al Montasir, Renu Gupta, Shamsul Alam., Shafwanur Rahman, Fahim Rahman
Publikováno v:
International Journal of Medical Students, Vol 10 (2022)
Background: Varicella-zoster virus (HHV3) is one of the virus in herpes family. Herpes zoster results from the reactivation of varicella-zoster virus in the dorsal root ganglion. This reactivation occurs in immunocompromised conditions such as people
Externí odkaz:
https://doaj.org/article/8ec5bb46cc1a4f82a4f8a7d7aab9869e
Publikováno v:
IEEE Design & Test. 40:127-136
ACED-IT: Assuring Confidential Electronic Design Against Insider Threats in a Zero-Trust Environment
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:3202-3215
Publikováno v:
2023 IEEE 16th Dallas Circuits and Systems Conference (DCAS).
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:452-465
Fault-injection attacks have become a major concern for hardware designs, primarily due to their powerful capability in tampering with critical locations in a device to cause violation of its integrity, confidentiality, and availability. Researchers
Autor:
Nidish Vashistha, Muhammad Monir Hossain, Md Rakib Shahriar, Farimah Farahmandi, Fahim Rahman, Mark M. Tehranipoor
Publikováno v:
IEEE Transactions on Consumer Electronics. 68:23-37
Autor:
Hasan Al-Shaikh, Arash Vafaei, Mridha Md Mashahedur Rahman, Kimia Zamiri Azar, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor
Publikováno v:
Proceedings of the 28th Asia and South Pacific Design Automation Conference.
Autor:
M Sazadur Rahman, Rui Guo, Hadi M Kamali, Fahim Rahman, Farimah Farahmandi, Mohamed Abdel-Moneum, Mark Tehranipoor
Publikováno v:
Proceedings of the 59th ACM/IEEE Design Automation Conference.