{"id":217,"date":"2020-08-19T13:07:25","date_gmt":"2020-08-19T13:07:25","guid":{"rendered":"http:\/\/dforte.ece.ufl.edu\/?page_id=217"},"modified":"2026-04-08T08:08:45","modified_gmt":"2026-04-08T13:08:45","slug":"publications","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/dforte\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>NOTE: This directory contains pdf\/ps files of articles that may be covered by copyright. You may browse the articles at your convenience, in the same spirit as you may read a journal or a proceedings article in a public library. Retrieving, copying, or distributing these files may violate copyright protection laws.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Books<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>M. Tehranipoor, <b>D. Forte<\/b>, G. Rose, S. Bhunia, <i>Security Opportunities in Nano Devices and Emerging Technologies<\/i>, CRC Press, 2017. [<a href=\"https:\/\/www.taylorfrancis.com\/books\/e\/9781351965903\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, S. Bhunia, M. Tehranipoor, <i>Hardware Protection through Obfuscation<\/i>, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/book\/10.1007\/978-3-319-49019-9\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M. Tehranipoor, U. Guin, <b>D. Forte<\/b>, <i>Counterfeit Integrated Circuits: Detection and Avoidance<\/i>, Springer 2015. [<a href=\"http:\/\/www.springer.com\/engineering\/circuits+%26+systems\/book\/978-3-319-11823-9\"><b>link<\/b><\/a>]<span class=\"Apple-converted-space\">&nbsp;<\/span><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Book Chapters<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A. Covic, S. Chowdhury, RY Acharya, F. Ganji, <b>D. Forte<\/b>, &#8220;Post-Quantum Hardware Security: Physical Security in Classic vs. Quantum Worlds,&#8221; in Emerging Topics in Hardware Security by Mark M. Tehranipoor, Springer, 2020. [<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-64448-2_8\">link<\/a>]<\/li>\n\n\n\n<li>H. Lu, DE Capecci, P. Ghosh, <b>D. Forte<\/b>, DL Woodard, &#8220;Computer Vision for Hardware Security,&#8221; in <i>Emerging Topics in Hardware Security<\/i>, Mark M. Tehranipoor, Springer, 2021. [<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-64448-2_18\">link<\/a>]<\/li>\n\n\n\n<li>Q. Shi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Deterrent Approaches Against Hardware Trojan Insertion,&#8221; in <i>The Hardware Trojan War<\/i>:<i> Attacks, Myths, and Defenses<\/i>, Swarup Bhunia and Mark M. Tehranipoor, Springer, 2018. [<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-68511-3_13\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Rahman, A. Nath, <b>D. Forte<\/b>, S. Bhunia, and M Tehranipoor, &#8220;Nano CMOS Logic-Based Security Primitive Design&#8221;, in <i>Security Opportunities in Nano Devices and Emerging Technologies<\/i> by Mark M. Tehranipoor, <b>Domenic Forte<\/b>, Garrett Rose, and Swarup Bhunia, CRC Press, 2017. [<a href=\"https:\/\/www.taylorfrancis.com\/books\/e\/9781351965903\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>H.T. Shen, F. Rahman, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Carbon-Based Novel Devices for Hardware Security&#8221;, in <i>Security Opportunities in Nano Devices and Emerging Technologies<\/i> by Mark M. Tehranipoor, <b>Domenic Forte<\/b>, Garrett Rose, and Swarup Bhunia, CRC Press, 2017. [<a href=\"https:\/\/www.taylorfrancis.com\/books\/e\/9781351965903\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Rahman, A. Nath, S. Bhunia, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Composition of Physical Unclonable Functions: From Device to Architecture&#8221;, in <i>Security Opportunities in Nano Devices and Emerging Technologies<\/i> by Mark M. Tehranipoor, <b>Domenic Forte<\/b>, Garrett Rose, and Swarup Bhunia, CRC Press, 2017. [<a href=\"https:\/\/www.taylorfrancis.com\/books\/e\/9781351965903\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Shakya, X. Xu, N. Asadizanjani, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Leveraging Circuit Edit for Low-Volume Trusted Nanometer Fabrication&#8221;, in <i>Security Opportunities in Nano Devices and Emerging Technologies <\/i>by Mark M. Tehranipoor, <b>Domenic Forte<\/b>, Garrett Rose, and Swarup Bhunia, CRC Press, 2017. [<a href=\"https:\/\/www.taylorfrancis.com\/books\/e\/9781351965903\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Shakya, M. Tehranipoor, S. Bhunia, <b>D. Forte<\/b>, &#8220;Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation,&#8221; in <i>Hardware Protection through Obfuscation <\/i>by <b>Domenic Forte<\/b>, Swarup Bhunia, and Mark M. Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-49019-9_1\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Permutation-Based Obfuscation,&#8221; in <i>Hardware Protection through Obfuscation<\/i> by <b>Domenic Forte<\/b>, Swarup Bhunia, and Mark M. Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-49019-9_5\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M. T. Rahman, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Protection of Assets from Scan Chain Vulnerabilities through Obfuscation,&#8221; in <i>Hardware Protection through Obfuscation<\/i> by <b>Domenic Forte<\/b>, Swarup Bhunia, and Mark M. Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-49019-9_6\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Q. Shi, K. Xiao, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Obfuscated Built-in Self Authentication,&#8221; in <i>Hardware Protection through Obfuscation<\/i> by <b>Domenic Forte,<\/b> Swarup Bhunia, and Mark M. Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-49019-9_11\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Nahiyan, K. Xiao, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Security Rule Check,&#8221; in <i>Hardware IP Security and Trust<\/i> by Prabhat Mishra, Swarup Bhunia and Mark Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-49025-0_2\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Q. Shi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Analyzing Circuit Layout to Probing Attack,&#8221; in <i>Hardware IP Security and Trust <\/i>by Prabhat Mishra, Swarup Bhunia and Mark Tehranipoor, Springer, 2017. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-49025-0_5\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Xiao, <b>D. Forte,<\/b> M. Tehranipoor,&nbsp; &#8220;Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits,&#8221; in <i>Secure System Design and Trustable Computing<\/i>, by Chip Hong Chang and Miodrag Potkonjak, 2016. [<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-14971-4_6\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Journal<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>KA Vedros, H. Squires, C. Kolias, <strong>D. Forte<\/strong>, D. Barbara, &#8220;Reading Between the Signals: A Comprehensive Tutorial on Harnessing Physical Side-Channels for Anomaly Detection&#8221;, IEEE Access, 2026. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=11474831\" data-type=\"link\" data-id=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=11474831\">link<\/a>]<\/li>\n\n\n\n<li>KA Vedros, A. Vakanski, <strong>D. Forte<\/strong>, C. Kolias, &#8220;From Capture-Recapture to No Recapture: Efficient SCAD Even After Software Updates\u201d, MDPI Sensors, 2025. [<a href=\"https:\/\/www.mdpi.com\/1424-8220\/26\/1\/118\">link<\/a>]<\/li>\n\n\n\n<li>MM Rizvee, FS Shishir, T. Hossain. T. Hoque, <strong>D. Forte<\/strong>, S. Shomaji, \u201cA Persistent Hierarchical Bloom Filter-based Framework for Scalable Authentication and Tracking of ICs\u201d, ACM Journal on Emerging Technologies in Computing (JETC), 2025. [<a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748650\">link<\/a>]<\/li>\n\n\n\n<li>S. Roy, A. Cannon, L. Mata, R. Acharya, T. Farheen, S. Tajik, <strong>D. Forte<\/strong>, \u201cSense and React: Self-Destructive Polymorphic Mechanism Against Voltage Tampered Active Physical Attacks\u201d, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), 2025. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10587034-sense-react-self-destructive-polymorphic-mechanism-against-voltage-tampered-active-physical-attacks\">link<\/a>]<\/li>\n\n\n\n<li>O. Dizon-Paradis, D. Koblah, R. Wilson, <strong>D. Forte<\/strong>, D. Woodard, \u201cIC SEM Reverse Engineering Tutorial using Artificial Intelligence\u201d, IEEE Design &amp; Test, 2025. [<a href=\"https:\/\/www.techrxiv.org\/doi\/full\/10.36227\/techrxiv.172503813.33860756\">link<\/a>]<\/li>\n\n\n\n<li>M. Hashemi, <strong>D. Forte<\/strong>, F. Ganji, \u201cGuardianMPC: Backdoor-resilient Neural Network Computation\u201d, IEEE Access, 2025. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=10836681\">link<\/a>]<\/li>\n\n\n\n<li>J. Wu, O. Dizon-Paradis, S. Rahman, D. Woodard, <strong>D. Forte<\/strong>, \u201cProtecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo Random Number Generation\u201d, Cryptography, 2025. [<a href=\"https:\/\/www.mdpi.com\/2410-387X\/9\/1\/6\">link<\/a>]<\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">DM Mehta, M. Hashemi, DS Koblah,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, F. Ganji, &#8220;Bake It Till You Make It: Heat-induced <\/span><span dir=\"ltr\" role=\"presentation\">Power Leakage from Masked Neural Networks&#8221;, <\/span><span dir=\"ltr\" role=\"presentation\">IACR Transactions on Cryptographic Hard<\/span><span dir=\"ltr\" role=\"presentation\">ware and Embedded Systems (TCHES)<\/span><span dir=\"ltr\" role=\"presentation\">, Sept. 2024. [<a href=\"https:\/\/eprint.iacr.org\/2023\/076.pdf\">link<\/a>]<\/span><\/li>\n\n\n\n<li>DM Meta, M. Hashemi, <strong>D. Forte<\/strong>, S. Tajik, F. Ganji, &#8220;1\/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits&#8221;, IACR Transactions on Cryptographic Hardware and Embedded Systems, Sept. 2024. [<a href=\"https:\/\/eprint.iacr.org\/2024\/072.pdf\">link<\/a>]<\/li>\n\n\n\n<li>S. Roy, J. Chen, N. Maghari, <strong>D. Forte<\/strong>, &#8220;Recycled Counterfeit Chips Detection for AMS and Digital ICs Using Low-Area, Self-Contained, and Secure LDO Odometers&#8221;, Journal of Hardware and Systems Security (HaSS), 2024. [<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41635-024-00152-8\">link<\/a>]<\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">M. Hasan, T. Hoque, F. Ganji, D. Woodard,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, S. Shomaji, &#8220;A Resource-efficient Binary CNN <\/span><span dir=\"ltr\" role=\"presentation\">Implementation for Enabling Contactless IoT Authentication&#8221;,<\/span>&nbsp;<span dir=\"ltr\" role=\"presentation\">Journal of Hardware and <\/span><span dir=\"ltr\" role=\"presentation\">Systems Security (HaSS)<\/span><span dir=\"ltr\" role=\"presentation\">, July 2024. [<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41635-024-00153-7\">link<\/a>]<\/span><\/li>\n\n\n\n<li><strong>D. Forte<\/strong>, B. Amaba, C. Richards, J. Daniels, &#8220;Nowhere to Hide: Monitoring Side-channels for Supply Chain Resiliency&#8221;, IEEE Reliability Magazine, Vol. 1, No. 2, June 2024. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2026\/03\/COMPLIANT_IEEE_Reliability_Magazine__RASC.pdf\">pdf<\/a>]<\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">M. Gao, L. Biswas, N. Asadi,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, &#8220;Detour\u2013RS: Reroute Attack Vulnerability Assessment with Awareness of Layout and Resource&#8221;, Cryptography, Vol. 8, No. 2, 2024. