Love Kumar Sah
Title
Cited by
Cited by
Year
Empirical Word-Level Analysis of Arithmetic Module Architectures for Hardware Trojan Susceptibility
SA Islam, LK Sah, S Katkoori
Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 109 - 114, 2018
92018
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
LK Sah, SA Islam, S Katkoori
Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1- 6, 2018
32018
Variable Record Table: A Run-Time Solution for Mitigating Buffer Overflow Attacks
LK Sah, SA Islam, S Katkoori
Midwest Symposium on Circuits and Systems (MWSCAS), 239-242, 2019
12019
A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs
SA Islam, LK Sah, S Katkoori
Springer Journal of Hardware and Systems Security (HASS) 246–262, 2020
2020
High-Level Synthesis of Key Obfuscated RTL IP with Design Lockout and Camouflaging
SA Islam, LK Sah, S Katkoori
ACM Transactions on Design Automation of Electronic Systems (TODAES) (Accepted), 2020
2020
Basic Block Encoding Based Run-time CFI Checkfor Embedded Software
LK Sah, S Polnati, SA Islam, S Katkoori
International Conference on Very Large Scale Integration (VLSI-SoC) (Accepted), 2020
2020
Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs
SA Islam, LK Sah, S Katkoori
International Symposium on Quality Electronic Design (ISQED), 149-154, 2020
2020
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
SA Islam, LK Sah, S Katkoori
International Symposium on Smart Electronic Systems(IEEE-iSES), 17-20, 2019
2019
Architectural Support for Mitigating Buffer-Overflow Software Attacks
LK Sah, S Katkoori
USF Graduate Student Research Symposium, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–9