Search Results for author: Behnam Omidi

Found 1 papers, 0 papers with code

Evasive Hardware Trojan through Adversarial Power Trace

no code implementations4 Jan 2024 Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

We introduce a HT obfuscation (HTO) approach to allow HTs to bypass this detection method.

Side Channel Analysis

Cannot find the paper you are looking for? You can Submit a new open access paper.