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10554618-detour-rs-reroute-attack-vulnerability-assessment-awareness-layout-resource\">link<\/a>]<\/span><\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">P. Ghosh, G. Lee, M. Zhu , O. Dizon-Paradis, UJ Botero, D. Woodard,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, &#8220;MaGNIFIES: Manageable GAN Image Augmentation Framework for Inspection of Electronic Systems\u201d Journal of Hardware and Systems Security (HaSS), 2024. [<\/span><a href=\"https:\/\/par.nsf.gov\/biblio\/10492336-magnifies-manageable-gan-image-augmentation-framework-inspection-electronic-systems\">link<\/a>]<\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">J. Wu,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, &#8220;EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration\u201d, Journal of Hardware and Systems Security (HaSS), 2023. [<\/span><a href=\"https:\/\/par.nsf.gov\/biblio\/10482409-exertv2-exhaustive-integrity-analysis-information-flow-security-fsm-integration\">link<\/a>]<\/li>\n\n\n\n<li>R. Wilson, O. Dizon-Paradis, <strong>D. Forte<\/strong>, D. Woodard, \u201cSECURE: A Segmentation Quality Evaluation Metric on SEM images for Reverse Engineering on Integrated Circuits\u201d, IEEE Access, Vol. 11, 2023. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=10347213\">link<\/a>]<\/li>\n\n\n\n<li>M. Gao, MS Rahman, N. Varshney, M. Tehranipoor, <strong>D. Forte<\/strong>, &#8220;iPROBE: Internal Shielding Approach for Protecting Against Front-side and Back-side Probing Attack,&#8221; IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 42, No. 12, December 2023. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10472104-iprobe-internal-shielding-approach-protecting-against-front-side-back-side-probing-attacks\">link<\/a>]<\/li>\n\n\n\n<li>D. Koblah, UJ Botero, SP Costello, O. Paradis, F. Ganji, D. Woodard, <strong>D. Forte<\/strong>, &#8220;A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images&#8221;, ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 19, No. 4, October 2023. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3606948?cid=81467646023\">link<\/a>]<\/li>\n\n\n\n<li>M. Choudhury, M. Gao, A. Varna, E. Peer, <strong>D. Forte<\/strong>, &#8220;Enhanced PATRON: Fault Injection and Power-aware FSM Encoding Through Linear Programming&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 28, No. 6, October 2023. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3611669?cid=81467646023\">link<\/a>]<\/li>\n\n\n\n<li>R. Acharya, F. Ganji, <strong>D. Forte<\/strong>, &#8220;Information Theory-based Evolution of Neural Networks for Side-channel Analysis&#8221;, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), September 2023. [<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9957\/9460\">link<\/a>]<\/li>\n\n\n\n<li>D. Koblah, O. Dizon-Paradis, J. Schubeck, UJ Botero, D. Woordard, <strong>D. Forte<\/strong>, &#8220;A Comprehensive Taxonomy of Visual Printed Circuit Board Defects,&#8221; Journal of Hardware and Systems Security (HaSS), April 2023. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-023-00132-4.pdf?pdf=button%20sticky\">link<\/a>]<\/li>\n\n\n\n<li>T. Bryant, Y. Chen, D. Koblah, <strong>D. Forte<\/strong>, N. Maghari, &#8220;A Brief Tutorial on Mixed Signal Approaches to Combat Electronic Counterfeiting,&#8221; IEEE Open Journal of Circuits and Systems, Vol. 4, March 2023. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=10064465\">link<\/a>]<\/li>\n\n\n\n<li>T. Farheen, S. Roy, S. Tajik, <strong>D. Forte<\/strong>, \u201cA Twofold Clock and Voltage-based Detection Method for Laser Logic State Imaging Attack\u201d, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 31, No. 1, January 2023. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10402185-twofold-clock-voltage-based-detection-method-laser-logic-state-imaging-attack\">link<\/a>]<\/li>\n\n\n\n<li>D. Koblah, R. Acharya,&nbsp; D. Capecci, O. Dizon-Paradis, S. Tajik, F. Ganji, D. Woodard, <strong>D. Forte<\/strong>, &#8220;A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation\u201d, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 28, No. 2, March 2023. [<a href=\"https:\/\/arxiv.org\/pdf\/2204.09579.pdf\">preprint<\/a>] [<a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563391\">link<\/a>]<\/li>\n\n\n\n<li>S. Amir and <strong>D. Forte<\/strong>, &#8220;EigenCircuit: Divergent Synthetic Benchmark Generation for Hardware Security Using PCA and Linear Programming\u201d, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 41, No. 12, December 2022. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10320575-eigencircuit-divergent-synthetic-benchmark-generation-hardware-security-using-pca-linear-programming\">link<\/a>]<\/li>\n\n\n\n<li>Y. Bai, A. Stern, J. Park, M. Tehranipoor, <strong>D. Forte,<\/strong> &#8220;RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems &#8220;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 27, No. 1, Nov. 2022. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3524123?cid=81467646023\">link<\/a>]<\/li>\n\n\n\n<li>Y. Bai, J. Park, M. Tehranipoor, <strong>D. Forte<\/strong>, &#8220;Real-time Instruction-level Verification of Remote IoT\/CPS Devices Via Side Channels&#8221;, Discover Internet of Things Journal, Vol. 2, No. 1, March 2022. [<a href=\"https:\/\/www.proquest.com\/openview\/813d3e20fa9547f071016db1c40a164d\/1?pq-origsite=gscholar&amp;cbl=5642933\">link<\/a>]<\/li>\n\n\n\n<li>S. Shomaji, P. Ghosh, F. Ganji, DL Woodard, <strong>D. Forte<\/strong>, &#8220;An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-based Biometric Systems&#8221;, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 16, Nov. 2021.<\/li>\n\n\n\n<li>B. Park, <strong>D. Forte<\/strong>, M. Tehranipoor, N. Maghari, &#8220;A Metal-Via Resistance based Physically Unclonable Function with Backend Incremental ADC&#8221;, IEEE Transactions on Circuits and Systems I, Vol 68, No. 11, Nov. 2021. [<a href=\"https:\/\/par.nsf.gov\/servlets\/purl\/10300423\">link<\/a>]<\/li>\n\n\n\n<li>S. Shomaji, Z. Guo, F. Ganji, N. Karimian, DL Woodard, <strong>D. Forte,<\/strong> &#8220;&#8221;BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person&#8221;, Journal of Hardware and Systems Security (HaSS), Vol. 5, No. 3, Oct. 2021. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-021-00121-5.pdf\">link<\/a>]<\/li>\n\n\n\n<li>S. Shomaji, NVR Masna, DJ Ariando, SD Paul, K. Horace-Herron,<strong>D. Forte<\/strong>, S. Mandal, S. Bhunia, &#8220;Detecting Dye-Contaminated Vegetables using Low-Field NMR Relaxometry&#8221;, Foods, Vol. 10, No. 9, Sept. 2021. [<a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC8469677\/\" data-type=\"link\" data-id=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC8469677\/\">link<\/a>]<\/li>\n\n\n\n<li>R. Wilson, H. Lu, M. Zhu, <strong>D. Forte<\/strong>, DL Woodard, &#8220;REFICS: Assimilating Data-Driven Paradigms into Reverse Engineering and Hardware Assurance on Integrated Circuits&#8221;, IEEE Access, Vol. 9, Sept. 2021. [<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9543688\">link<\/a>]<\/li>\n\n\n\n<li>UJ Botero, R. Wilson, H. Lu, MT Rahman, MA Mallaiyan, F. Ganji, N. Asadizanjanizanjani, MM Tehranipoor, DL Woodard, <strong>D. Forte<\/strong>, &#8220;Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives&#8221;, ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 17, No. 4, June 2021. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2021\/04\/JETC_RE_Tutorial.pdf\">preprint<\/a>] [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3464959?cid=81467646023\">link<\/a>]<\/li>\n\n\n\n<li>MS Rahman, A. Nahiyan, F. Rahman, S. Fazzari, K. Plaks, F. Farahmandi, <strong>D. Forte<\/strong>, M. Tehranipoor, &#8220;&#8221;Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-guided Attacks&#8221;&#8216;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 26, No. 4, March 2021. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3444960?cid=81467646023\">link<\/a>]<\/li>\n\n\n\n<li>S. Chowdhury, A. Covic, R. Acharya, S. Dupee, F. Ganji, <strong>D. Forte<\/strong>, &#8220;Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions&#8221;, Journal of Cryptographic Engineering (JCEN), 2021. [<a href=\"https:\/\/rdcu.be\/ceANE\">link<\/a>]<\/li>\n\n\n\n<li>H. Wang, Q. Shi, A. Nahiyan, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;A Physical Design Flow against Front-side Probing Attacks by Internal Shielding&#8221;, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 39, No. 10, October 2020. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8894028\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>S. Chowdury, F. Ganji, <strong>D. Forte,<\/strong> &#8220;Recycled SoC Detection using LDO Degradation&#8221;, SN Computer Science, September 2020. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00329-2.pdf\">link<\/a>]<\/li>\n\n\n\n<li>N. Karimian, D. Woodard, <b>D. Forte<\/b>, &#8220;ECG Biometric: Spoofing and Countermeasures&#8221;, IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), Vol. 2, No. 3, July 2020. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=9086770\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M. Alam, A. Nahiyan, M. Sadi, <b>D. Forte,<\/b> M. Tehranipoor, &#8220;Soft-HaT: Software-based Silicon Reprogramming for Hardware Trojan Implementation,&#8221; ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 25, No. 4, June 2020. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3396521?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Rock&#8217;n&#8217;roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version),&#8221; Journal of Cryptographic Engineering (JCEN), May 2020. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-020-00226-7.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Nahiyan, J. Park, H. Miao, Y. Iskander, F. Farahmandi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment using Information Flow Tracking and Pattern Generation&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 25, No. 3, May 2020. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3383445?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>MT Rahman, MS Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, <b>D. Forte<\/b>, N. Asadizanjani, M. Tehranipoor, &#8220;Defense-in-Depth: A Recipe for Logic Locking to Prevail&#8221;, Integration, the VLSI Journal, Vol. 72, May 2020. [<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167926019303694\/pdfft?md5=b02fa6ee788d8384eb05fb6fa92878e2&amp;pid=1-s2.0-S0167926019303694-main.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Stern, U.J. Botero, F. Rahman,&nbsp; <b>D. Forte<\/b>, M. Tehranipoor, &#8220;EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection using Machine Learning Classification&#8221;, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 28, No. 2, February 2020. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8896870\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, S. Chowdury, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation&#8221;, ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 16, No. 2, January 2020. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3371407?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Shakya, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme&#8221;, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), No. 1, 2020. [<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8397\/7781\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>J. Park, F. Rahman, A. Vassilev, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Leveraging Side-channel Information for Disassembly and Security&#8221;, ACM Journal on Emerging Technologies in Computing (JETC), Vol. 16, No. 1, December 2019. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3359621?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>T. Hoque, K. Yang, R. Karam, S. Tajik, <b>D. Forte<\/b>, M. Tehranipoor, S. Bhunia, &#8220;Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 25, No. 1, December 2019. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3361147?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M. Alam, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling&#8221;, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 27, No.12, December 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8811732\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Ganji, <b>D. Forte<\/b>, JP Seifert, &#8220;PUFmeter: A Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks&#8221;, IEEE Access, Vol. 7, No. 1, December 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8819883&amp;tag=1\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>BM Talukder, B. Ray,<b> D. Forte<\/b>, MT Rahman, &#8220;PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures&#8221;, IEEE Access, Vol. 7, No. 1, December 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8736949\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>N. Karimain, M. Tehranipoor, D. Woodard, <b>D. Forte<\/b>, &#8220;Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT&#8221;, IEEE Access, Vol. 7, No. 1, December 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8689355\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>S. Shomaji, P. Dehghanzadeh, A. Roman, <b>D. Forte<\/b>, S. Bhunia, S. Mandal, &#8220;Early Detection of Cardiovascular Diseases Using Wearable Ultrasound Device&#8221;, IEEE Consumer Electronics Magazine, Vol. 8, No. 6, November 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8889541\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Q. Shi, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Obfuscated Built-In Self-Authentication with Secure and Efficient Wire-Lifting&#8221;, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 38, No. 11, November 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8500255\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>P. Ghosh, A. Bhattacharyay, <b>D. Forte<\/b>, RS Chakraborty, &#8220;Automated Defective Pin Detection for Recycled Microelectronics Identification&#8221; Journal of Hardware and Systems Security (HaSS), Vol. 3, No. 3, September 2019. [<a href=\"https:\/\/rdcu.be\/bA0ZF\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Shakya, H. Shen, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging&#8221;, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), August 2019 [<a href=\"https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8290\/7640\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>X. Xu, F. Rahman, B. Shakya, A. Vassilev,<b> D. Forte<\/b>, M. Tehranipoor, &#8220;Electronics Supply Chain Integrity Enabled by Blockchain&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 24, No. 3, June 2019. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3315571?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>H. Wang, Q. Shi. <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Probing Assessment Framework and Evaluation of Anti-probing Solutions&#8221;, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 27, No. 6, June 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8689363\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Nahiyan, F. Farahmandi, P. Mishra, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Security-aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks&#8221;, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 38, No. 6, June 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8356029\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Ganji, <b>D. Forte<\/b>, N. Asadizanjani, M. Tehranipoor, D. Woodard, &#8220;The Power of IC Reverse Engineering for Hardware Trust and Assurance&#8221;, Electronic Device Failure Analysis (EDFA), May 2019. [<a href=\"https:\/\/static.asminternational.org\/EDFA\/201905\/30\/\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F. Ganji, N. Karimian, D. Woodard, <b>D. Forte<\/b>, &#8220;Leave Adversaries in the Dark- BLOcKeR: Secure and Reliable Biometric Access Control&#8221;, The Journal of the Homeland Defense and Security Information Analysis Center (HDIAC), Vol. 6, No. 1, Spring 2019. [<a href=\"https:\/\/hdiac.org\/articles\/leave-adversaries-in-the-dark-blocker-secure-and-reliable-biometric-access-control\/\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>U.J. Botero, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Upgrade\/Downgrade: Efficient and Secure Legacy Electronic System Replacement&#8221;, IEEE Design &amp; Test, Vol. 36, No. 1, February 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8478328\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Yang, U.J. Botero, H. Shen, D. Woodard, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag For Protecting Supply Chain&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 23, No. 6, December 2018. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3264658?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>X. Xu, S. Keshavarz, <b>D. Forte<\/b>, M. Tehranipoor, D.E. Holcomb, &#8220;Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs&#8221;, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 26, No. 11, November 2018. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8438897\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>S. Amir, B. Shakya, X. Xu, Y. Jin, S. Bhunia, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Development and Evaluation of Hardware Obfuscation Benchmarks&#8221;, Journal of Hardware and Systems Security (HaSS), Vol. 2, No. 2, June 2018. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007%2Fs41635-018-0036-3.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;SCARe: An SRAM-based Countermeasure Against IC Recycling Framework\u201d, IEEE Transactions on Very Large Scale Integration Systems (TVLSI), Vol. 26, No. 3, April 2018. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8237209\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M.M. Alam, S. Chowdhury, B. Park, D. Munzer, N. Maghari, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security&#8221;, Journal of Hardware and Systems Security (HaSS), Vol. 2, No. 1, March 2018. [<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41635-017-0024-z\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Yang, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 23, No. 3, February 2018. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3174850?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Yang, H. Shen,<b> D. Forte<\/b>, S. Bhunia, M. Tehranipoor, &#8220;Hardware-Enabled Pharmaceutical Supply Chain Security&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 23, No. 3, January 2018. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3144532?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>F.<b> <\/b>Rahman, B. Shakya, X. Xu, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Security Beyond CMOS: Fundamentals, Applications, and Roadmap&#8221;, IEEE Transactions on Very Large Scale Integration Systems, Vol. 25, No. 12, December 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8052548\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>H. Shen, F. Rahman, B. Shakya, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Poly-Si Based Physical Unclonable Functions&#8221;, IEEE Transactions on Very Large Scale Integration Systems, Vol. 25, No. 11, November 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8012462\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>E.L. Principe, N. Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, R. Chivas, M. DiBattista, S. Silverman, &#8220;Plasma FIB Deprocessing of Integrated Circuits from the Backside&#8221;, Electronic Device Failure Analysis (EDFA), Vol. 19, No. 4, November 2017. [<a href=\"http:\/\/mio.asminternational.org\/EDFA\/201711\/36\/\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>H. Wang, Q. Shi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Probing Attacks on Integrated Circuits: Challenges and Research Opportunities&#8221;, IEEE Design &amp; Test, Vol. 34, No. 5, October 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7984893\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M.T. Rahman, A. Hosey, Z. Guo, J. Carroll, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Systematic Correlation and Cell Neighborhood Analysis of SRAM-PUF for Robust and Unique Key Generation,&#8221; Journal of Hardware and Systems Security (HaSS), Vol. 1, No. 2, June 2017. [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007%2Fs41635-017-0012-3.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>N. Karimian, Z. Guo, M. Tehranipoor, <b>D. Forte, <\/b>&#8220;Highly Reliable Key Generation from Electrocardiogram (ECG)&#8221; IEEE Transactions on Biomedical Engineering, Vol. 64, No. 6, June 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7563392\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>U. Guin, S. Bhunia, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware,&#8221; IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 14, No. 3, May-June 1 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7585119\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, J. Di, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Obfuscation-based Protection Framework Against Printed Circuit Boards Unauthorized Operation and Reverse Engineering&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 22, No. 3, April 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3035482?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Yang, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability and Authentication in IoT Supply Chain,&#8221; ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 22, No. 3, April 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3005346?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Shakya, T. He, H. Salmani, <b>D. Forte<\/b>, S. Bhunia, M. Tehranipoor, &#8220;Benchmarking of Hardware Trojans and Maliciously Affected Circuits&#8221;, Journal of Hardware and Systems Security (HaSS), Vol. 1, No. 1, April 2017. [<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41635-017-0001-6\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M. Alam, H. Shen, N. Asadizanjani, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Impact of X-ray Tomography on the Reliability of Integrated Circuits&#8221;, IEEE Transactions on Device and Materials Reliability (TDMR), Vol. 17, No. 1, March 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7829367\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>N. Asadizanjani, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;PCB Reverse Engineering Using Non-destructive X-ray Tomography and Advanced Image Processing&#8221;, IEEE Transactions on Components, Packaging and Manufacturing (CPMT), Vol. 7, No. 2, February 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7820117\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>N. Asadizanjani, M. Tehranipoor,&nbsp; D. Forte, &#8220;Counterfeit electronics detection using image processing and machine learning&#8221;, Journal of physics: conference series, Vol. 787, No. 1, February 2017. [<a href=\"https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/787\/1\/012023\/pdf\">link<\/a>]<\/li>\n\n\n\n<li>K. Xiao, <b>D. Forte<\/b>, Y. Jin, R. Karri, S. Bhunia, M. Tehranipoor, &#8220;Hardware Trojans: Lessons Learned After One Decade of Research&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 22, No. 1, June 2016. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2906147?cid=81467646023\"><b>link<\/b><\/a>] <em><b>[2018 ACM TODAES Best Paper, ACM Computing Reviews Notable Computing Books and Articles 2016, <\/b><a href=\"http:\/\/www.computingreviews.com\/recommend\/bestof\/notableitems.cfm?bestYear=2016\"><b>Hardware Category<\/b><\/a><b>]<\/b><\/em><\/li>\n\n\n\n<li>U Guin, Q. Shi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs,&#8221; ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 21, No. 4, June 2016 [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2893183?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>U. Guin, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Design of Accurate Low-Cost On-Chip Structures for protecting Integrated Circuits against Recycling,&#8221; IEEE Transactions on VLSI Systems (TVLSI), Vol. 24, No. 4, April 2016. [<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7217843&amp;sortType%3Dasc_p_Sequence%26filter%3DAND%28p_Publication_Number%3A92%29%26rowsPerPage%3D75\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>S. E. Quadir, J. Chen, <b>D. Forte<\/b>, N. Asadizanjani, S. Shahbazmohamadi, L. Wang, J. Chandy, M. Tehranipoor, &#8220;A Survey on Chip to System Reverse Engineering,&#8221; ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 13, No.1, April 2016. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2755563?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>C. Bao, <b>D. Forte<\/b>, A. Srivastava, \u201cOn Reverse Engineering-Based Hardware Trojan Detection,\u201d&nbsp; IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 34, No. 10, January 2016 [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7293657\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>C. Bao,<b> D. Forte<\/b>, A. Srivastava, &#8220;Temperature Tracking: Towards Robust Run-time Detection of Hardware Trojans,&#8221;&nbsp; IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 34, No. 10, October 2015 [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7090988\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M.T. Rahman, F. Rahman,<b> D. Forte<\/b>, M. Tehranipoor, &#8220;An Aging-Resistant RO-PUF for Reliable Key Generation,&#8221; IEEE Transactions on Emerging Topics in Computing (TETC), September 2015. [<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=7236903&amp;tag=1\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Mazady, M.T. Rahman, <b>D. Forte<\/b>, M. Anwar, &#8220;Memristor Nano-PUF A Security Primitive: Theory and Experiment,&#8221; IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), &nbsp;&nbsp; Vol. 5, No. 2, June 2015. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7117475\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Xiao, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;A Novel Built-In Self Authentication Technique to Prevent Inserting Hardware Trojans&#8221;, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 33, No. 12, December 2014. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6951855\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Improving the Quality of Delay-based PUFs via Optical Proximity Correction&#8221;, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Vol. 32, No. 12, December 2013 . [<a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6663224\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Thermal-Aware Sensor Scheduling for Distributed Estimation&#8221;, ACM Transactions on Sensor Networks (TOSN), Vol. 9, No. 4, November 2013. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2489253.2489270?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Energy and Thermal-Aware Video Coding via Encoder\/Decoder Workload Balancing&#8221;, ACM Transactions on Embedded Computing Systems (TECS), Vol. 12, No. 2, May 2013. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2465787.2465798?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Resource-Aware Architectures for Adaptive Particle Filter Based Visual Target Tracking&#8221;, ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 18, No. 2, April 2013. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2442087.2442093?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Conference &amp; Workshop<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>G. Lee, W. Bowman, O. Dizon-Paradis, R. Dizon-Paradis, R. Wilson, D. Woodard, <strong>D. Forte<\/strong>, \u201cA Data-Free Membership Inference Attack on Federated Learning in Hardware Assurance\u201d, International Symposium on Quality Electronic Design (ISQED), April 2026. []<\/li>\n\n\n\n<li>S. Wormald, G.Kravatsky, D. Woodard, <strong>D. Forte<\/strong>, \u201cResource Utilization of Differentiable Logic Gate Networks Deployed on FPGAs\u201d, GOMACTech, March 2026. []<\/li>\n\n\n\n<li>M. Hussain, D. Koblah, R. Dizon-Paradis, <strong>D. Forte<\/strong>, \u201cCausal AI For AMS Circuit Design: Interpretable Parameter Effects Analysis\u201d, GOMACTech, March 2026. [<a href=\"https:\/\/arxiv.org\/abs\/2603.24618\">link<\/a>]<\/li>\n\n\n\n<li>J. Fan, D. Koblah, <strong>D. Forte<\/strong>, \u201cDisguising Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP Camouflaging\u201d, GOMACTech, March 2026. [<a href=\"https:\/\/arxiv.org\/abs\/2603.25904\">link<\/a>]<\/li>\n\n\n\n<li>G. Lee, W. Bowman, O. Dizon-Paradis, R. Dizon-Paradis, R. Wilson, D. Woodard, <strong>D. Forte<\/strong>, \u201cDECIFR: Domain-aware Exfiltration of Circuit Information from Federated Gradient Reconstruction\u201d, GOMACTech, March 2026. []<\/li>\n\n\n\n<li>G. Lee, W. Bowman, R. Dizon-Paradis, O. Dizon-Paradis, R. Wilson, D. Woodard, <strong>D. Forte<\/strong>, \u201cPotentials and Pitfalls of Applying Federated Learning in Hardware Assurance\u201d, International Symposium for Testing and Failure Analysis (ISTFA), Nov. 2025. []<\/li>\n\n\n\n<li>J. Fan, D. Koblah, <strong>D. Forte<\/strong>, &#8220;Designing with Deception: ML- and Covert Gate-Enhanced Camouflaging to Thwart IC Reverse Engineering&#8221;, International Conference on Computer-Aided Design (ICCAD), Oct. 2025. [<a href=\"https:\/\/arxiv.org\/abs\/2508.08462\">link<\/a>]<\/li>\n\n\n\n<li>M Rizvee, P. Ghosh, <strong>D. Forte<\/strong>, S. Shomaji, \u201cDynamic Hierarchical Bloom Filters for Scalable Biometric Authentication Systems\u201d, International Joint Conference on Biometrics (IJCB), Sept. 2025. []<\/li>\n\n\n\n<li>S. Roy, <strong>D. Forte<\/strong>, \u201cMUX-based Polymorphic Registers and FSMs to Protect Against Non-invasive Voltage Fault Injection Attacks\u201d, International Test Conference (ITC), Sept. 2025. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10638027-mux-based-polymorphic-registers-fsms-protect-roots-trust-from-voltage-fault-injection\">link<\/a>]<\/li>\n\n\n\n<li>J. Wu, <strong>D. Forte<\/strong>, \u201cQuEST: Quantitative Entropy-based Security and Trojan Detection Framework for Confidentiality Verification\u201d, International Test Conference (ITC), Sept. 2025. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10637125-quest-quantitative-entropy-based-security-trojan-detection-framework-confidentiality-verification\">link<\/a>]<\/li>\n\n\n\n<li>M. Thomas, <strong>D. Forte<\/strong>, N. Maghari, \u201cAsynchronous Threshold Voltage Defined Logic Family Resistant to LLSI Attacks\u201d, International Symposium on Circuits and Systems (ISCAS), May 2025. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2025\/02\/Asynchronous-Threshold-Voltage-Defined-Logic-Family-Resistant-to-LLSI-Attacks.pdf\">pdf<\/a>]<\/li>\n\n\n\n<li>C. Sobolewski, D. Koblah and <strong>D. Forte<\/strong>, \u201cA Framework for PCB Design File Reconstruction from X-ray CT Annotations\u201d, International Symposium on Quality Electronic Design (ISQED), April 2025. [<a href=\"https:\/\/www.isqed.org\/English\/Proceedings\/pdf\/4B-2-051.pdf\">pdf<\/a>]<\/li>\n\n\n\n<li>M. Zhu, R. Wilson, RN Dizon-Paradis, OP. Dizon-Paradis, <strong>D. Forte<\/strong>, DL Woodard ,\u201cGenetic Algorithm-Assisted Golden-Free Standard Cell Library Extraction from SEM Images\u201d, International Symposium on Quality Electronic Design (ISQED), April 2025. [<a href=\"https:\/\/www.researchgate.net\/publication\/392249389_Genetic_Algorithm-Assisted_Golden-Free_Standard_Cell_Library_Extraction_from_SEM_Images#fullTextFileContent\">link<\/a>]<\/li>\n\n\n\n<li>H. Wang, R. Dai, T. Yavuz, X. Guo, O.Arias, D. Sullivan, S. Dai, H. Yu, M. Lee, <strong>D. Forte<\/strong>, S. Wang ,\u201cCross-Layer EM Fault Injection Assessment Framework\u201d, International Symposium on Quality Electronic Design (ISQED), April 2025. [<a href=\"https:\/\/www.honggangyu.com\/pubs\/ISQED25.pdf\">link<\/a>]<\/li>\n\n\n\n<li>S. Wormald, D. Koblah, MK Maldaner, <strong>D. Forte<\/strong>, D. Woodard, \u201ceXpLogic: Explaining Logic Types and Patterns in DiffLogic Networks\u201d, International Conference on Information Technology- New Generations (ITNG), April 2025. [<a href=\"https:\/\/arxiv.org\/pdf\/2503.09910\">eprint<\/a>] <em><strong>[Best Student Paper Award]<\/strong><\/em><\/li>\n\n\n\n<li>SK Monfared, K. Mitard, <strong>D. Forte<\/strong>, S. Tajik, \u201cMoving Target Defense to Mitigate Unattained Post-Silicon Side-Channel Leakage\u201d, GOMACTech, March 2025. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10570919-hardware-moving-target-defenses-against-post-silicon-side-channel-leakages\">link<\/a>]<\/li>\n\n\n\n<li>SK Monfared, <strong>D. Forte<\/strong>, S. Tajik, \u201cRandOhm: Mitigating Impedance Side-channel Attacks using&nbsp; Randomized Circuit Configurations\u201d, International Conference on Computer-Aided Design (ICCAD), November 2024. [<a href=\"https:\/\/arxiv.org\/pdf\/2401.08925\">link<\/a>]<\/li>\n\n\n\n<li>SK Monfared, K. Mitard, A. Cannon, <strong>D. Forte<\/strong>, S. Tajik, \u201cLaserEscape: Detecting and Mitigating Optical Probing Attacks\u201d,&nbsp; International Conference on Computer-Aided Design (ICCAD), November 2024. [<a href=\"https:\/\/arxiv.org\/pdf\/2405.03632\">link<\/a>]<\/li>\n\n\n\n<li>P. Ghosh, S. Shomaji, M. Zhu, D. Woodard, <strong>D. Forte<\/strong>, &#8220;Kin-Wolf: Kinship-established Wolfs in Indirect Synthetic Attack&#8221; IEEE International Joint Conference on Biometrics (IJCB), September 2024.<\/li>\n\n\n\n<li>T. Farheen, S. Roy, A. Cannon, J. Di, S. Tajik, <strong>D. Forte<\/strong>, &#8220;Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack&#8221;, GLSVLSI, June 2024. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10503896-amnesiac-memory-self-destructive-polymorphic-mechanism-against-cold-boot-data-remanence-attack\">link<\/a>]<\/li>\n\n\n\n<li>T. Farheen, S. Roy, J. Di, S. Tajik, <strong>D. Forte<\/strong>, \u201cCalibratable Polymorphic Temperature Sensor for Detecting Side channel and Fault Injection Attacks&#8221;, IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2024. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10503893-calibratable-polymorphic-temperature-sensor-detecting-fault-injection-side-channel-attacks\">link<\/a>]<\/li>\n\n\n\n<li><span dir=\"ltr\" role=\"presentation\">J. Wu, O. Dizon-Paradis, S. Rahman, D. Woodard,<\/span> <strong><span dir=\"ltr\" role=\"presentation\">D. Forte<\/span><\/strong><span dir=\"ltr\" role=\"presentation\">, \u201cDOSCrack: Deobfuscation using Oracle-guided Symbolic Execution and Clustering of Binary Security Keys\u201d,IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2024.<\/span><\/li>\n\n\n\n<li>H. Wang, M. Panoff, Z. Zhan, S. Wang, C. Bobda, <strong>D. Forte<\/strong>, \u201cProgrammable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization\u201d, Design, Automation and Test in Europe Conference (DATE), March 2024. <span dir=\"ltr\" role=\"presentation\">[<a href=\"https:\/\/arxiv.org\/pdf\/2401.12193.pdf\">eprint<\/a>]<\/span><\/li>\n\n\n\n<li>M. Hashemi, <strong>D. Forte<\/strong>, F. Ganji, &#8220;Time Is Money, Friend! Timing Side-channel Attack against Garbled Circuit Constructions&#8221;, Applied Cryptography and Network Security (ACNS), March 2024. [<a href=\"https:\/\/eprint.iacr.org\/2023\/001.pdf\">eprint<\/a>]<\/li>\n\n\n\n<li>D. Koblah, D. Mehta, M. Hashemi, F. Ganji, <strong>D. Forte<\/strong>, &#8220;EDA Workflow for Optimization of Robust Model Probing-Compliant Masked Hardware Gadgets&#8221;, GOMACTech, March 2024.<\/li>\n\n\n\n<li>D. Koblah, R. Acharya, <strong>D. Forte<\/strong>, &#8220;Genetic Algorithm for Functionally-Equivalent and Structurally-Divergent Benchmark Generation&#8221;, GOMACTech, March 2024.<\/li>\n\n\n\n<li>A. Cannon, T. Farheen, S. Roy, S. Tajik, <strong>D. Forte<\/strong>, &#8220;Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch&#8221;, International Conference on Computer-Aided Design (ICCAD), November 2023. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10441234\">link<\/a>]&nbsp;<\/li>\n\n\n\n<li>MM Rizvee, T. Hossain. T. Hoque, <strong>D. Forte<\/strong>, S. Shomaji, &#8220;A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs&#8221;, IEEE International Workshop On Silicon Lifecycle Management, October 2023. [<a href=\"https:\/\/www.researchgate.net\/publication\/383648289_A_Persistent_Hierarchical_Bloom_Filter-based_Framework_for_Authentication_and_Tracking_of_ICs#fullTextFileContent\">link<\/a>]<\/li>\n\n\n\n<li>R. Holzhausen, T. Farheen, M. Thomas, N. Maghari, <strong>D. Forte<\/strong>, &#8220;Laser Fault Injection Vulnerability Assessment and Mitigation with Case Study on PG-TVD Logic Cells&#8221;, International Test Conference (ITC), October 2023. [<a href=\"https:\/\/www.researchgate.net\/publication\/375096306_Laser_Fault_Injection_Vulnerability_Assessment_and_Mitigation_with_Case_Study_on_PG-TVD_Logic_Cells\">link<\/a>]<\/li>\n\n\n\n<li>P. Ghosh, S. Shomaji, D. Woodard, <strong>D. Forte<\/strong>, &#8220;KinfaceNet: A New Deep Transfer Learning based Kinship Feature Extraction Framework&#8221;,&nbsp; IEEE International Joint Conference on Biometrics (IJCB 2023), September 2023. <\/li>\n\n\n\n<li>H. Wang, M. Panoff, S. Wang, <strong>D. Forte<\/strong>, &#8220;HT-EMIS: A Deep Learning Tool for Hardware Trojan Detection and Identification through Runtime EM Side-Channels&#8221;, Great Lakes Symposium on VLSI (GLSVLSI), June 2023. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2023\/04\/GLSVLSI_2023.pdf\">link<\/a>]<\/li>\n\n\n\n<li>M. Gao, D. <strong>Forte<\/strong>, &#8220;Detour: Layout-aware Reroute Attack Vulnerability Assessment and Analysis&#8221;, Hardware-Oriented Security and Trust (HOST), May 2023.<\/li>\n\n\n\n<li>Y. Bai, J. Park, M. Tehrnaipoor, <strong>D. Forte<\/strong>, &#8220;Dual Channel EM\/Power Attack Using Mutual Information and its Real-time Implementation&#8221; Hardware-Oriented Security and Trust (HOST), May 2023.<\/li>\n\n\n\n<li>S. Roy, S. Tajik, <strong>D. Forte<\/strong>, &#8220;Polymorphic Sensor to Detect Laser Logic State Imaging Attack&#8221; International Symposium on Quality Electronic Design (ISQED), April 2023. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10408680-polymorphic-sensor-detect-laser-logic-state-imaging-attack\">link<\/a>]<\/li>\n\n\n\n<li>T. Farheen, S. Tajik, <strong>D. Forte<\/strong>, &#8220;SPRED: Spatially Distributed Laser Fault Injection Resilient Design&#8221; International Symposium on Quality Electronic Design (ISQED), April 2023. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2023\/02\/79_Paper.pdf\">pdf<\/a>]<\/li>\n\n\n\n<li>S. Roy, J. Chen, <strong>D. Forte<\/strong>, &#8220;Self-contained LDO Odometer to Detect Recycled Counterfeit AMS Chips&#8221;, in GOMACTech, March 2023.<\/li>\n\n\n\n<li>J. Wu, F. Fowze, <strong>D. Forte<\/strong>, &#8220;EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2022<\/li>\n\n\n\n<li>F. Fowze, M. Choudhury, <strong>D. Forte<\/strong>, &#8220;EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2022.<\/li>\n\n\n\n<li>M. Gao, <strong>D. Forte,<\/strong> &#8220;iPROBE-O: FIB-aware Place and Route for Probing Protection Using Orthogonal Shields&#8221; IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2022.<\/li>\n\n\n\n<li>M. Hashemi, S. Roy, <strong>D. Forte<\/strong>, F. Ganji, &#8220;HWGN<sup>2<\/sup>: Side-channel Protected NNs through Secure and Private Function Evaluation&#8221; International Conference on Security, Privacy and Applied Cryptographic Engineering&nbsp; (SPACE), December 2022. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10583387-hwgn-side-channel-protected-nns-through-secure-nbsp-private-function-evaluation\">link<\/a>]<\/li>\n\n\n\n<li>D. Koblah, F. Ganji, <strong>D. Forte<\/strong>, S. Tajik, &#8220;Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities&#8221;, ACM Workshop on Moving Target Defense (MTD), November 2022. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564010?cid=81467646023 \">link<\/a>]<\/li>\n\n\n\n<li>M. Hashemi, S. Roy, F, Ganji, <strong>D. Forte<\/strong>, &#8220;Garbled EDA: Privacy-Preserving Electronic Design Automation&#8221;, International Conference on Computer-Aided Design (ICCAD), November 2022. [<a href=\"https:\/\/arxiv.org\/pdf\/2208.03822.pdf\">preprint<\/a>]<\/li>\n\n\n\n<li>M. Choudhury, M. Gao, S. Tajik, <strong>D. Forte,<\/strong> &#8220;TAMED: Transitional Approaches for LFI Resilient State Machine Encoding&#8221;, IEEE International Test Conference (ITC), September 2022.<\/li>\n\n\n\n<li>S. Roy, M. Hashemi, F. Ganji, <strong>D. Forte<\/strong>, &#8220;Active IC Metering Protocol Security Revisited and Enhanced with Oblivious Transfer&#8221;, SRC TECHCON, September 2022.<\/li>\n\n\n\n<li>RY Acharya, <strong>D. Forte<\/strong>, &#8220;Joint Optimization of NCL PUF Using Frequency-based Analysis and Evolutionary Algorithm&#8221;, International Symposium on Quality Electronic Design (ISQED), April 2022. [<a href=\"https:\/\/cyan.engineering.osu.edu\/media\/document\/2023-01-05\/isqed-3d-3-254.pdf\">link<\/a>]<\/li>\n\n\n\n<li>S. Roy, T. Farheen, S. Tajik, <strong>D. Forte<\/strong>, &#8220;Self-timed Sensors for Detecting Static Optical Side Channel Attacks&#8221;, International Symposium on Quality Electronic Design (ISQED), April 2022. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10327705-self-timed-sensors-detecting-static-optical-side-channel-attacks\">link<\/a>]<\/li>\n\n\n\n<li>J. Schubeck, D. Koblah, U. Botero, <strong>D. Forte<\/strong>, &#8220;A Comprehensive Taxonomy of PCB Defects&#8221;, in GOMACTech, March 2022.<\/li>\n\n\n\n<li>R. Wilson, H. Lu, M. Zhu, <strong>D. Forte<\/strong>, DL Woodard, &#8220;REFICS: A Step Towards Linking Vision with Hardware Assurance&#8221;, Winter Conference on Applications of Computer Vision (WACV), January 2022. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10400717-refics-step-towards-linking-vision-hardware-assurance\">link<\/a>]<\/li>\n\n\n\n<li>U. Botero, F. Ganji, D. Woodard, <strong>D Forte<\/strong>, &#8220;Automated Trace and Copper Plane Extraction of X-ray Tomography Imaged PCBs&#8221;, IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), December 2021.<\/li>\n\n\n\n<li>T. Farheen, U. Botero, N. Varshney, HT Shen, DL Woodard, M. Tehranipoor, <strong>D. Forte<\/strong>, &#8220;Proof of Reverse Engineering Barrier: SEM Image Analysis on Covert Gates&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), November 2021. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2021\/10\/Final_version_ISTFA_2021.pdf\">link<\/a>]<\/li>\n\n\n\n<li>M. Choudhury, S. Tajik, <strong>D. Forte<\/strong>, &#8220;SPARSE: Spatially Aware LFI Resilient State Machine Encoding&#8221;, Hardware and Architectural Support for Security and Privacy (HASP), October 2021. <\/li>\n\n\n\n<li>RY Acharya, M. Levin, <strong>D. Forte<\/strong>, &#8220;LDO-based Odometer to Combat IC Recycling&#8221;, IEEE International System-on-Chip Conference (SOCC), September 2021. [<a href=\"https:\/\/www.academia.edu\/143362301\/LDO_based_Odometer_to_Combat_IC_Recycling\">link<\/a>]<\/li>\n\n\n\n<li>RY Acharya, N. Charlot, MM Alam, F. Ganji, D. Gauthier, <strong>D. Forte<\/strong>, &#8220;Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm&#8221;,&nbsp; International Symposium on Quality Electronic Design (ISQED&#8217;21), April 2021. [<a href=\"https:\/\/cyan.engineering.osu.edu\/media\/document\/2023-01-05\/isqed-3d-3-254.pdf\">link<\/a>]<\/li>\n\n\n\n<li>DS Koblah, UJ Botero, F. Ganji, D. Woodard, <b>D. Forte<\/b>, &#8220;Via Modeling on X-Ray Images of Printed Circuit Boards Through Deep Learning&#8221;, in GOMACTech, March 2021. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10230900-via-modeling-ray-images-printed-circuit-boards-through-deep-learning\">link<\/a>]<\/li>\n\n\n\n<li>J. Bellay, <strong>D. Forte<\/strong>, R. Martin, C. Taylor, &#8220;Hardware Vulnerability Description, Sharing and Reporting: Challenges and Opportunities&#8221;, in GOMACTech, March 2021. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10237521-hardware-vulnerability-description-sharing-reporting-challenges-opportunities\">link<\/a>]<\/li>\n\n\n\n<li>M. Choudhury, S. Tajik, <strong>D. Forte<\/strong>, &#8220;PATRON: A Pragmatic Approach for Encoding LFI Resistant FSMs&#8221;, Design, Automation and Test in Europe (DATE), February 2021. [<a href=\"https:\/\/www.researchgate.net\/profile\/Shahin_Tajik\/publication\/347440615_PATRON_A_Pragmatic_Approach_for_Encoding_Laser_Fault_Injection_Resistant_FSMs\/links\/5fdbcdcea6fdccdcb8d6ce52\/PATRON-A-Pragmatic-Approach-for-Encoding-Laser-Fault-Injection-Resistant-FSMs.pdf\">preprint<\/a>]<\/li>\n\n\n\n<li>R. Acharya, S. Chowdhury, F Ganji, <b>D. Forte<\/b>, &#8220;Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm&#8221; IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), December 2020. <strong>[<a href=\"https:\/\/arxiv.org\/pdf\/2003.13904.pdf\"><b>preprint<\/b><\/a>]<\/strong><\/li>\n\n\n\n<li>U. Botero, F. Ganji, N. Asadizanjani, D.Woodard, <b>D. Forte<\/b>, &#8220;Semi-Supervised Automated Layer Identification of X-ray Tomography Imaged PCBs&#8221;, IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), December 2020.<\/li>\n\n\n\n<li>P. Ghosh, U. Botero, F. Ganji, D. Woodard, RS Chakraborty, <b>D. Forte<\/b>, &#8220;Automated Detection and Localization of Counterfeit Chip Defects by Texture Analysis in Infrared (IR) Domain&#8221;, IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), December 2020. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10221334-automated-detection-localization-counterfeit-chip-defects-texture-analysis-infrared-ir-domain\">link<\/a>]<\/li>\n\n\n\n<li>UJ Botero, D. Koblah, DE Capecci, F. Ganji, N. Asadi, DL Woodard, <strong>D. Forte,<\/strong> &#8220;Automated Via Detection for PCB Reverse Engineering&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), December 2020. <em><b>[EDFAS Virtual Workshop (ISTFA 2020) Outstanding Paper Award]<\/b><\/em><\/li>\n\n\n\n<li>R. Wilson, <strong>D. Forte<\/strong>, N. Asadi, D. Woodard, &#8220;LASRE: A Novel Approach to Large area Accelerated Segmentation for Reverse Engineering on SEM images&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), December 2020. [<a href=\"https:\/\/www.researchgate.net\/publication\/344664133_LASRE_A_Novel_Approach_to_Large_area_Accelerated_Segmentation_for_Reverse_Engineering_on_SEM_images\/link\/5f87d868458515b7cf81eec2\/download\">preprint<\/a>]<\/li>\n\n\n\n<li>S. Chowdhury, R. Acharya, W. Boullion, M. Howard, A. Felder, J. Di, <b>D. Forte<\/b>, &#8220;A Weak Asynchronous RESet (ARES) PUF Using Start-up Characteristics of Null Conventional Logic Gates&#8221;, IEEE International Test Conference (ITC), November 2020. [<a href=\"https:\/\/www.researchgate.net\/publication\/343696865_A_Weak_Asynchronous_RESet_ARES_PUF_Using_Start-up_Characteristics_of_Null_Conventional_Logic_Gates\/link\/5f3aa73592851cd302fe9a66\/download\">preprint<\/a>]<\/li>\n\n\n\n<li>S. Amir,<b> D. Forte<\/b>, &#8220;Adaptable and Divergent Synthetic Benchmark Generation for Hardware Security&#8221;, International Conference on Computer-Aided Design (ICCAD), November 2020. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10187137-adaptable-divergent-synthetic-benchmark-generation-hardware-security\">link<\/a>]<\/li>\n\n\n\n<li>S. Chowdhury, F Ganji, <b>D. Forte<\/b>, &#8220;Low-Cost Remarked Counterfeit IC Detection Using LDO Regulators&#8221;, IEEE International Symposium on Circuits and Systems (ISCAS), October 2020. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2021\/01\/ISCAS_2020.pdf\">link<\/a>]<\/li>\n\n\n\n<li>A. Covic, F. Ganji, <b>D. Forte<\/b>, &#8220;Circuit Masking Schemes: New Hope for Backside Probing Countermeasures?&#8221;, SRC TECHCON, September 2020. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10173592-circuit-masking-schemes-new-hope-backside-probing-countermeasures\">link<\/a>]<\/li>\n\n\n\n<li>M. Gao, H. Wang, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;iPROBE V2: Internal Shielding-based Countermeasures against Both Back-side and Front-side Probing Attacks&#8221;, SRC TECHCON, September 2020. