publication venue for Removal Attacks on Logic Locking and Camouflaging Techniques. 8:517-532. 2020 Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling. 2:461-472. 2014 Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. 1:307-318. 2013