Ranga Vemuri
YOU?
Author Swipe
View article: Shyam Benegal in Postcolonial Perspective: A Cinematic Chronicle of Representation and Resistance
Shyam Benegal in Postcolonial Perspective: A Cinematic Chronicle of Representation and Resistance Open
This paper examines the films of Shyam Benegal through a postcolonial lens, highlighting his role as a prominent filmmaker in Indian cinema who amplifies marginalized voices and critiques socio-political structures. As a key figure in the …
View article: RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation
RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation Open
Logic Obfuscation is a well renowned design-for-trust solution to protect an Integrated Circuit (IC) from unauthorized use and illegal overproduction by including key-gates to lock the design. This is particularly necessary for ICs manufac…
View article: Word-Level Structure Identification In FPGA Designs Using Cell Proximity Information
Word-Level Structure Identification In FPGA Designs Using Cell Proximity Information Open
Reverse engineering of FPGA based designs from the flattened LUT level netlist to high level RTL helps in verification of the design or in understanding legacy designs. We focus on flattened netlists for FPGA devices from Xilinx 7 series a…
View article: Reverse Engineering Word-Level Models from Look-Up Table Netlists
Reverse Engineering Word-Level Models from Look-Up Table Netlists Open
Reverse engineering of FPGA designs from bitstreams to RTL models aids in understanding the high level functionality of the design and for validating and reconstructing legacy designs. Fast carry-chains are commonly used in synthesis of op…
View article: Hybrid Shielding: Amplifying the Power of Camouflaging and Logic Encryption
Hybrid Shielding: Amplifying the Power of Camouflaging and Logic Encryption Open
In the semiconductor industry, protecting Integrated Circuits (IC) throughout the IC supply chain has become a major concern. In-depth research has been done on logic encryption, split manufacturing, and layout camouflaging to safeguard IC…
View article: Message from the Technical Program Chairs: iSES 2022
Message from the Technical Program Chairs: iSES 2022 Open
View article: Logic Encryption for Resource Constrained Designs
Logic Encryption for Resource Constrained Designs Open
Logic Encryption is a hardware security technique that protects integrated circuit designs that are fabricated at untrusted pure play foundries from being pirated or maliciously modified. In the technique, logic gates are added to the desi…
View article: Trust in IoT Devices: A Logic Encryption Perspective
Trust in IoT Devices: A Logic Encryption Perspective Open
View article: Non-Invasive Reverse Engineering of Finite State Machines Using Power Analysis and Boolean Satisfiability
Non-Invasive Reverse Engineering of Finite State Machines Using Power Analysis and Boolean Satisfiability Open
In this paper, we present a non-invasive reverse engineering attack based on a novel approach that combines functional and power analysis to recover finite state machines from their synchronous sequential circuit implementations. The propo…
View article: Mitigating information leakage during critical communication using S*FSM
Mitigating information leakage during critical communication using S*FSM Open
Security‐centric components and systems, such as System‐on‐Chip early‐boot communication protocols and ultra‐specific lightweight devices, require a departure from minimalist design constructs. The need for built‐in protection mechanisms, …
View article: VLSID 2018 Best Paper Awards
VLSID 2018 Best Paper Awards Open
View article: Fast Inversions in Small Finite Fields by Using Binary Trees
Fast Inversions in Small Finite Fields by Using Binary Trees Open
Inversions in small finite fields are playing a key role in many areas. We present techniques to exploit binary trees for fast inversions in $GF(2^n)$ and $GF(p)$, where $n$ is a positive integer and $p$ is a prime number. The non-pipeline…