K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Ramesh Karri
also known as Karri, Karri R., Karri, Ramesh
State University of New York · Eckernforde Tanga University · Engineering Conferences International · New York University
About this author
Works
649
Cited by
16,862
h-index
62
i10
273
ORCID ↗
Top papers
A Primer on Hardware Security: Models, Methods, and Metrics
Masoud Rostami, Farinaz Koushanfar, Ramesh Karri
·
2014
·
Proceedings of the IEEE
↗ 642
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, et al.
·
2010
·
Computer
↗ 514
Security analysis of logic obfuscation
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, et al.
·
2012
↗ 485
Fault Analysis-Based Logic Encryption
Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, et al.
·
2013
·
IEEE Transactions on Computers
↗ 456
Hardware Trojans
Kun Xiao, Domenic Forte, Yier Jin, et al.
·
2016
·
ACM Transactions on Design Automation of Electronic Systems
↗ 450
OA
Security analysis of integrated circuit camouflaging
Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, et al.
·
2013
↗ 376
The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, et al.
·
2016
·
Proceedings of the IEEE
↗ 370
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
Hammond Pearce, Baleegh Ahmad, Benjamin Tan, et al.
·
2022
·
2022 IEEE Symposium on Security and Privacy (SP)
↗ 347
Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard
Bo Yang, Kaijie Wu, Ramesh Karri
·
2005
↗ 344
On Improving the Security of Logic Locking
Muhammad Yasin, Jeyavijayan Rajendran, Ozgur Sinanoglu, et al.
·
2015
·
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
↗ 337
On design vulnerability analysis and trust benchmarks development
Hassan Salmani, Mohammad Tehranipoor, Ramesh Karri
·
2013
↗ 287
Manufacturing and Security Challenges in 3D Printing
Steven E. Zeltmann, Nïkhil Gupta, Nektarios Georgios Tsoutsos, et al.
·
2016
·
JOM
↗ 244
Books
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
2017
·
Association for Computing Machinery
Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks
2015
·
Association for Computing Machinery
System Level Power Optimization for Wireless Multimedia Communication
2002
·
Springer
Secure and Trustworthy Cyberphysical Microfluidic Biochips
2019
·
Springer
Security of Biochip Cyberphysical Systems
2022
·
Springer International Publishing AG