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10174121-iprobe-v2-internal-shielding-based-countermeasures-against-both-back-side-front-side-probing-attacks\">link<\/a>]<\/li>\n\n\n\n<li>F Ganji, S. Amir, S. Tajik, <b>D. Forte<\/b>, JP Seifert, &#8220;Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems&#8221;, Design, Automation, and Test in Europe (DATE), March 2020. [<a href=\"https:\/\/www.researchgate.net\/profile\/Fatemeh_Ganji2\/publication\/337874468_Pitfalls_in_Machine_Learning-based_Adversary_Modeling_for_Hardware_Systems\/links\/5df000264585159aa473ea64\/Pitfalls-in-Machine-Learning-based-Adversary-Modeling-for-Hardware-Systems.pdf\">preprint<\/a>]<\/li>\n\n\n\n<li>UJ Botero, N. Asadizanjani, D. Woodard, <b>D. Forte<\/b>, &#8220;A Framework for Automated Alignment and Layer Identification of X-Ray Tomography Imaged PCBs&#8221;, in GOMACTech, March 2020. [<strong><a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/GOMAC_UnsupervisedLayerIdentification.pdf\">link<\/a><\/strong>]<\/li>\n\n\n\n<li>A. Covic, Q. Shi, H. Shen, <b>D. Forte,<\/b> &#8220;Contact-to-Silicide Probing Attacks on Integrated Circuits and Countermeasures&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2019. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10116559-contact-silicide-probing-attacks-integrated-circuits-countermeasures\">link<\/a>]<\/li>\n\n\n\n<li>A. Alaql, <b>D. Forte,<\/b> S.Bhunia, &#8220;Sweep to the Secret: A Constant Propagation Attack on Logic Locking&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2019. [<a href=\"https:\/\/par.nsf.gov\/biblio\/10121160-sweep-secret-constant-propagation-attack-logic-locking\">link<\/a>]<\/li>\n\n\n\n<li>S. Chowdhury, F. Ganji, T. Bryant, N. Maghari, <b>D. Forte<\/b>, &#8220;Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation&#8221;, IEEE International Test Conference (ITC), November 2019. [<a href=\"https:\/\/www.researchgate.net\/publication\/336146643_Recycled_Analog_and_Mixed_Signal_Chip_Detection_at_Zero_Cost_Using_LDO_Degradation\">link<\/a>]<\/li>\n\n\n\n<li>R. Wilson, RY Acharya, <b>D. Forte<\/b>, N. Asadizanjani, D. Woodard, &#8220;A Novel Approach to Unsupervised Automated Extraction of Standard Cell Library for Reverse Engineering and Hardware Assurance&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), November 2019.<\/li>\n\n\n\n<li>S. Shomaji, F. Ganji, D. Woodard, <b>D. Forte<\/b>, &#8220;Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems&#8221;, IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), September 2019. [<a href=\"https:\/\/www.researchgate.net\/publication\/336179620_Hierarchical_Bloom_Filter_Framework_for_Security_Space-efficiency_and_Rapid_Query_Handling_in_Biometric_Systems\">link<\/a>]<\/li>\n\n\n\n<li>M. Alam, S. Tajik, F. Ganji, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions&#8221;, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), August 2019. [<a href=\"https:\/\/www.researchgate.net\/profile\/Shahin_Tajik\/publication\/334524263_RAM-Jam_Remote_Temperature_and_Voltage_Fault_Attack_on_FPGAs_using_Memory_Collisions\/links\/5d2f951492851cf4408ce7df\/RAM-Jam-Remote-Temperature-and-Voltage-Fault-Attack-on-FPGAs-using-Memory-Collisions.pdf\">link<\/a>]<\/li>\n\n\n\n<li>F. Ganji, S. Tajik, P. Stauss, JP Seifert, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Approaches for Hardness Amplification of PUFs&#8221;, International Workshop on Security Proofs for Embedded Systems (PROOFS), August 2019. [<a href=\"https:\/\/easychair.org\/publications\/open\/wnz9\">preprint<\/a>]<\/li>\n\n\n\n<li>R. Wilson, N. Asadizanjani, <b>D. Forte<\/b>, D. Woodard, &#8220;First Auto-Magnifier Platform for Hardware Assurance and Reverse Engineering Integrated Circuits&#8221;, Microscopy &amp; Microanalysis (M&amp;M), August 2019. [<a href=\"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/7B76402709DAFE34B9CFC36D7D3D416D\/S1431927619001867a.pdf\/first_automagnifier_platform_for_hardware_assurance_and_reverse_engineering_integrated_circuits.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>P. Ghosh, F. Ganji, <b>D. Forte<\/b>, D. Woodard, RS Chakraborty, &#8220;Automated Framework for Unsupervised Counterfeit Integrated Circuit Detection by Physical Inspection&#8221;, International Conference on Physical Assurance and Inspection of Electronics (PAINE), July 2019.<\/li>\n\n\n\n<li>S. Chowdhury, H. Shen, B. Park, N. Maghari, <b>D.Forte<\/b>, &#8220;Aging Analysis of Low Dropout Regulator for Universal Recycled IC Detection&#8221;, IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 2019.<\/li>\n\n\n\n<li>A. Gorbenko, N. Noor, S. Muneer, R. Khan, F. Dirisaglik, A. Cywar, B. Shakya, <b>D. Forte<\/b>, M. van Dijk, A. Gokirmak, H. Silva, &#8220;Resistance Drift and Crystallization in Suspended and On-Oxide Phase Change Memory Line Cells&#8221;, IEEE International Conference on Nanotechnology (IEEE-NANO), July 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8993884\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>B. Park, M. Tehranipoor, <b>D. Forte<\/b>, N. Maghari, &#8220;A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability&#8221; IEEE Custom Integrated Circuits Conference (CICC), April 2019.<\/li>\n\n\n\n<li>A. Alaql, T. Hoque, <b>D. Forte<\/b>, S. Bhunia, &#8220;Quality Obfuscation for Reliable and Adaptive Hardware IP Protection&#8221;, IEEE VLSI Test Symposium (VTS), April 2019.<\/li>\n\n\n\n<li>A. Stern, K. Yang, J. Vosatka, A. Duncan, J. Park, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;RASC: Enabling Remote Access to Side-Channels for Mission Critical Systems&#8221;, in GOMACTech, March 2019.<\/li>\n\n\n\n<li>Q. Shi, H. Wang, N. Asadizanjani, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2018.<\/li>\n\n\n\n<li>A. Stern, U.J. Botero, B. Shakya, H. Shen, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked ICs&#8221;, IEEE International Test Conference (ITC), October 2018. [<a href=\"https:\/\/www.academia.edu\/download\/124148325\/ITC_2018_paper_116.pdf\">link<\/a>]<\/li>\n\n\n\n<li>H. Shen, N. Asadizanjani, M. Tehranipoor, <b>D. Forte,<\/b> &#8220;Nanopyramid: An Optical Scrambler Against Backside Probing Attacks&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), October 2018.<\/li>\n\n\n\n<li>P. Ghosh, <b>D. Forte<\/b>, D. Woodard, R.S. Chakraborty, &#8220;Automated Detection of Pin Defects on Counterfeit Microelectronics&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), October 2018.<\/li>\n\n\n\n<li>H. Wang, Q. Shi, N. Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;A Physical Design Flow against Front-side Probing Attacks by Internal Shielding&#8221;, SRC TECHCON, September 2018.<\/li>\n\n\n\n<li>J. Park, X. Xu, Y. Jin, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Power-based Side-Channel Instruction-level Disassembler&#8221;, Design Automation Conference (DAC), June 2018. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3195970.3196094?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>E.L. Principe, N. Asadizanjani, <b>D. Forte, <\/b>M. Tehranipoor, M. DiBattista, R. Chivas, S. Silverman, N. Piche, M. Marsh, J. Mastovich, &#8220;Steps Toward Computational Guided Deprocessing of Integrated Circuits&#8221; in GOMACTech, March 2018.<\/li>\n\n\n\n<li>D. Capecci, G. Contreras,<b> D. Forte<\/b>, M.Tehranipoor, S. Bhunia, &#8220;Automated SoC Security from Design to Fabrication&#8221; in GOMACTech, March 2018.<\/li>\n\n\n\n<li>S. Baireddy, U.J. Botero, N. Asadizanjani, M.Tehranipoor, D. Woodard, <b>D. Forte<\/b>, &#8220;Automated Detection of Counterfeit IC Defects Using Image Processing&#8221; in GOMACTech, March 2018.<\/li>\n\n\n\n<li>U.J. Botero, M.Tehranipoor, <b>D. Forte<\/b>, &#8220;Downgrade: A Framework for Obsolescence Handling through Backwards Compatibility&#8221; in GOMACTech, March 2018.<\/li>\n\n\n\n<li>S. Chowdhury, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Aging Resistant RO PUF with Increased Reliability in FPGA&#8221;,&nbsp; International Conference on Reconfigurable Computing and FPGAs (ReConFig), December 2017.<\/li>\n\n\n\n<li>E.L. Principe, N.Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, R. Chivas, M. DiBattista, S.Silverman, M. Marsh, N. Piche, J. Mastovich, &#8220;Steps Toward Automated Deprocessing of Integrated Circuits,&#8221;&nbsp; International Symposium for Testing and Failure Analysis (ISTFA), November 2017. <em><b>[ISTFA 2017 Outstanding Paper Award] <\/b><\/em><\/li>\n\n\n\n<li>A. Chhotaray, A. Nahiyan, T. Shrimpton, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Standardizing Bad Cryptographic Practice &#8211; A Teardown of the IEEE Standard for Protecting Electronic-Design Intellectual Property,&#8221; ACM Conference on Computer and Communications Security (CCS), November 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134040?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, <b>D. Forte,<\/b> M.Tehranipoor, &#8220;Hardware Trojan Detection through Information Flow Security Verification,&#8221; IEEE International Test Conference (ITC), November 2017.<\/li>\n\n\n\n<li>Z. Guo, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;MPA: Model-assisted PCB Attestation via Board-level RO and Temperature Compensation&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), October 2017.<\/li>\n\n\n\n<li>K. Yang, U.J. Botero, H. Shen, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;A Split Manufacturing Approach for Unclonable Chipless RFIDs for Pharmaceutical Supply Chain Security&#8221;, IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), October 2017.<\/li>\n\n\n\n<li>N. Karimian, D. Woodard, <b>D. Forte<\/b>, &#8220;On the Vulnerability of ECG Verification to Online Presentation Attacks&#8221;, International Joint Conference on Biometrics (IJCB), October 2017. <em><b>[IJCB 2017 Best Student Paper Award] <\/b><\/em><\/li>\n\n\n\n<li>X. Xu, B. Shakya, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks,&#8221; International Conference on Cryptographic Hardware and Embedded Systems (CHES), September 2017. [<a href=\"https:\/\/eprint.iacr.org\/2017\/621.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, M. Tehranipoor, <b>D. Forte<\/b>,&#8221;Memory-based Counterfeit IC Detection Framework&#8221;, SRC TECHCON, September 2017.<\/li>\n\n\n\n<li>Z. Guo, X. Xu, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;FFD: A Framework for Fake Flash Detection&#8221;, Design Automation Conference (DAC), June 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3061639.3062249?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Q. Shi, K. Xiao, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication&#8221;, GLSVLSI, May 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3060403.3060588?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>S. Amir, B. Shakya, <b>D. Forte<\/b>, M. Tehranipoor, S. Bhunia, &#8220;Comparative Analysis of Hardware Obfuscation for IP Protection&#8221;, GLSVLSI, May 2017. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3060403.3060495?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>T. Byrant, S. Chowdhury, <b>D. Forte<\/b>, M. Tehranipoor, N. Maghari, &#8220;A Stochastic All-Digital Weak Physically Unclonable Function for Analog\/Mixed-Signal Applications&#8221;, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2017.<\/li>\n\n\n\n<li>N. Karimian, F. Tehranipoor, Z. Guo, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Noise Assessment Framework for Optimizing ECG Key Generation&#8221;, IEEE International Conference on Technologies for Homeland Security (HST), April 2017.<\/li>\n\n\n\n<li>Q. Shi, N. Asadizanjani, <b>D. Forte<\/b>, M.Tehranipoor, &#8220;Layout-based Microprobing Vulnerability Assessment for Security Critical Applications,&#8221; in GOMACTech, March 2017.<\/li>\n\n\n\n<li>N. Karimian, Z. Guo, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Human Recognition from Photoplethysmography (PPG) Based on Non-fiducial Features&#8221;, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2017.<\/li>\n\n\n\n<li>N. Karimian, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Non-Fiducial PPG-based Authentication for Healthcare Application&#8221;, International Conference on Biomedical and Health Informatics (BHI), February 2017.<\/li>\n\n\n\n<li>G. K. Contreras, A. Nahiyan, S. Bhunia, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Security Vulnerability Analysis of Design-for-Test Exploits for Asset Protection in SoCs,&#8221; Asia and South Pacific Design Automation Conference (ASP-DAC), January 2017. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7858392\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Aging Attacks for Key Extraction on Permutation-Based Obfuscation,&#8221; IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2016.<\/li>\n\n\n\n<li>T. Rahman, <b>D. Forte<\/b>, X. Wang, M. Tehranipoor, &#8220;Enhancing Noise Sensitivity of Embedded SRAMs for Robust True Random Number Generation in SoCs,&#8221; IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), December 2016.<\/li>\n\n\n\n<li>M. M. Alam, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Recycled FPGA Detection Using Exclusive LUT Path Delay Characterization,&#8221; IEEE International Test Conference (ITC), November 2016.<\/li>\n\n\n\n<li>B. Shakya, N. Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Chip Editor: Leveraging Circuit Edit for Logic Obfuscation and Trusted Fabrication,&#8221; IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), November 2016. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2966986.2967014?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, B. Shakya, H. Shen, S. Bhunia, N. Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;A New Methodology to Protect PCBs from Non-destructive Reverse Engineering,&#8221; International Symposium for Testing and Failure Analysis (ISTFA), November 2016.<\/li>\n\n\n\n<li>N. Asadizanjani, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Non-destructive Bond Pull and Ball Shear Failure Analysis Based on Real Structural Properties,&#8221; International Symposium for Testing and Failure Analysis (ISTFA), November 2016.<\/li>\n\n\n\n<li>N. Asadizanjani, S. Gattigowda, N. Dunn, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;A Database for Counterfeit Electronics and Automatic Defect Detection Based on Image Processing and Machine Learning,&#8221; International Symposium for Testing and Failure Analysis (ISTFA), November 2016. <\/li>\n\n\n\n<li>T. Bryant, S. Chowdhury, <b>D. Forte<\/b>, M. Tehranipoor, N. Maghari, &#8220;A Stochastic Approach to Analog Physical Unclonable Function,&#8221; IEEE Midwest Symposium on Circuits and Systems (MWSCAS), October 2016. <\/li>\n\n\n\n<li>M. T. Rahman, <b>D. Forte<\/b>, and M. Tehranipoor, &#8220;SRAM Inspired Design and Optimization for Developing Robust Security Primitives,&#8221; in SRC TECHCON, September 2016.<em><b> [Awarded Best in Session]<\/b><\/em><\/li>\n\n\n\n<li>N. Karimian, M. Tehranipoor, D. Woodard,<b> D. Forte<\/b>, &#8220;Biometrics for Authentication in Resource-Constrained Systems,&#8221; International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), August 2016. [<strong><a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/1page-ieeeconf_letter_VFinal_2.pdf\">link<\/a><\/strong>]<\/li>\n\n\n\n<li>H. Shen, F. Rahman, B. Shakya, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs)&#8221;, IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 2016.<\/li>\n\n\n\n<li>A. Nahiyan, K. Xiao, K. Yang, Y. Jin, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs&#8221;, Design Automation Conference (DAC), June 2016. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2897937.2897992?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Z. Guo, N. Karimian, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Hardware Security Meets Biometrics for the Age of IoT&#8221;, IEEE International Symposium on Circuits and Systems (ISCAS), May 2016.<\/li>\n\n\n\n<li>T. Le, J. Di, M. Tehranipoor, <b>D. Forte,<\/b> L. Wang, &#8220;Tracking Data Flow at Gate-Level through Structural Checking&#8221;, GLSVLSI, May 2016. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2902961.2903040?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>Q. Shi, N. Asadizanjani, <b>D. Forte<\/b>, M.Tehranipoor, &#8220;A Layout-driven Framework to Assess Vulnerability of ICs to Microprobing Attacks&#8221;, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016. <em><b>[HOST 2016 Best Paper Award]<span class=\"Apple-converted-space\">&nbsp;<\/span><\/b><\/em><\/li>\n\n\n\n<li>Z. Guo, M. T. Rahman, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;A Zero-cost Approach to Detect Recycled SoCs Using Embedded SRAM&#8221;, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016.<\/li>\n\n\n\n<li>K.Yang, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;UCR: Unclonable Chipless RFID Tag&#8221;, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016. <em><b>[HOST 2016 Best Paper Nomination]<span class=\"Apple-converted-space\">&nbsp;<\/span><\/b><\/em><\/li>\n\n\n\n<li>F. Rahman, <b>D. Forte,<\/b> and Mark Tehranipoor, &#8220;Reliability vs. Security: Challenges and Opportunities for Developing Reliable and Secure Integrated Circuits,&#8221; International Reliability Physics Symposium (IRPS), April 2016  <b><i>(Invited Paper).<\/i><\/b><\/li>\n\n\n\n<li>M. M. Alam, N. Asadizanjani, M.Tehranipoor, <b>D. Forte<\/b>, &#8220;The Impact of X-ray Tomography on the Reliability of FPGAs&#8221; in GOMACTech, March 2016.<\/li>\n\n\n\n<li>Z. Guo, N. Karimian, M. Tehranipoor, <b>D. Forte,<\/b> &#8220;Biometric Based Human-to-Device (H2D) Authentication&#8221;, in GOMACTech, March 2016.<\/li>\n\n\n\n<li>N. Asadizanjani, S. Shahbazmohamadi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Nondestructive X-ray Tomography Based Bond Pull and Ball Shear Analysis&#8221; in GOMACTech, March 2016.<\/li>\n\n\n\n<li>B. Shakya, F. Rahman, M. Tehranipoor, <b>D. Forte,<\/b> &#8220;Harnessing Nanoscale Device Properties for Hardware Security&#8221;,&nbsp; Microprocessor Test and Verification (MTV), December 2015.<\/li>\n\n\n\n<li>K. Yang, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Protecting Endpoint Devices in IoT Supply Chain&#8221;,&nbsp; IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), November 2015. [<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2840869\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>H. Dogan, M. Alam, N. Asadizanjani, S. Shahbazmohamadi, <b>D. Forte<\/b>,&nbsp; M. Tehranipoor, &#8220;Analyzing the Impact of X-ray Tomography for Non-destructive Counterfeit Detection&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), November 2015.<\/li>\n\n\n\n<li>N. Asadizanjani, S. Shahbazmohamadi, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Non-destructive PCB Reverse Engineering Using X-ray Micro Computed Tomography&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), November 2015.<\/li>\n\n\n\n<li>B. Shakya, U. Guin, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Performance Optimization for On-Chip Sensors to Detect Recycled ICs,&#8221; IEEE International Conference on Computer Design (ICCD), October 2015.<\/li>\n\n\n\n<li>M. T. Rahman, <b>D. Forte<\/b>, F. Rahman, M. Tehranipoor, &#8220;A Pair Selection Algorithm for Robust RO-PUF Against Environmental Variations and Aging,&#8221; IEEE International Conference on Computer Design (ICCD), October 2015.<\/li>\n\n\n\n<li>S. Chen, J. Chen, <b>D. Forte<\/b>, J. Di, M. Tehranipoor, L. Wang, &#8220;Chip-level Anti-reverse Engineering using Transformable Interconnects,&#8221; IEEE Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), October 2015.<\/li>\n\n\n\n<li>M. T. Rahman, <b>D. Forte<\/b>, and M. Tehranipoor, &#8220;Robust SRAM-PUF: Cell Stability Analysis and Novel Bit-Selection Algorithm,&#8221; SRC TECHCON, September 2015.<\/li>\n\n\n\n<li>K. Yang, <b>D.Forte<\/b>, M.Tehranipoor, &#8220;ReSC: RFID-enabled Supply Chain Management and Traceability for Network Devices,&#8221; in 11th Work\u00adshop on RFID Se\u00adcu\u00adri\u00adty (RFIDSec 2015), June 2015.<\/li>\n\n\n\n<li>Z. Guo, J. Di, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Investigation of Obfuscation-based Anti-Reverse Engineering for Printed Circuit Boards,&#8221; Design Automation Conference (DAC) 2015, June 2015. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2744769.2744862?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Xiao, <b>D. Forte,<\/b> M. Tehranipoor, &#8220;Efficient and Secure Split Manufacturing via Obfuscated Built-In Self-Authentication,&#8221; IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) 2015, May 2015. <em><b>[HOST 2015 Best Paper Award]<span class=\"Apple-converted-space\">&nbsp;<\/span><\/b><\/em><\/li>\n\n\n\n<li>N. Karimian, F. Tehranipoor, M.T. Rahman, S. Kelly, <b>D. Forte<\/b>, &#8220;Genetic Algorithm for Hardware Trojan Detection with Ring Oscillator Network (RON),&#8221; IEEE International Conference on Technologies for Homeland Security (HST), April 2015.<\/li>\n\n\n\n<li>K. Yang, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability,&#8221; IEEE International Conference on Technologies for Homeland Security (HST), April 2015.<\/li>\n\n\n\n<li>M.T. Rahman, A. Hosey, F. Rahman, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;RePa: A Pair Selection Algorithm for Reliable Keys from RO-based PUF&#8221; GOMACTech, March 2015.<\/li>\n\n\n\n<li>H. Dogan, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Aging Analysis for Recycled FPGA Detection&#8221; GOMACTech, March 2015.<\/li>\n\n\n\n<li>N. Asadizanjani, S. E. Quadir, S. Shahbazmohamadi, M. Tehranipoor, <b>D. Forte<\/b>, &#8220;Rapid Non-destructive Reverse Engineering of Printed Circuit Boards by High Resolution X-ray Tomography&#8221; GOMACTech, March 2015.<\/li>\n\n\n\n<li>A. Hosey, M.T. Rahman, K. Xiao, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Advanced Analysis of Cell Stability for Reliable SRAM PUF,&#8221; IEEE Asian Test Symposium (ATS), November 2014.<\/li>\n\n\n\n<li>S. Shahbazmohamadi, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Advanced Physical Inspection Methods for Counterfeit Detection&#8221;, International Symposium for Testing and Failure Analysis (ISTFA), November 2014.<\/li>\n\n\n\n<li>M.T. Rahman, <b>D. Forte<\/b>, Q. Shi, G. Contreras, M. Tehranipoor, &#8220;CSST: Preventing Distribution of Unlicensed and Rejected ICs by Untrusted Foundry and Assembly,&#8221; IEEE Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), October 2014.<\/li>\n\n\n\n<li>H. Dogan, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Aging Analysis for Recycled FPGA Detection,&#8221; IEEE Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), October 2014.<\/li>\n\n\n\n<li>U. Guin, <b>D. Forte<\/b>, X. Zhang, M. Tehranipoor, &#8220;Low-cost On-Chip Structures for Combating Die and IC Recycling,&#8221; Design Automation Conference (DAC), June 2014 [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2593069.2593157?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M.T. Rahman, K. Xiao, <b>D. Forte<\/b>, X. Zhang, Z. Shi, M. Tehranipoor, &#8220;TI-TRNG: Technology Independent True Random Number Generator,&#8221; Design Automation Conference (DAC), June 2014 [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2593069.2593236?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>M.T. Rahman, <b>D. Forte<\/b>, Q. Shi, G. Contreras, M. Tehranipoor, &#8220;CSST: An Efficient Secure Split-Test for Preventing IC Piracy,&#8221; IEEE North Atlantic Test Workshop (NATW), May 2014 [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6875447\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li>K. Xiao, M.T. Rahman, <b>D. Forte<\/b>, M. Su, Y. Huang, M.Tehranipoor, &#8220;Bit Selection Algorithm Suitable for High-Volume Production of SRAM-PUF,&#8221; in IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2014.<\/li>\n\n\n\n<li>U. Guin, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Low-cost On-Chip Structures for Combatting Die and IC Recycling,&#8221; in GOMACTech, April 2014.