default search action
Basel Halak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Basel Halak, Thomas Gibson, Millicent Henley, Cristin-Bianca Botea, Benjamin Heath, Sayedur Khan:
Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices. IEEE Access 12: 8791-8805 (2024) - [j28]Haoyu Wang, Jianjie Ren, Basel Halak, Ahmad Atamli:
GNS: Graph-Based Network-on-Chip Shield for Early Defense Against Malicious Nodes in MPSoC. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(3): 483-494 (2024) - [c43]Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli:
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs. DAC 2024: 98:1-98:6 - [c42]Peiyao Sun, Haosen Yu, Basel Halak, Tomasz Kazmierski:
A Method for Swift Selection of Appropriate Approximate Multipliers for CNN Hardware Accelerators. ISCAS 2024: 1-5 - [c41]Charles Hutchins, Leonardo Aniello, Enrico H. Gerding, Basel Halak:
MANET-Rank: A Framework for Defence Protocols against Packet Dropping Attacks in MANETs. NOMS 2024: 1-8 - [i12]Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli:
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs. CoRR abs/2403.13563 (2024) - [i11]Xiao Liu, Mark Zwolinski, Basel Halak:
SEA Cache: A Performance-Efficient Countermeasure for Contention-based Attacks. CoRR abs/2405.20027 (2024) - [i10]Basel Halak, Cristian Sebastian Csete, Edward Joyce, Jack Papaioannou, Alexandre Pires, Jin Soma, Betul Gokkaya, Michael Murphy:
A Security Assessment tool for Quantum Threat Analysis. CoRR abs/2407.13523 (2024) - 2023
- [c40]Haosen Yu, Peiyao Sun, Basel Halak, Karthik Shanthakumar, Tomasz Kazmierski:
Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator. AsianHOST 2023: 1-5 - [c39]Haoyu Wang, Basel Halak:
Hardware Trojan Detection and High-Precision Localization in NoC-Based MPSoC Using Machine Learning. ASP-DAC 2023: 516-521 - [c38]Callum Aitchison, Basel Halak, Alexander Serb, Themis Prodromakis:
A PUF Based on the Non-Linearity of Memristors. CSR 2023: 558-563 - [c37]Betul Gokkaya, Leonardo Aniello, Erisa Karafili, Basel Halak:
A Methodology for Cybersecurity Risk Assessment in Supply Chains. ESORICS Workshops (2) 2023: 26-41 - [c36]Shengkai Hu, Haoyu Wang, Basel Halak:
Cascaded Machine Learning Model Based DoS Attacks Detection and Classification in NoC. ISCAS 2023: 1-5 - [i9]Betul Gokkaya, Leonardo Aniello, Basel Halak:
Software supply chain: review of attacks, risk assessment strategies and security controls. CoRR abs/2305.14157 (2023) - 2022
- [j27]Basel Halak, Christian Hall, Syed Fathir, Nelson Kit, Ruwaydah Raymonde, Michael Gimson, Ahmad Kida, Hugo Vincent:
Toward Autonomous Physical Security Defenses Using Machine Learning. IEEE Access 10: 55369-55380 (2022) - [j26]Basel Halak, Yildiran Yilmaz, Daniel Shiu:
Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications. IEEE Access 10: 76707-76719 (2022) - [j25]Basel Halak, Yildiran Yilmaz, Daniel Shiu:
Comments and Corrections Correction to "Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications". IEEE Access 10: 118522 (2022) - [j24]Stephen Hart, Basel Halak, Vladimiro Sassone:
CIST: A Serious Game for Hardware Supply Chain. Comput. Secur. 122: 102912 (2022) - [c35]Peiyao Sun, Basel Halak, Tomasz Kazmierski:
Towards Hardware Trojan Resilient Design of Convolutional Neural Networks. SOCC 2022: 1-6 - [i8]Cato Pauling, Michael Gimson, Muhammed Qaid, Ahmad Kida, Basel Halak:
A Tutorial on Adversarial Learning Attacks and Countermeasures. CoRR abs/2202.10377 (2022) - 2021
- [j23]Leonardo Aniello, Basel Halak, Peter Chai, Riddhi Dhall, Mircea Mihalea, Adrian Wilczynski:
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF. Int. J. Inf. Sec. 20(3): 445-460 (2021) - [j22]Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski:
A Survey on the Susceptibility of PUFs to Invasive, Semi-Invasive and Noninvasive Attacks: Challenges and Opportunities for Future Directions. J. Circuits Syst. Comput. 30(11): 2130009:1-2130009:37 (2021) - [j21]Yildiran Yilmaz, Leonardo Aniello, Basel Halak:
ASSURE: A Hardware-Based Security Protocol for Resource-Constrained IoT Systems. J. Hardw. Syst. Secur. 5(1): 1-18 (2021) - [j20]Haider Muhi Abbas, Basel Halak, Mark Zwolinski:
Learning-based BTI stress estimation and mitigation in multi-core processor systems. Microprocess. Microsystems 81: 103713 (2021) - [j19]Yildiran Yilmaz, Viet-Hoa Do, Basel Halak:
ARMOR: An Anti-Counterfeit Security Mechanism for Low Cost Radio Frequency Identification Systems. IEEE Trans. Emerg. Top. Comput. 9(4): 2125-2138 (2021) - [i7]Stephen Hart, Basel Halak, Vladimiro Sassone:
MOTENS: A Pedagogical Design Model for Serious Cyber Games. CoRR abs/2110.11765 (2021) - 2020
- [j18]Robert Cockell, Basel Halak:
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics. Cryptogr. 4(2): 12 (2020) - [j17]Mohammed Al-daloo, Mohamed A. Abufalgha, Alex Yakovlev, Basel Halak:
Bootstrapped Driver and the Single-Event-Upset Effect. IEEE Trans. Circuits Syst. 67-I(10): 3309-3319 (2020) - [c34]Callum Aitchison, Roman Buckle, Alvin Ch'ng, Christian Clarke, Jacob Malley, Basel Halak:
On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology. ECCTD 2020: 1-4 - [c33]Basel Halak, Jorge Duarte-Sanchez:
Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon. SoCC 2020: 43-47
2010 – 2019
- 2019
- [j16]Ibrahim A. Bello, Basel Halak, Mohammed El-Hajjar, Mark Zwolinski:
VLSI Implementation of a Fully-Pipelined K-Best MIMO Detector with Successive Interference Cancellation. Circuits Syst. Signal Process. 38(10): 4739-4761 (2019) - [j15]Mohd Syafiq Mispan, Shengyu Duan, Basel Halak, Mark Zwolinski:
A reliable PUF in a dual function SRAM. Integr. 68: 12-21 (2019) - [c32]Elena-Ioana Vatajelu, Giorgio Di Natale, Mohd Syafiq Mispan, Basel Halak:
On the Encryption of the Challenge in Physically Unclonable Functions. IOLTS 2019: 115-120 - [c31]Miao Yu, Basel Halak, Mark Zwolinski:
Using Hardware Performance Counters to Detect Control Hijacking Attacks. IVSW 2019: 1-6 - [c30]Haibo Su, Basel Halak, Mark Zwolinski:
Two-Stage Architectures for Resilient Lightweight PUFs. IVSW 2019: 19-24 - [c29]Yildiran Yilmaz, Basel Halak:
A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices. IVSW 2019: 31-36 - [i6]Leonardo Aniello, Basel Halak, Peter Chai, Riddhi Dhall, Mircea Mihalea, Adrian Wilczynski:
Towards a Supply Chain Management System for Counterfeit Mitigation using Blockchain and PUF. CoRR abs/1908.09585 (2019) - [i5]Robert Cockell, Basel Halak:
On the Design and Analysis of a Biometric Authentication System using Keystroke Dynamics. CoRR abs/1909.10841 (2019) - 2018
- [j14]Basel Halak, Mohammed El-Hajjar, Ahmed Hassanein:
Hardware Efficient Architecture for Element-Based Lattice Reduction Aided K-Best Detector for MIMO Systems. J. Sens. Actuator Networks 7(2): 22 (2018) - [j13]Gaole Sai, Basel Halak, Mark Zwolinski:
Multi-Path Aging Sensor for Cost-Efficient Delay Fault Prediction. IEEE Trans. Circuits Syst. II Express Briefs 65-II(4): 491-495 (2018) - [j12]Shengyu Duan, Mark Zwolinski, Basel Halak:
Lifetime Reliability-Aware Digital Synthesis. IEEE Trans. Very Large Scale Integr. Syst. 26(11): 2205-2216 (2018) - [c28]Shengyu Duan, Basel Halak, Mark Zwolinski:
Cell Flipping with Distributed Refresh for Cache Ageing Minimization. ATS 2018: 98-103 - [c27]Mohd Syafiq Mispan, Haibo Su, Mark Zwolinski, Basel Halak:
Cost-efficient design for modeling attacks resistant PUFs. DATE 2018: 467-472 - [c26]Lai Leng Woo, Mark Zwolinski, Basel Halak:
Early detection of system-level anomalous behaviour using hardware performance counters. DATE 2018: 485-490 - [c25]Yildiran Yilmaz, Steve R. Gunn, Basel Halak:
Lightweight PUF-Based Authentication Protocol for IoT Devices. IVSW 2018: 38-43 - [c24]Haibo Su, Mark Zwolinski, Basel Halak:
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design. IVSW 2018: 52-55 - [c23]Mohd Syafiq Mispan, Shengyu Duan, Basel Halak, Mark Zwolinski:
A Reliable PUF in a Dual Function SRAM. PATMOS 2018: 76-81 - [c22]Ibrahim A. Bello, Basel Halak, Mohammed El-Hajjar, Mark Zwolinski:
Hardware Implementation of a Low-Power K-Best MIMO Detector Based on a Hybrid Merge Network. PATMOS 2018: 191-197 - 2017
- [j11]Tom Eccles, Basel Halak:
Performance Analysis of Secure and Private Billing Protocols for Smart Metering. Cryptogr. 1(3): 20 (2017) - [j10]Basel Halak:
Course on secure hardware design of silicon chips. IET Circuits Devices Syst. 11(4): 304-309 (2017) - [j9]Haider Muhi Abbas, Basel Halak, Mark Zwolinski:
BTI mitigation by anti-ageing software patterns. Microelectron. Reliab. 79: 79-90 (2017) - [c21]Gaole Sai, Basel Halak, Mark Zwolinski:
A cost-efficient delay-fault monitor. ISCAS 2017: 1-4 - [c20]Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski:
Lightweight obfuscation techniques for modeling attacks resistant PUFs. IVSW 2017: 19-24 - [c19]Elena Lai Leng Woo, Mark Zwolinski, Basel Halak:
Hardware performance counters for system reliability monitoring. IVSW 2017: 76-81 - [c18]Shengyu Duan, Basel Halak, Mark Zwolinski:
An ageing-aware digital synthesis approach. SMACD 2017: 1-4 - [i4]Tom Eccles, Basel Halak:
A Secure and Private Billing Protocol for Smart Metering. IACR Cryptol. ePrint Arch. 2017: 654 (2017) - 2016
- [j8]Ibrahim A. Bello, Basel Halak, Mohammed El-Hajjar, Mark Zwolinski:
A Survey of VLSI Implementations of Tree Search Algorithms for MIMO Detection. Circuits Syst. Signal Process. 35(10): 3644-3674 (2016) - [j7]Basel Halak, Vasileios Tenentes, Daniele Rossi:
The impact of BTI aging on the reliability of level shifters in nano-scale CMOS technology. Microelectron. Reliab. 67: 74-81 (2016) - [j6]Yang Lin, Mark Zwolinski, Basel Halak:
A Low-Cost, Radiation-Hardened Method for Pipeline Protection in Microprocessors. IEEE Trans. Very Large Scale Integr. Syst. 24(5): 1688-1701 (2016) - [c17]Shengyu Duan, Basel Halak, Rick Wong, Mark Zwolinski:
NBTI Lifetime Evaluation and Extension in Instruction Caches. ERMAVSS@DATE 2016: 9-12 - [c16]Illani Mohd Nawi, Basel Halak, Mark Zwolinski:
Ageing Impact on a High Speed Voltage Comparator with Hysteresis. ERMAVSS@DATE 2016: 25-29 - [c15]Haider Abbas, Mark Zwolinski, Basel Halak:
Static Aging Analysis Using 3-Dimensional Delay Library. ERMAVSS@DATE 2016: 34-37 - [c14]Illani Mohd Nawi, Basel Halak, Mark Zwolinski:
