User profiles for Basel Halak

Dr Basel Halak

Associate Professor,University of Southampton
Verified email at ecs.soton.ac.uk
Cited by 1335

Lightweight PUF-based authentication protocol for IoT devices

Y Yilmaz, SR Gunn, B Halak - 2018 IEEE 3rd international …, 2018 - ieeexplore.ieee.org
Conventional cryptographic solutions to the security are expensive in terms of computing
resources (memory and processing capacity) and power consumption. They are not suitable for …

[BOOK][B] Physically unclonable functions

B Halak - 2018 - Springer
Computing devices are increasingly forming an integral part of our daily life; this trend is driven
by the proliferation of the Internet of things (IoT) technology. By 2025, it is anticipated that …

Overview of PUF-based hardware security solutions for the Internet of Things

B Halak, M Zwolinski, MS Mispan - 2016 IEEE 59th …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained
devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is …

Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications

B Halak, Y Yilmaz, D Shiu - Ieee Access, 2022 - ieeexplore.ieee.org
Public key algorithms are heavily used in many digital applications including key establishment
schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arXiv preprint arXiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open-…

A tutorial on adversarial learning attacks and countermeasures

…, M Gimson, M Qaid, A Kida, B Halak - arXiv preprint arXiv …, 2022 - arxiv.org
Machine learning algorithms are used to construct a mathematical model for a system based
on training data. Such a model is capable of making highly accurate predictions without …

Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF

L Aniello, B Halak, P Chai, R Dhall, M Mihalea… - International Journal of …, 2021 - Springer
The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and
including many companies located in different countries, makes it challenging to assess the …

[BOOK][B] Ageing of integrated circuits: causes, effects and mitigation techniques

B Halak - 2019 - Springer
Basel Halak is the founder and director of the embedded system program at the University
of Southampton and a fellow of the royal academy of engineering. He is currently a member …

Plagiarism detection and prevention techniques in engineering education

B Halak, M El-Hajjar - 2016 11th European Workshop on …, 2016 - ieeexplore.ieee.org
Plagiarism seriously damages the education process in a number of ways, where it
prevents students from developing the skills of creative thinking and critical analysis and it …

Partial coding algorithm for area and energy efficient crosstalk avoidance codes implementation

B Halak - IET Computers & Digital Techniques, 2014 - Wiley Online Library
Modern interconnect performance is greatly affected by crosstalk noise because of continuous
decrease in wire separation and increase in its aspect ratio with technology scaling. Such …