Publication

Hardware SecurityHardware Trojans, Design for Hardware Trust, secure testing
PUF / IoTLightweight authentication for resource-constrained devices
MicroarchitectureProcessor/GPU security, leakage, side channels, covert channels

Processor and GPU security

Current postdoctoral research studies hidden vulnerabilities in modern processors and GPUs, including microarchitectural behavior, scheduling, memory systems, hardware performance events, and security-observable side effects.

Hardware Trojan detection

Doctoral research focused on efficient Design-for-Hardware-Trust methodologies for detecting malicious modifications introduced by untrusted foundries or third-party supply-chain actors.

PUF-based authentication

Research contributions include lightweight protocols and implementation-aware designs where physical uniqueness and low-cost hardware primitives support secure identification and authentication.

Security across abstraction layers

The long-term vision connects physical effects, digital circuits, RTL/ASIC design, microarchitecture, firmware, operating systems, and application-observable security behavior.

Publication list

Publications

A compact list of peer-reviewed papers. Use the filters to switch between research directions.

2023
JournalPUF / IoT

DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices

Abolfazl Sajadi, Ahmad Shabani, Bijan Alizadeh

Journal of Network and Computer Applications, 217, 103693

2022
JournalRF-PUF

A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things

Amir Ashtari, Ahmad Shabani, Bijan Alizadeh

Microprocessors and Microsystems, 93, 104600

2022
JournalHardware Trojan

Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme

Fatemeh Khormizi, Ahmad Shabani, Bijan Alizadeh

IEEE Transactions on Circuits and Systems II: Express Briefs, 69(6), 2937–2941

2021
JournalDetection / localization

SAT-Based Integrated Hardware Trojan Detection and Localization Approach Through Path-Delay Analysis

Mohammad Sabri Abrebekoh, Ahmad Shabani, Bijan Alizadeh

IEEE Transactions on Circuits and Systems II: Express Briefs, 68(8), 2850–2854

2021
JournalTest generation

Enhancing Hardware Trojan Detection Sensitivity Using Partition-Based Shuffling Scheme

Ahmad Shabani, Bijan Alizadeh

IEEE Transactions on Circuits and Systems II: Express Briefs, 68(1), 266–270

2021
JournalHEVC / DCT

Area and Power-Efficient Variable-Sized DCT Architecture for HEVC Using Muxed-MCM Problem

Ahmad Shabani, Mohammad Sabri Abrebekoh, Bahareh Khabbazan, Somayeh Timarchi

IEEE Transactions on Circuits and Systems I: Regular Papers, 68(3), 1259–1268

2020
JournalDesign for Trust

PODEM: A low-cost property-based design modification for detecting Hardware Trojans in resource-constraint IoT devices

Ahmad Shabani, Bijan Alizadeh

Journal of Network and Computer Applications, 167, 102713

2020
JournalMAX-SAT

PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability

Ahmad Shabani, Bijan Alizadeh

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(1), 25–33

2019
ConferenceRF-PUF

A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification

Amir Ashtari, Ahmad Shabani, Bijan Alizadeh

16th International ISC Conference on Information Security and Cryptology, 21–26

2019
JournalDCT architecture

Power and area efficient CORDIC-Based DCT using direct realization of decomposed matrix

Ahmad Shabani, Somayeh Timarchi, Hossein Mahdavi

Microelectronics Journal, 91, 11–21

2017
JournalLow-power DCT

Low-Power DCT-Based Compressor for Wireless Capsule Endoscopy

Ahmad Shabani, Somayeh Timarchi

Signal Processing: Image Communication, 59, 83–95

2015
JournalLow-power circuits

Low Power Parallel Prefix Adder Design Using Two Phase Adiabatic Logic

Alireza Hassanzadeh, Ahmad Shabani

Journal of Electrical and Electronic Engineering, 3(6), 181–186