Sign in
Kan Xiao
Publication Activity (10 Years)
Years Active: 2012-2017
Publications (10 Years): 6
Top Topics
Hardware And Software
Random Number Generator
Selection Algorithm
Lessons Learned
Top Venues
HOST
ACM Great Lakes Symposium on VLSI
DAC
IEEE Des. Test
</>
Publications
</>
Qihang Shi
,
Kan Xiao
,
Domenic Forte
,
Mark M. Tehranipoor
Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication.
ACM Great Lakes Symposium on VLSI
(2017)
Kan Xiao
,
Domenic Forte
,
Yier Jin
,
Ramesh Karri
,
Swarup Bhunia
,
Mark M. Tehranipoor
Hardware Trojans: Lessons Learned after One Decade of Research.
ACM Trans. Design Autom. Electr. Syst.
22 (1) (2016)
Kan Xiao
,
Adib Nahiyan
,
Mark M. Tehranipoor
Security Rule Checking in IC Design.
Computer
49 (8) (2016)
Adib Nahiyan
,
Kan Xiao
,
Kun Yang
,
Yier Jin
,
Domenic Forte
,
Mark M. Tehranipoor
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs.
DAC
(2016)
Fatemeh Tehranipoor
,
Nima Karimian
,
Kan Xiao
,
John A. Chandy
DRAM based Intrinsic Physical Unclonable Functions for System Level Security.
ACM Great Lakes Symposium on VLSI
(2015)
Kan Xiao
,
Domenic Forte
,
Mark M. Tehranipoor
Efficient and secure split manufacturing via obfuscated built-in self-authentication.
HOST
(2015)
Alison Hosey
,
Md. Tauhidur Rahman
,
Kan Xiao
,
Domenic Forte
,
Mohammad Tehranipoor
Advanced Analysis of Cell Stability for Reliable SRAM PUFs.
ATS
(2014)
Md. Tauhidur Rahman
,
Kan Xiao
,
Domenic Forte
,
Xuhei Zhang
,
Jerry Shi
,
Mohammad Tehranipoor
TI-TRNG: Technology Independent True Random Number Generator.
DAC
(2014)
Kan Xiao
,
Domenic Forte
,
Mohammad Tehranipoor
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
33 (12) (2014)
Kan Xiao
,
Md. Tauhidur Rahman
,
Domenic Forte
,
Yu Huang
,
Mei Su
,
Mohammad Tehranipoor
Bit selection algorithm suitable for high-volume production of SRAM-PUF.
HOST
(2014)
Kan Xiao
,
Mohammad Tehranipoor
BISA: Built-in self-authentication for preventing hardware Trojan insertion.
HOST
(2013)
Xuehui Zhang
,
Kan Xiao
,
Mohammad Tehranipoor
,
Jeyavijayan Rajendran
,
Ramesh Karri
A study on the effectiveness of Trojan detection techniques using a red team blue team approach.
VTS
(2013)
Kan Xiao
,
Xuehui Zhang
,
Mohammad Tehranipoor
A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay.
IEEE Des. Test
30 (2) (2013)
Xuehui Zhang
,
Kan Xiao
,
Mohammad Tehranipoor
Path-delay fingerprinting for identification of recovered ICs.
DFT
(2012)
Nicholas Tuzzio
,
Kan Xiao
,
Xuehui Zhang
,
Mohammad Tehranipoor
A zero-overhead IC identification technique using clock sweeping and path delay analysis.
ACM Great Lakes Symposium on VLSI
(2012)