<\/li>\n\n\n\n<li>K. Xiao, M.T. Rahman, <b>D. Forte<\/b>, M.Tehranipoor, &#8220;Low-cost Analysis for Identification of Mass-Produced Electronic Devices,&#8221; in GOMACTech, April 2014.<\/li>\n\n\n\n<li>U. Guin, <b>D. Forte<\/b>, D. DiMase, M. Tehranipoor, &#8220;Counterfeit IC Detection: Test Method Selection Considering Test Time, Cost, and Tier Level Risks,&#8221; in GOMACTech, April 2014.<\/li>\n\n\n\n<li>C. Bao, <b>D. Forte<\/b>, A. Srivastava, &#8220;On Application of One-class SVM to Reverse Engineering-Based Hardware Trojan Detection&#8221;, International Symposium on Quality Electronic Design (ISQED), March 2014.<\/li>\n\n\n\n<li>M.T. Rahman, <b>D. Forte<\/b>, J. Fahrny, M. Tehranipoor, &#8220;ARO-PUF: An Aging-Resistant Ring Oscillator PUF Design,&#8221; Design, Automation, &amp; Test in Europe (DATE), March 2014. [<a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2616606.2616692\">link<\/a>]<\/li>\n\n\n\n<li>U. Guin, <b>D. Forte<\/b>, M. Tehranipoor, &#8220;Anti-Counterfeit Techniques: From Design to Resign&#8221;, Microprocessor Test and Verification (MTV), December 2013.<\/li>\n\n\n\n<li><b>D. Forte<\/b>, C. Bao, A. Srivastava, &#8220;Temperature Tracking: An Innovative Run-Time Approach for Hardware Trojan Detection&#8221;, IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), November 2013.<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Manipulating Manufacturing Variations for Better Silicon-Based Physically Unclonable Functions&#8221;, IEEE Computer Society Annual Symposium on VLSI (ISVLSI), August&nbsp; 2012. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6296468\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;On Improving the Uniqueness of Silicon-Based Physically Unclonable Functions Via Optical Proximity Correction&#8221;, Design Automation Conference (DAC), June 2012. <b><em>[DAC 2012 Best Paper Nomination]<\/em> <\/b>[<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2228360.2228379?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Energy-Aware and Quality-Scalable Data Placement and Retrieval for Disks in Video Server Environments&#8221;, IEEE International Conference on Computer Design (ICCD), October 2011. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6081447\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Adaptable Architectures for Distributed Visual Target Tracking&#8221;, IEEE International Conference on Computer Design (ICCD) , October 2011. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6081421\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Energy-Aware Video Storage and Retrieval in Server Environments&#8221;, International Green Computing Conference and Workshops (IGCC), July 2011. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6008589\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Resource-Aware Architectures for Particle Filter Based Visual Target Tracking&#8221;, International Green Computing Conference and Workshops (IGCC), July 2011. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6008586\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Adaptable Video Compression and Transmission using Lossy and Workload Balancing Techniques&#8221;, NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), June 2011 <em><b>[Awarded AHS-2011 Best Student Paper] <\/b><\/em>[<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=5963929\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Energy-Aware Video Coding of Multiple Views via Workload Balancing&#8221;, NASA\/ESA Conference on Adaptive Hardware and Systems (AHS), June 2011. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=5963951\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A.Srivastava, &#8220;Energy and Thermal-Aware Video Coding via Encoder\/Decoder Workload Balancing&#8221;, International Symposium on Low Power Electronics and Design (ISLPED), August 2010. [<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/1840845.1840886?cid=81467646023\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, A. Srivastava, &#8220;Thermal-Aware Sensor Scheduling for Distributed Estimation&#8221;, International Conference on Distributed Computing in Sensor Systems (DCOSS), June 2010. [<a href=\"http:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-3-642-13651-1_9\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Patents<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>S. Chowdhury, <strong>D. Forte<\/strong>, M. Levin, N. Maghari. &#8220;LDO-Based Odometer To Combat IC Recycling&#8221;, issued on July 2, 2024<\/li>\n\n\n\n<li><strong>D. Forte<\/strong>, D. Woodard, F. Ganji, S. Shomaji. &#8220;Biometric Locking Methods and Systems for Internet of Things and the Connected Person&#8221;, issued on May 21, 2024.<\/li>\n\n\n\n<li>D.Woodard, <strong>D. Forte<\/strong>, N. Asadizanjani, R. Wilson. &#8220;Accelerated Segmentation for Reverse Engineering of Integrated Circuits&#8221;, issued on February 6, 2024.<\/li>\n\n\n\n<li>F. Ganji, S. Tajik, JP Seifert, <strong>D. Forte<\/strong>, M. Tehranipoor, &#8220;Hardness Amplification of Physical Unclonable Functions (PUFs)&#8221;, issued on October 24, 2023.<\/li>\n\n\n\n<li>D. Woodard, N. Asadizanjani, <strong>D. Forte<\/strong>, R. Wilson. &#8220;Automatic Sharpness Adjustment for Imaging Modalities&#8221;, issued on October 2, 2023.<\/li>\n\n\n\n<li>S. Chowdhury, F. Ganji, N. Maghari, <strong>D. Forte<\/strong>, &#8220;Detection Of Recycled Integrated Circuits And System-On-Chips Based On Degradation Of Power Supply Rejection Ratio&#8221;, issued on May 23, 2023.<\/li>\n\n\n\n<li>M. Tehranipoor, U. Guin, <b>D. Forte<\/b>, &#8220;A Comprehensive Framework for Protecting Intellectual Property in Semiconductor Industry&#8221;, issued on March 21, 2023.<\/li>\n\n\n\n<li>H. Shen, N. Asadizanjani, <strong>D. Forte<\/strong>, M. Tehranipoor, &#8220;Optical Scrambler With Nano-Pyramids&#8221;, issued on November 22, 2022.<\/li>\n\n\n\n<li>M. Tehranipoor, A. Nahiyan, J. Park, <strong>D. Forte,<\/strong> &#8220;CAD Framework for Power Side-channel Vulnerability Assessment&#8221;, issued on October 18, 2022.<\/li>\n\n\n\n<li>M. Tehranipoor, A. Nahiyan, <b>D. Forte<\/b>, &#8220;Hardware Trojan Detection Through Information Flow Security Verification&#8221;, issued on March 8, 2022.<\/li>\n\n\n\n<li>D. Woodard, R. Wilson, N. Asadizanjani, <strong>D. Forte<\/strong>. &#8220;Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images&#8221;, issued on March 8, 2022.<\/li>\n\n\n\n<li>M. Tehranipoor, <strong>D. Forte<\/strong>, F. Farahmandi, A. Nahiyan, F. Rahman, MS Rahman, &#8220;Protecting Obfuscated Circuits Against Attacks That Utilize Test Infrastructures&#8221;, issued on January 11, 2022.<\/li>\n\n\n\n<li>D. Woodard, R. Wilson, N. Asadizanjani, <strong>D. Forte<\/strong>, &#8220;Method and Apparatus for Automatic Extraction of Standard Cells to Generate a Standard Cell Candidate Library&#8221;, issued on October 26, 2021.<\/li>\n\n\n\n<li>M. Tehranipoor, H. Wang, Q. Shi, H. Shen, <strong>D. Forte<\/strong>. &#8220;Prevention of Front-side Probing Attacks&#8221;, issued on August 10, 2021.<\/li>\n\n\n\n<li>B. Shakya, H. Shen, M. Tehranipoor, <strong>D. Forte<\/strong>, &#8220;Covert Gates To Protect Gate-Level Semiconductors&#8221;, issued on July 6, 2021.<\/li>\n\n\n\n<li>M. Tehranipoor, <b>D. Forte<\/b>, B. Shakya, and&nbsp; N. Asadizanjani, &#8220;Circuit Edit and Obfuscation for Trusted Chip Fabrication&#8221;, issued onJune 8, 2021.<\/li>\n\n\n\n<li>M. Tehranipoor, K. Yang, H. Shen, U. Botero, <b>D. Forte<\/b>, &#8220;Cross-Registration For Unclonable Chipless RFID Tags&#8221;, issued on February 23, 2021.<\/li>\n\n\n\n<li>M. Tehranipoor, <b>D. Forte<\/b>, N. Asadizanjani, Q. Shi, &#8220;Layout-Driven Method to Assess Vulnerability of ICs To Microprobing Attacks&#8221;, issued on February 25, 2020.<\/li>\n\n\n\n<li>S. Bhunia, H. Shen, M. Tehranipoor, <b>D. Forte<\/b>, N. Asadizanjani, &#8220;Vanishing via for hardware IP protection from reverse engineering&#8221; issued on May 7, 2019.<\/li>\n\n\n\n<li>M. Tehranipoor, K. Yang, H. Shen, <b>D. Forte<\/b>, &#8220;Unclonable Environmentally-sensitive Chipless RFID Tag with a Plurality of Slot Resonators&#8221;, issued on January 15, 2019.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Editorials<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>D. Forte<\/strong>, D. Mukhopadhyay, I.Polian, Y. Fe, R.Cammarota, &#8220;Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security&#8221;, ACM Journal on Emerging Technologies in Computing Systems, Vol. 17, No. 3,&nbsp; July 2021. [<a href=\"https:\/\/dl.acm.org\/doi\/fullHtml\/10.1145\/3464326?casa_token=AocOZuQCxzAAAAAA:HaS72BkcXizn1xMGiA0JXktfXUbOe2m3JaeOjQybAfC0oir_CmJwiouWSkGYM7mm3k3Nbj8ZLcnF\"><strong>link<\/strong><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, Y. Iskander,&nbsp; &#8220;Guest editorial: Hardware Reverse Engineering and Obfuscation&#8221;, Journal of Hardware and Systems Security (HaSS), Vol. 2, No. 4 [<a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007%2Fs41635-018-0059-9.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte<\/b>, R. Perez, Y. Kim, S. Bhunia,&nbsp; &#8220;Guest editors&#8217; introduction: Supply-Chain Security for Cyberinfrastructure&#8221;, IEEE Computer, Vol. 49, No. 8, August 2016. [<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7543441\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Other<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>B. Lampe, W. Lyons, S. Zonouz, WA Conklin, C. O&#8217;Brien, A. Chhotaray, D. Cole, D. Saebeler, K, Castillo, S. McFly, SM Loo, GM Medina, E. Huang, <strong>D. Forte<\/strong>, M Ahmed, &#8220;CIE Curriculum Guide (V.2.0)&#8221;, May 2025. [<a href=\"https:\/\/www.osti.gov\/servlets\/purl\/3006953\"><strong>link<\/strong><\/a>]<\/li>\n\n\n\n<li>J. Bellay, <b>D.Forte<\/b>, Bob Martin, J. Boyens, &#8220;Chapter 1: Hardware Assurance and Weakness Collaboration and Sharing (HAWCS)&#8221;, Trusted and Assured MicroElectronics Working Groups Report, December 2019. [<a href=\"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-content\/uploads\/sites\/657\/2020\/08\/TAME-Report-FINAL.pdf\"><b>link<\/b><\/a>]<\/li>\n\n\n\n<li><b>D. Forte, <\/b>S. Bhunia, R. Karri, J. Plusquellic, M. Tehranipoor<b>, <\/b>&#8220;IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Past, Present, and Future&#8221;, IEEE International Test Conference (ITC), November 2019. [<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=9000111\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Dissertation<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><b>D. Forte<\/b>, &#8220;Design, Fabrication, and Run-time Strategies for Hardware-Assisted Security&#8221;, Ph.D. dissertation, Dept. of Electrical and Computer Engineering, University of Maryland, May 2013. [<a href=\"http:\/\/drum.lib.umd.edu\/bitstream\/1903\/14631\/1\/Forte_umd_0117E_14438.pdf\"><b>link<\/b><\/a>]<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>NOTE: This directory contains pdf\/ps files of articles that may be covered by copyright. You may browse the articles at your convenience, in the same spirit as you may read a journal or a proceedings article in a public library. Retrieving, copying, or distributing these files may violate copyright protection laws. Books Book Chapters Journal [&hellip;]<\/p>\n","protected":false},"author":1381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-section-nav.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-217","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/users\/1381"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":20,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/217\/revisions"}],"predecessor-version":[{"id":3323,"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/pages\/217\/revisions\/3323"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/dforte\/wp-json\/wp\/v2\/media?parent=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}