
Mohammed Thari Nabeel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Johann Knechtel, Satwik Patnaik, Mohammed Nabeel, Mohammed Ashraf, Yogesh Singh Chauhan, Jörg Henkel, Ozgur Sinanoglu
, Hussam Amrouch:
Power Side-Channel Attacks in Negative Capacitance Transistor. IEEE Micro 40(6): 74-84 (2020) - [j3]Mohammed Nabeel, Mohammed Ashraf, Satwik Patnaik
, Vassos Soteriou
, Ozgur Sinanoglu, Johann Knechtel
:
2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets. IEEE Trans. Computers 69(11): 1611-1625 (2020) - [j2]Abhrajit Sengupta
, Mohammed Nabeel, Nimisha Limaye
, Mohammed Ashraf, Ozgur Sinanoglu
:
Truly Stripping Functionality for Logic Locking: A Fault-Based Perspective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4439-4452 (2020) - [c9]Homer Gamil, Pranav Mehta, Eduardo Chielle, Adriano Di Giovanni, Mohammed Nabeel, Francesco Arneodo, Michail Maniatakos
:
Muon-Ra: Quantum random number generation from cosmic rays. IOLTS 2020: 1-6 - [i6]Johann Knechtel, Satwik Patnaik, Mohammed Nabeel, Mohammed Ashraf, Yogesh Singh Chauhan, Jörg Henkel, Ozgur Sinanoglu, Hussam Amrouch:
Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET). CoRR abs/2007.03987 (2020) - [i5]Mohammed Nabeel, Mohammed Ashraf, Satwik Patnaik, Vassos Soteriou, Ozgur Sinanoglu, Johann Knechtel:
2.5D Root of Trust: Secure System-Level Integration of Untrusted Chiplets. CoRR abs/2009.02412 (2020)
2010 – 2019
- 2019
- [j1]Kanad Basu, Samah Mohamed Saeed, Christian Pilato, Mohammed Ashraf, Mohammed Thari Nabeel, Krishnendu Chakrabarty, Ramesh Karri
:
CAD-Base: An Attack Vector into the Electronics Supply Chain. ACM Trans. Design Autom. Electr. Syst. 24(4): 38:1-38:30 (2019) - [c8]Julian Leonhard, Muhammad Yasin
, Shadi Turk, Mohammed Thari Nabeel, Marie-Minerve Louërat, Roselyne Chotin-Avot, Hassan Aboushady, Ozgur Sinanoglu
, Haralampos-G. D. Stratigopoulos:
MixLock: Securing Mixed-Signal Circuits via Logic Locking. DATE 2019: 84-89 - [c7]Abhrajit Sengupta, Mohammed Nabeel, Johann Knechtel, Ozgur Sinanoglu
:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. DATE 2019: 414-419 - [c6]Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos
:
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution. HOST 2019: 131-140 - [c5]Nimisha Limaye, Abhrajit Sengupta, Mohammed Nabeel, Ozgur Sinanoglu
:
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access. ICCAD 2019: 1-8 - [c4]Deepraj Soni, Mohammed Nabeel, Kanad Basu, Ramesh Karri
:
Power, Area, Speed, and Security (PASS) Trade-Offs of NIST PQC Signature Candidates Using a C to ASIC Design Flow. ICCD 2019: 337-340 - [i4]Abhrajit Sengupta, Mohammed Thari Nabeel, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. CoRR abs/1903.02913 (2019) - [i3]Mohammed Nabeel, Mohammed Ashraf, Satwik Patnaik, Vassos Soteriou
, Ozgur Sinanoglu, Johann Knechtel:
An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets. CoRR abs/1906.02044 (2019) - [i2]Nimisha Limaye, Abhrajit Sengupta, Mohammed Nabeel, Ozgur Sinanoglu:
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access. CoRR abs/1906.07806 (2019) - [i1]Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri:
NIST Post-Quantum Cryptography- A Hardware Evaluation Study. IACR Cryptol. ePrint Arch. 2019: 47 (2019) - 2018
- [c3]Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Ozgur Sinanoglu
:
Customized locking of IP blocks on a multi-million-gate SoC. ICCAD 2018: 59 - [c2]Abhrajit Sengupta, Mohammed Thari Nabeel, Muhammad Yasin
, Ozgur Sinanoglu
:
ATPG-based cost-effective, secure logic locking. VTS 2018: 1-6 - 2017
- [c1]Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, Ozgur Sinanoglu:
Provably-Secure Logic Locking: From Theory To Practice. CCS 2017: 1601-1618
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-25 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint