Xiaolong Guo
Título
Citado por
Citado por
Ano
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
J He, Y Zhao, X Guo, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017
742017
Pre-silicon security verification and validation: A formal perspective
X Guo, RG Dutta, Y Jin, F Farahmandi, P Mishra
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
592015
Scalable SoC trust verification using integrated theorem proving and model checking
X Guo, RG Dutta, P Mishra, Y Jin
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
402016
Estimation of safe sensor measurements of autonomous system under attack
RG Dutta, X Guo, T Zhang, K Kwiat, C Kamhoua, L Njilla, Y Jin
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
202017
Data Secrecy Protection through Information FlowTracking in Proof-Carrying Hardware IP Part I: Framework Fundamentals
J Yier, G Xiaolong, D Raj Gautam, B Mohammad-Mahdi, M Yiorgos
IEEE Transactions on Information Forensics and Security (TIFS), 2017
172017
Eliminating the hardware-software boundary: A proof-carrying approach for trust evaluation on computer systems
X Guo, RG Dutta, Y Jin
IEEE Transactions on Information Forensics and Security 12 (2), 405-417, 2016
152016
Data Secrecy Protection through Information FlowTracking in Proof-Carrying Hardware IP Part II: Framework Automation
B Mohammad-Mahdi, G Xiaolong, D Raj Gautam, J Yier, M Yiorgos
IEEE Transactions on Information Forensics and Security (TIFS), 2017
12*2017
Hierarchy-Preserving Formal Verification Methods for Pre-Silicon Security Assurance
YJ Xiaolong Guo, Raj Gautam Dutta
16th International Workshop on Microprocessor and SOC Test and Verification …, 2015
11*2015
Automatic code converter enhanced PCH framework for SoC trust verification
X Guo, RG Dutta, P Mishra, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017
102017
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
X Guo, RG Dutta, J He, MM Tehranipoor, Y Jin
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
72019
Automatic RTL-to-formal code converter for IP security formal verification
X Guo, RG Dutta, P Mishra, Y Jin
2016 17th International Workshop on Microprocessor and SOC Test and …, 2016
72016
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans
X Guo, H Zhu, Y Jin, X Zhang
2019 Design, Automation Test in Europe Conference Exhibition (DATE), 1727-1732, 2019
62019
Quantifying trust in autonomous system under uncertainties
RG Dutta, X Guo, Y Jin
2016 29th IEEE International System-on-Chip Conference (SOCC), 362-367, 2016
62016
Quantifying Trust in Autonomous System Under Uncertainties
RG Dutta, X Guo, Y Jin
IEEE SoC (System-on-Chip) Conference (SOCC), 2016
62016
A radius choice algorithm for MIMO sphere decoding based on the noise statistics
S Wang, X GUO, MUM Bakura, S SUN, X JING, H HUANG
J. Comput. Inf. Syst. 8 (6), 2401-2408, 2012
62012
PCH Framework for IP Runtime Security Verification
G Xiaolong, D Raj Gautam, H Jiaji, J Yier
Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2017
42017
IP trust: the problem and design/validation-based solution
RG Dutta, X Guo, Y Jin
Fundamentals of IP and SoC security, 49-65, 2017
42017
Runtime trust evaluation and hardware trojan detection using on-chip em sensors
J He, X Guo, H Ma, Y Liu, Y Zhao, Y Jin
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
22020
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations
J He, H Ma, X Guo, Y Zhao, Y Jin
25th Asia and South Pacific Design Automation Conference (ASP-DAC) 2020, 2020
22020
A tree pruning algorithm for mimo sphere decoding based on path metric
S Wang, X Guo, S Sun, T Tian, S Sun, X Jing
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
22012
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20