Xuehui Zhang

Learn More
The modern integrated circuit (IC) manufacturing process has exposed chip designers to hardware Trojans which threaten circuits bound for critical applications. This paper details the implementation and analysis of a novel ring oscillator network technique for Trojan detection in an application specific integrated circuit (ASIC). The ring oscillator network(More)
OBJECTIVE To investigate whether the tag single nucleotide polymorphisms (tSNPs) in VSX1, COL4A3, COL4A4, IL1A and IL1B genes were associated with keratoconus (KTCN) in the Han Chinese population. METHODS Ninety-seven KTCN patients and 101 healthy controls were enrolled in this study. All cases were diagnosed on the basis of clinical examination.(More)
The intellectual property (IP) blocks are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed trusted as hardware Trojans can be maliciously inserted into them and could be used in military, financial and other critical applications. It is extremely difficult to detect Trojans in third-party IPs (3PIPs) simply with(More)
The counterfeiting of integrated circuits (ICs) has been on the rise over the past decade, impacting the security and reliability of electronic systems. Reports show that recovered ICs contribute to about 80% of all counterfeit ICs in the market today. Such ICs are recovered from scrapped boards of used devices. Identification of such counterfeit ICs is a(More)
The counterfeiting and recycling of integrated circuits (ICs) have become major issues in recent years, potentially impacting the security and reliability of electronic systems bound for military, financial, or other critical applications. With identical functionality and packaging, it would be extremely difficult to distinguish recycled ICs from unused(More)
Verifying the trustworthiness of Integrated Circuits (ICs) is of utmost importance, as hardware Trojans may destroy ICs bound for critical applications. A novel methodology combining on-chip structure with external current measurements is proposed to verify whether or not an IC is Trojan free. This method considers Trojans' impact on neighboring cells and(More)
Integrated circuits (ICs) are becoming increasingly vulnerable to malicious alterations, referred to as hardware Trojans. Detection of these inclusions is of utmost importance, as they may potentially be inserted into ICs bound for military, financial, or other critical applications. A novel on-chip structure including a ring oscillator network (RON),(More)
The counterfeiting and recycling of integrated circuits (ICs) have become major problems in recent years, potentially impacting the security of electronic systems bound for military, financial, or other critical applications. With identical functionality and packaging, it is extremely difficult to distinguish recovered ICs from unused ICs. A technique is(More)
A new and accurate method to quantitate aflatoxins in medicinal herbs is developed. This method consists of extraction of the sample with MeOH-H2O (70:30) followed by clean-up of the extracts with immunoaffinity columns and, finally, high-performance liquid chromatographic determination with fluorescence detection. Aflatoxins B1 and G1 are determined as(More)