David Hely
Home
Publications
Research
Teaching
Contact
David Hely
Latest
Implementation of Password Management System Using Ternary Addressable PUF Generator
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods
Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model
System, method and computer-accessible medium for low-overhead security wrapper for memory access control of embedded systems
Method and device for detecting an erroneous jump during program execution
Electronic circuit comprising a test mode secured by insertion of decoy data in the test chain, associated method
Integrated circuit comprising a test mode secured by the use of an identifier, and associated method
Electronic circuit comprising a test mode secured by the breaking of a test chain, and associated electronic circuit
Detection of a disturbance in the state of an electronic circuit flip-flop
Integrated circuit comprising a test mode secured by detection of the state of a control signal
Method and device for securing the reading of a memory
Protecting an integrated circuit test mode
Integrated circuit having configurable cells and a secured test mode
Method for testing an electronic circuit comprising a test mode secured by the use of a signature, and associated electronic circuit
Method of securing the test mode of an integrated circuit via intrusion detection
Securing the test mode of an integrated circuit
Integrated circuit comprising a test mode secured by initialization of the test mode
Cite
×