default search action
Bilgiday Yuce
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c14]Chen Liu, Monodeep Kar, Xueyang Wang, Nikhil Chawla, Neer Roggel, Bilgiday Yuce, Jason M. Fung:
Methodology of Assessing Information Leakage through Software-Accessible Telemetries. HOST 2021: 259-269 - [i4]Bilgiday Yuce, H. Fatih Ugurdag, Iskender Agi, Gokhan Guner, Vahap Baris Esen, Seyrani Korkmaz, I. Faik Baskaya, Günhan Dündar:
ACTreS: Analog Clock Tree Synthesis. CoRR abs/2108.12897 (2021) - 2020
- [i3]Bilgiday Yuce, Patrick Schaumont, Marc Witteman:
Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation. CoRR abs/2003.10513 (2020)
2010 – 2019
- 2019
- [j7]Bilgiday Yuce, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre, Leyla Nazhandali, Patrick Schaumont:
A Secure Exception Mode for Fault-Attack-Resistant Processing. IEEE Trans. Dependable Secur. Comput. 16(3): 388-401 (2019) - 2018
- [j6]Bilgiday Yuce, Patrick Schaumont, Marc Witteman:
Fault Attacks on Secure Embedded Software: Threats, Design, and Evaluation. J. Hardw. Syst. Secur. 2(2): 111-130 (2018) - [c13]Marjan Ghodrati, Bilgiday Yuce, Surabhi Gujar, Chinmay Deshpande, Leyla Nazhandali, Patrick Schaumont:
Inducing local timing fault through EM injection. DAC 2018: 142:1-142:6 - [c12]Yuan Yao, Mo Yang, Conor Patrick, Bilgiday Yuce, Patrick Schaumont:
Fault-assisted side-channel analysis of masked implementations. HOST 2018: 57-64 - 2017
- [j5]Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Harika Santapuri, Conor Patrick, Leyla Nazhandali, Patrick Schaumont:
Analyzing the Fault Injection Sensitivity of Secure Embedded Software. ACM Trans. Embed. Comput. Syst. 16(4): 95:1-95:25 (2017) - [c11]Chinmay Deshpande, Bilgiday Yuce, Leyla Nazhandali, Patrick Schaumont:
Employing dual-complementary flip-flops to detect EMFI attacks. AsianHOST 2017: 109-114 - 2016
- [j4]Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont:
Analyzing the Efficiency of Biased-Fault Based Attacks. IEEE Embed. Syst. Lett. 8(2): 33-36 (2016) - [j3]Patrick Schaumont, Bilgiday Yuce, Krishna Chaitanya Pabbuleti, Deepak Hanamant Mane:
Secure authentication with energy-harvesting: A multi-dimensional balancing act. Sustain. Comput. Informatics Syst. 12: 83-95 (2016) - [c10]Bilgiday Yuce, Nahid Farhady Ghalaty, Harika Santapuri, Chinmay Deshpande, Conor Patrick, Patrick Schaumont:
Software Fault Resistance is Futile: Effective Single-Glitch Attacks. FDTC 2016: 47-58 - [c9]Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Conor Patrick, Leyla Nazhandali, Patrick Schaumont:
FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response. HASP@ISCA 2016: 8:1-8:8 - [c8]Chinmay Deshpande, Bilgiday Yuce, Nahid Farhady Ghalaty, Dinesh Ganta, Patrick Schaumont, Leyla Nazhandali:
A Configurable and Lightweight Timing Monitor for Fault Attack Detection. ISVLSI 2016: 461-466 - [c7]Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. SAC 2016: 231-244 - [i2]Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont:
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy. IACR Cryptol. ePrint Arch. 2016: 850 (2016) - 2015
- [j2]Aydin Aysu, Bilgiday Yuce, Patrick Schaumont:
The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures. ACM Trans. Embed. Comput. Syst. 14(3): 43:1-43:18 (2015) - [c6]Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont:
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers. COSADE 2015: 174-188 - [c5]Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont:
Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization. FDTC 2015: 97-108 - [c4]Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont:
TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks. HOST 2015: 72-77 - [i1]Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont:
Analyzing the Efficiency of Biased-Fault Based Attacks. IACR Cryptol. ePrint Arch. 2015: 663 (2015) - 2014
- [j1]Bilgiday Yuce, H. Fatih Ugurdag, Sezer Gören, Günhan Dündar:
Fast and Efficient Circuit Topologies forFinding the Maximum of n k-Bit Numbers. IEEE Trans. Computers 63(8): 1868-1881 (2014) - [c3]Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont:
Differential Fault Intensity Analysis. FDTC 2014: 49-58 - 2013
- [c2]Bilgiday Yuce, H. Fatih Ugurdag, Sezer Gören, Günhan Dündar:
A Fast Circuit Topology for Finding the Maximum of N k-bit Numbers. IEEE Symposium on Computer Arithmetic 2013: 59-66 - [c1]Bilgiday Yuce, Seyrani Korkmaz, Vahap Baris Esen, Fatih Temizkan, Cihan Tunc, Gokhan Guner, I. Faik Baskaya, Iskender Agi, Günhan Dündar, H. Fatih Ugurdag:
Synthesis of clock trees for Sampled-Data Analog IC blocks. EWDTS 2013: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint