Picture for Md Tauhidur Rahman

Md Tauhidur Rahman

Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study

Add code
May 10, 2024
Viaarxiv icon

Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software

Add code
Oct 04, 2023
Viaarxiv icon

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Add code
Jan 17, 2023
Viaarxiv icon

Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

Add code
Nov 18, 2021
Figure 1 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 2 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 3 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Figure 4 for Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Viaarxiv icon

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

Add code
Mar 12, 2019
Figure 1 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 2 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 3 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Figure 4 for Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Viaarxiv icon