The influence of hysteresis voltage on single event transients in a 65nm CMOS high speed comparator. ETS 2016: 1-2 - [c13]Basel Halak, Mohammed El-Hajjar:
Plagiarism detection and prevention techniques in engineering education. EWME 2016: 1-3 - [c12]Basel Halak, Peter Wilson:
Design and evaluation of a system-on-a-chip course. EWME 2016: 1-6 - [c11]Mohammed Al-daloo, Alex Yakovlev, Basel Halak:
Energy efficient bootstrapped CMOS inverter for ultra-low power applications. ICECS 2016: 516-519 - [c10]Jiajing Cai, Basel Halak, Daniele Rossi:
Analysis of BTI aging of level shifters. IOLTS 2016: 17-18 - [c9]Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski:
NBTI aging evaluation of PUF-based differential architectures. IOLTS 2016: 103-108 - [c8]Basel Halak, Mark Zwolinski, Mohd Syafiq Mispan:
Overview of PUF-based hardware security solutions for the internet of things. MWSCAS 2016: 1-4 - [c7]Andrew Wightwick, Basel Halak:
Secure communication interface design for IoT applications using the GSM network. MWSCAS 2016: 1-4 - [i3]Basel Halak, Hsien-Chih Chiu:
Modified Micropipline Architecture for Synthesizable Asynchronous FIR Filter Design. CoRR abs/1603.04627 (2016) - [i2]Basel Halak, Said Subhan Waizi, Asad Islam:
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems. IACR Cryptol. ePrint Arch. 2016: 712 (2016) - 2015
- [c6]Basel Halak, Yizhong Hu, Mohd Syafiq Mispan:
Area efficient configurable physical unclonable functions for FPGAs identification. ISCAS 2015: 946-949 - [c5]Ibrahim A. Bello, Basel Halak, Mohammed El-Hajjar, Mark Zwolinski:
VLSI implementation of a scalable K-best MIMO detector. ISCIT 2015: 281-286 - 2014
- [j5]Basel Halak:
Partial coding algorithm for area and energy efficient crosstalk avoidance codes implementation. IET Comput. Digit. Tech. 8(2): 97-107 (2014) - [j4]Basel Halak, Teng Ma, Ximeng Wei:
A dynamic CDMA network for multicore systems. Microelectron. J. 45(4): 424-434 (2014) - [c4]Yang Lin, Mark Zwolinski, Basel Halak:
A low-cost radiation hardened flip-flop. DATE 2014: 1-6 - 2013
- [i1]Basel Halak, Julian P. Murphy, Alex Yakovlev:
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design. IACR Cryptol. ePrint Arch. 2013: 48 (2013) - 2012
- [c3]Julian P. Murphy, Máire O'Neill, Frank P. Burns, Alexandre V. Bystrov, Alexandre Yakovlev, Basel Halak:
Self-Timed Physically Unclonable Functions. NTMS 2012: 1-5 - 2011
- [j3]Basel Halak, Alexandre Yakovlev:
Statistical analysis of crosstalk-induced errors for on-chip interconnects. IET Comput. Digit. Tech. 5(2): 104-112 (2011) - 2010
- [j2]Basel Halak, Alexandre Yakovlev:
Throughput Optimization for Area-Constrained Links With Crosstalk Avoidance Methods. IEEE Trans. Very Large Scale Integr. Syst. 18(6): 1016-1019 (2010)
2000 – 2009
- 2008
- [j1]Basel Halak, Alexandre Yakovlev:
Fault-Tolerant Techniques to Minimize the Impact of Crosstalk on Phase Encoded Communication Channels. IEEE Trans. Computers 57(4): 505-519 (2008) - [c2]Basel Halak, Alexandre Yakovlev:
Bandwidth-Centric Optimisation for Area-Constrained Links with Crosstalk Avoidance Methods. DATE 2008: 438-443 - [c1]Basel Halak, Santosh Shedabale, Hiran Ramakrishnan, Alexandre Yakovlev, Gordon Russell:
The impact of variability on the reliability of long on-chip interconnect in the presence of crosstalk. SLIP 2008: 65-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint