Publications & Patents

2017

  • Ultra-low Power, Secure IoT Platform for Predicting Cardiovascular Diseases

    Mohammad Baker, Mohammed Ismail, Hani Saleh, Ozgur Sinanoglu, Temesghen Tekeste
    In: IEEE Transactions on Circuits and Systems I: Regular Papers; to appear 2017
  • A Software Defined Architecture for Cyberphysical Systems

    Ala’ Darabseh and Nikolaos M. Freris
    In: The Fourth International Conference on Software Defined Systems(SDS-2017); 2017
  • Software-Defined Control for IoT

    Ala’ Darabseh and Nikolaos M. Freris
    In: Cluster Computing; 2017
  • Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis

    C. Fachkha, E. Bou-Harb, A. Keliris, N. Memon, M. Ahamad
    In: Network & Distributed System Security (NDSS) Symposium; 2017
  • Privacy-Preserving Disease Susceptibility Test with Shamir’s Secret Sharing

    Guyu Fan and Manoranjan Mohanty
    In: SECRYPT 2017; 2017
  • Obligations for Social Media Companies

    Kakhidze, O., & Ramey, A. J.
    In: International Association for Computing and Philosophy; 2017
  • Demystifying Advanced Persistent Threats for Industrial Control Systems

    A. Keliris and M. Maniatakos
    In: American Society of Mechanical Engineers (ASME) Dynamic Systems & Control Magazine, vol. 5 no. 1; 2017
  • On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity

    Johann Knechtel and Ozgur Sinanoglu
    In: IEEE/ACM Design Automation Conference (DAC); 2017
  • On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity

    J. Knechtel and O. Sinanoglu
    In: Proc. Design Automation Conference (DAC); 2017
  • Large-Scale 3D Chips: Challenges and Solution for Design Automation, Testing, and Trustworthy Integration

    J. Knechtel, O. Sinanoglu, I. A. M. Elfadel, Jens Lienig, and Cliff C. N. Sze
    IPSJ Transactions on System LSI Design Methodology (TSLDM), Invited paper; 2017
  • Large-Scale 3D Chips: Challenges and Solution for Design Automation, Testing, and Trustworthy Integration

    Johann Knechtel, Ozgur Sinanoglu, Ibrahim Elfadel, Jens Lienig, and Cliff C. N. Sze
    In: IPSJ Transactions System LSI Design Methodology; to appear 2017
  • GPS Spoofing Effect on Phase Angle Monitoring and Control in an RTDS-based Hardware-In-The-Loop Environment

    Charalambos Konstantinou, Marios Sazos, Ahmed S. Musleh, Anastasis Keliris, Ahmed Al-Durra, Michail Maniatakos
    In: IET Cyber-Physical Systems: Theory & Applications. (In press) ; 2017
  • Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers

    Bodhisatwa Mazumdar, Samah Saeed, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE Transactions on Emerging Topics in Computing (TETC); to appear 2017
  • Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging

    Jeyavijayan Rajendran, Ozgur Sinanoglu, Muhammad Yasin
    In: IEEE Transactions on Information Forensics & Security; to appear 2017
  • The Risk of Cyber

    Ramey, A., Kakhidze, O., & AlKhzaimi, H
    In: Security in Automated Warfare; 2017
  • A Comprehensive Design-for-Test Infrastructure In the Context Of Security-Critical Applications

    Samah Saeed and Ozgur Sinanoglu
    In: IEEE Design and Test, vol. 34, no. 1, pp. 57-64; 2017
  • TTLock: Tenacious and Traceless Logic Locking

    Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE Hardware Oriented Security and Trust Conference (HOST); 2017
  • Security Analysis of Anti-SAT,

    Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE/ACM Asia South Pacific Design Automation Conference (ASPDAC); 2017
  • TTLock: Tenacious and Traceless Logic Locking

    Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE Hardware Oriented Security and Trust Conference (HOST); 2017
  • What to Lock? Functional and Parametric Locking

    Muhammad Yasin, Abhrajit Sengupta, Benjamin Carrion Schaefer, Yiorgos Makris, Ozgur Sinanoglu, and Jeyavijayan Rajendran
    In: ACM Great Lakes Symposium on VLSI (GLSVLSI); 2017
  • Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging

    Muhammad Yasin, Ozgur Sinanoglu and Jeyavijayan Rajendran
    In: IEEE Transactions on Information Forensics & Security; to appear 2017
  • Ultra-low Power, Secure IoT Platform for Predicting Cardiovascular Diseases

    Muhammad Yasin, Temesghen Tekeste, Hani Saleh, Baker Mohammad, Ozgur Sinanoglu and Mohammed Ismail
    In: IEEE Transactions on Circuits and Systems I: Regular Papers; to appear 2017
  • 2016

  • Two patent applications have been filed recently by the Design-for-Excellence group directed by CCS-AD affiliate faculty Ozgur Sinanoglu. These inventions describe the implementation of provably secure Design-for-Trust mechanisms on a given chip design. One of the inventions describe SARLock, a logic encryption technique, while the other invention is on CamoPerturb, an IC camouflaging technique. Both techniques are resilient by construction to all the known attacks.
  • System, Method and Computer-Accessible Medium for IC Camouflaging for Minterm Protection

    O. Sinanoglu, M. Yasin and J. Rajendran
    U.S. Patent pending, filed June 2016
  • System, Method and Computer-Accessible Medium for Satisfiability Attack Resistant Logic Locking

    O. Sinanoglu, M. Yasin and J. Rajendran
    U.S. Patent pending, filed Mar 2016
  • Supply-Chain Security of Digital Microfluidic Biochips

    Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty
    In: IEEE Computer Magazine, vol. 49, no. 8, pp. 36-43; 2016
  • Microfluidic Encryption of on-Chip Biochemical Assays

    Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty and Ramesh Karri
    In: IEEE Biomedical Circuits & Systems Conference; 2016
  • Security Assessment of Cyberphysical Digital Microfluidic Biochips

    Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty and Ramesh Karri
    In: IEEE/ACM Transactions on Computational Biology and Bioinformatic, vol. 13, no. 3, pp. 445-458; 2016
  • MobiPot: Understanding Mobile Telephony Threats with Honeycards

    M. Balduzzi, P. Gupta, L. Gu, D. Gao and M. Ahamad
    In: Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016; 2016
  • SDCache: Software Defined Data Caching Control for Cloud Services

    Ala’ Darabseh, Nikolaos Freris, Yaser Jararweh and Mahmoud Al-Ayyoub
    In: IEEE 4th International Conference on Future Internet of Things and Cloud; 2016
  • Secure clock synchronization under collusion attacks

    X. Duan, N. Freris and P. Cheng
    Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing; 2016
  • Darknet as a Source of Cyber Security

    C. Fachkha
    In: ASIS Presentation; 2016
  • Cyber Security Platform

    C. Fachkha
    Demo Presentation for UAE Cyber Security Day; 2016
  • Cyber Security Platform

    C. Fachkha
    Demo Presentation for the National Bank of Abu Dhabi; 2016
  • Malware and Darknet Analytics

    C. Fachkha
    Demo Presentation for National Electronic Security Authority (NESA); 2016
  • DDoS Analytics: Characterization and Amplification Estimation

    C. Fachkha, et al.
    In: Annual Computer Security Applications Conference (ACSAC); 2016
  • Investigating Modbus Internet Threat Activities

    C. Fachkha, T. Keliris, N. Memon, M. Ahamad
    Work in progress; 2016
  • Towards a Secure Cloud: Distributed computing over encrypted data

    N. Freris
    Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing; 2016
  • Messaging, Malware and Mobile Anti-Abuse Working Group

    P. Gupta
    In: M3AAWG; 2016
  • Measuring the Impact of Alphabet and Culture on Graphical Passwords

    A. Adam J., M. Durmuth, and P. Gupta
    In: Who Are You?! Adventures in Authentication Workshop, Twelfth Symposium on Usable Privacy and Security (SOUPS 2016); 2016
  • Remote Field Device Fingerprinting Using Device-Specific Modbus Information

    A. Keliris, M. Maniatakos
    In: IEEE International Midwest Symposium on Circuits and Systems (MWSCAS); 2016
  • Machine Learning-based Defense Against Process-Aware Attacks on Industrial Control Systems

    A. Keliris, H. Salehghaffari, B. Cairl, P. Krishnamurthy, M. Maniatakos, F. Khorrami
    In: IEEE International Test Conference (ITC; 2016
  • Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds

    A. Keliris, C. Konstantinou, N. Tsoutsos, R. Baiad, M. Maniatakos
    In: 21st Asia and South Pacific Design Automation Conference (ASPDAC); 2016
  • Taxonomy of Firmware Trojans in Smart Grid Devices

    C. Konstantinou, A. Keliris, M. Maniatakos
    In: Power & Energy Society General Meeting, (PES-GM); 2016
  • Attacking the smart grid using public information

    Charalambos Konstantinou, Marios Sazos, Michail Maniatakos
    In: 17th Latin-American Test Symposium (LATS); 2016
  • Don’t See Me, Just Edit Me: Towards Secure Cloud-based Video Editing

    O-A. Kristensen, M. Mohanty, P. K Atrey
    In: Annual Symposium on Information Assurance; 2016
  • A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation

    O. Mazonka, N.G. Tsoutsos and M. Maniatakos Cryptoleq
    In: IEEE Transactions on Information Forensics and Security; 2016
  • A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities

    Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: ACM Transactions on Design Automation of Electronic Systems, vol. 22, no. 1, pp. 11:1-11:26; 2016
  • Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers

    B. Mazumdar, S. Saeed, S. S. Ali and O. Sinanoglu
    In: IEEE Transactions on Emerging Topics in Computing (TETC); 2016
  • The Cybersecurity Landscape in Industrial Control Systems

    S. McLaughlin, C. Konstantinou, X. Wang, L. Davi, A. R. Sadeghi, M. Maniatakos and R. Karri
    In: Proceedings of the IEEE; 2016
  • 3DCrypt: Privacy-Preserving Pre-Classification Volume Ray-Casting of 3D Images in the Cloud

    Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
    In: International Joint Conference on e-Business and Telecommunications; 2016
  • 2DCrypt: Image Scaling and Cropping in Encrypted Domains

    Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
    In: IEEE Transactions on Information Forensics (TIFS), Pages: 1-14; 2016
  • 3DCrypt: Privacy-Preserving Pre-Classification Volume Ray-Casting of 3D Images in the Cloud

    Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello
    Accepted in the IET Book Data Security in Cloud Computing (Book Chapter); 2016
  • Building Trustworthy Hardware Using Untrusted Components During High-Level Synthesis

    Jeyavijayan Rajendran, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Very Large Scale Integration Systems, vol. 24, no. 9, pp. 2946-2959; 2016
  • Thwarting Timing Attacks on NEMS Relay Based Designs

    Samah Saeed, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE VLSI Test Symposium (VTS); 2016
  • Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

    B. Srinivasan, P. Gupta, M. Antonakakis and M. Ahamad
    In: The 21st European Symposium on Research in Computer Security (ESORICS 2016); 2016
  • Regaining Trust in Integrated Circuits: Design-for-Trust

    O. Sinanoglu
    In: IEEE European Test Symposium; 2016
  • Do You Trust Your Chip?

    O. Sinanoglu
    In: IEEE Design and Technology of Integrated Systems in Nanoscale Era; 2016
  • Hardware Security and Trust for Low-Power Wireless Sensor SoC’s

    O. Sinanoglu and Jeyavijayan Rajendran
    In: GRC Technology Transfer e-Workshop; 2016
  • A Comparative Security Analysis of Current and Emerging Technologies

    Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE Micro (Sept/Oct Special Issue on Security), vol. 36, no. 5, pp. 50-61; 2016
  • Power-Side-Channel Analysis of Carbon Nanotube FET Based Design

    Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE International On-Line Testing Symposium (IOLTS); 2016
  • Adaptive Generation of Unique IDs for Digital Chips Through Analog Excitation

    Chandra K. H. Suresh, Sule Ozev and Ozgur Sinanoglu
    In: ACM Transactions on Design Automation of Electronic Systems, vol. 20, no. 3, pp. 46:1-46:18; 2016
  • Adaptive Generation of Unique IDs for Digital Chips Through Analog Excitation

    Chandra K. H. Suresh, Sule Ozev and Ozgur Sinanoglu
    In: ACM Transactions on Design Automation of Electronic Systems, vol. 20, no. 3, pp. 46:1-46:18; 2016
  • Adapting to Varying Distributions of Unknown Response Bits

    C. K. H. Suresh, O. Sinanoglu and S. Ozev
    In: ACM Transactions on Design Automation of Electronic Systems; 2016
  • Source Camera Attribution Using Stabilized Video

    Samet Taspinar, Manoranjan Mohanty, Nasir Memon
    In: IEEE International Workshop on Information Forensics and Security (WIFS); 2016
  • PRNU Based Source Attribution with a Collection of Seam-Carved Images

    In: IEEE International Conference on Image Processing; 2016
  • Samet Taspinar, Manoranjan Mohanty, Nasir Memon
    ;
  • CamoPerturb: Secure IC Camouflaging for Minterm Protection

    Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE International Conference on Computer Aided Design (ICCAD); 2016
  • SARLock: SAT Attack Resistant Logic Locking

    Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE Hardware Oriented Security and Trust Conference (HOST); 2016
  • On Improving the Security of Logic Locking

    Muhammad Yasin, Jeyavijayan Rajendran, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 9, pp. 1411-1424; 2016
  • Activation of Logic Encrypted Chips: Pre-Test or Post-Test?

    Muhammad Yasin, Samah Saeed, Jeyavijayan Rajendran and Ozgur Sinanoglu
    In: IEEE/ACM Design Automation Test in Europe Conference (DATE); 2016
  • Manufacturing and Security Challenges in 3D Printing

    S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri
    In: JOM; 2016
  • 2015

  • Harnessing Data Loss with Forgetful Data Structures

    A. Abouzied and J. Chen
    In: ACM Symposium on Cloud Computing (SOCC); 2015
  • Edited proceedings: Media Watermarking, Security, and Forensics

    A. Alattar and N. Memon
    In: CD Heitzenrater Proc. of SPIE-IS&T Vol 9409, 940901-1; 2015
  • Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures

    Sk Subidh Ali, Samah Saeed, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 5, pp. 808-821; 2015
  • Scan Attack on Elliptic Curve Cryptosystem

    Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE International Symposium on Defect and Fault Tolerance (DFTS); 2015
  • TMO: A New Class of Attack on Cipher Misusing Test Infrastructure

    Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE VLSI Test Symposium (VTS); 2015
  • Can Assay Outcomes of Digital Microfluidic Biochips be Manipulated?

    Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty and Ramesh Karri
    In: IEEE International Conference on Computer Design (ICCD); 2015
  • A secure design-for-test infrastructure for lifetime security of SoCs.

    J. Backer, Sk S. Ali, K. Rosenfeld, D. Hely, O. Sinanoglu, R. Karri
    In: Proceedings of IEEE ISCAS, pp. 37-40; 2015
  • On Enhancing the Debug Architecture of a System-on-Chip (SoC) to Detect Software Attacks

    J. Backer, D. Hely and R. Karri
    In: Proceedings of IEEE DFTS; 2015
  • A Secure Design-for-Test Architecture to Thwart Attacks Throughout The Life Cycle of SoCs

    Jerry Backer, Ramesh Karri, Sk Subidh Ali, Ozgur Sinanoglu and David Hely
    In: IEEE International Symposium on Circuits and Systems (ISCAS); 2015
  • Secure Design-for-Debug for Systems- on-Chip

    J. Backer, R. Karri, and D. Hely
    In: Proceedings of IEEE International Test Conference; 2015
  • Computing within Limits and ICTD

    J. Chen
    In: First Workshop on Computing within Limits (LIMITS); 2015
  • Exploiting small leakages in masks to turn a second-order attack into a first-order attack

    A. DeTrano, S. Guilley, X. Guo, N. Karimi, R. Karri
    In: Proceedings of HASP@ISCA pp. 7:1-7:5; 2015
  • Codo: Fundraising with Conditional Donations

    J. Felipe-Beltran, A. Siddique, A. Abouzied, J. Chen
    In: ACM User Interface Software and Technology Symposium (UIST); 2015
  • The Persistence of Paper: A Case Study in Microfinance from Ghana

    I. Ghosh, J. Chen, J. Ming, A. Abouzied
    In: Proceedings of the 7th International Conference on Information and Communication Technology for Development (ICTD); 2015
  • Data-driven Understanding of Telephony Threats

    P. Gupta, B. Srinivasan, V. Balasubramaniyan and M. Ahamad, Phoneypot
    In Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS); 2015
  • Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?

    X. Guo, C. Jin, C. Zhang, A. Papadimitriou, D. Hely and R. Karri
    In: IEEE Transactions on Emerging Topics in Computing, vol.PP, no.99, pp.1-1 ; 2015
  • Simulation and analysis of negative-bias temperature instability aging on power analysis attacks

    X. Guo, N. Karimi, F. Regazzoni, C. Jin, R. Karri
    In: Proceedings of IEEE/ACM HOST, pp. 124-129; 2015
  • Security analysis of concurrent error detection against differential fault analysis

    X. Guo, D. Mukhopadhyay, C. Jin, R. Karri
    In: Journal of Cryptographic Engineering 5(3): 153-169; 2015
  • Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks

    T. Halevi and N. Memon
    In: Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks; 2015
  • Deep Packet Field Extraction Engine (DPFEE): A Pre-processor for Network Intrusion Detection and Denial-of-Service Detection Systems

    V. Jyothi, Sateesh K. Addepalli and R. Karri
    In: Proceedings of IEEE ICCD; 2015
  • Security Vulnerability of Emerging Non-volatile Main Memories and Countermeasures

    Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 1, pp. 2-15; 2015
  • Modeling, Detection, and Diagnosis of Faults in Multi-level Memristor Memories

    Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 5, pp. 822-834; 2015
  • Security Vulnerability of Emerging Non-volatile Main Memories and Countermeasures

    Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 1, pp. 2-15; 2015
  • Reliable Integrity Checking in Multicore Processors

    A. K. Kanuparthi, R. Karri
    In: ACM Transactions on Compiler Optimizations 12(2): 10; 2015
  • Recent Advances in Counter PRNU Based Source Attribution and Beyond

    Karakucuk, A. E. Dirik, H. T. Sencar, N. Memon
    In: SPIE 9409, Media Watermarking, Security, and Forensics; 2015
  • An overview of methods for countering PRNU based source attribution and beyond

    A. Karakucuk, AE. Dirik, HT. Sencar, ND. Memon
    In: IS&T/SPIE Electronic Imaging; 2015
  • MAGIC: Malicious Aging in Circuits/Cores

    Naghmeh Karimi, Arun Kanuparthi, Xueyang Wang, Ramesh Karri and Ozgur Sinanoglu
    In: ACM Transactions on Architecture and Code Optimization, vol. 12, no. 1, pp. 5:1-5:25; 2015
  • Ecient parallelization of the Discrete Wavelet Transform algorithm using memory oblivious optimizations

    A. Keliris, V. Dimitsas, O. Kremmyda, D. Gizopoulos, and M. Maniatakos
    In: International Workshop on Power and Timing Modeling, Optimization and Simulation, pp. 2532; 2015
  • Privacy-Preserving Functional IP Verication utilizing Fully Homomorphic Encryption

    C. Konstantinou, A. Keliris, and M. Maniatakos
    In: IEEE Design, Automation and Test in Europe, pp. 333338; 2015
  • Impact of Firmware Modication Attacks on Power Systems Field Devices

    C. Konstantinou and M. Maniatakos
    In: IEEE International Conference on Smart Grid Communications; 2015
  • Cyber-Physical Systems: A Security Perspective

    C. Konstantinou, M. Maniatakos, F. Saqib, S. Hu, J. Plusquellic, and Y. Jin
    In: IEEE European Test Symposium, pp. 18; 2015
  • Multiple-Bit Upset Protection in Microprocessor Memory Arrays using Vulnerability-based Parity Optimization and Interleaving

    M. Maniatakos , M. Michael, and Y. Makris
    In: IEEE Transactions on VLSI 23.11, pp. 24472460; 2015
  • Revisiting Vulnerability Analysis in Modern Microprocessors

    M. Maniatakos , M. Michael, C. Tirumurti, and Y. Makris
    In: IEEE Transactions on Computers 64.9, pp. 26642674; 2015
  • Power Analysis Attacks on ARX: An Application to Salsa20

    Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE International On-Line Testing Symposium (IOLTS); 2015
  • WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths

    T. Nelms, R. Perdisci, M. Antonakakis, M. Ahamad
    In: USENIX Security: 1025-1040; 2015
  • Belling the CAD: Towards Security-Centric Electronic System Design

    Jeyavijayan Rajendran, Aman Ali, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 11, pp. 1756-1769; 2015
  • Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors

    J. Rajendran, R. Karri, G. S. Rose
    In: IEEE Transactions on Computers 64(3): 733-746; 2015
  • Fault Analysis-based Logic Encryption

    Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett Rose, Youngok Pino, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Transactions on Computers, vol. 64, no. 2, pp. 410-425; 2015
  • Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications.

    J. Rajendran, R. Karri, J. B.Wendt, M. Potkonjak, N. R. McDonald, G. S. Rose, B. T. Wysocki
    In: Proceedings of the IEEE 103(5): 829-849; 2015
  • Detecting malicious modifications of data in third-party intellectual property cores

    J. Rajendran, V. Vedula, R. Karri
    In: Proceedings of IEEE/ACM DAC pp. 112:1-112:6; 2015
  • Timing Attack on NEMS Relay Based Design of AES

    Samah Saeed, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE International Conference on Very Large Scale Integration (VLSI-SOC); 2015
  • Fortifying Android Patterns using Persuasive Security Framework

    H. Siadati and N. Memon
    In: Proceedings of UBICOMM; 2015
  • The HEROIC Framework: Encrypted Computation without Shared Keys

    N.G. Tsoutsos and M. Maniatakos
    In: Special Issue of IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34.6, pp. 875 – 888; 2015
  • Obfuscated Arbitrary Computation using Cryptographic Primitives.

    N.G. Tsoutsos and M. Maniatakos
    In: IEEE International Design and Test Symposium; 2015
  • Extending Residue-based Fault Tolerance to Encrypted Computation

    N.G. Tsoutsos and M. Maniatakos
    In: IEEE International Test Conference, pp. 23.3.123.3.10; 2015
  • Security Verification of 3rd Party Intellectual Property Cores for Information Leakage

    V. Vedula, J. Rajendran, A. Murugadhandayuthapany and R. Karri
    In: Proceedings of the GOMACTECH; 2015
  • Compressive Mining: Fast and Optimal Data Mining in the Compressed Domain

    M. Vlachos, N. Freris and A. Kyrillidis
    In: International Springer Journal on Very Large Data Bases (the VLDB Journal), vol. 24(1), pp. 1-24; 2015
  • ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters

    X. Wang, C Konstantinou, M. Maniatakos and R. Karri
    In: Proceedings of IEEE ICCAD; 2015
  • Security Analysis of Logic Encryption Against the Most Effective Side-Channel Attack: DPA

    Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
    In: IEEE International Symposium on Defect and Fault Tolerance (DFTS); 2015
  • Transforming Between Logic Locking and IC Camouflaging

    Muhammad Yasin and Ozgur Sinanoglu
    In: IEEE International Design and Test Symposium (IDT); 2015
  • Adaptive Congestion Control for Unpredictable Cellular Networks

    Y. Zaki, T. Potsch, J. Chen, L. Subramanian, C. Gorg
    In: ACM Special Interest Group on Data Communication (SIGCOMM); 2015
  • Randomized Gossip Algorithms for Solving Laplacian Systems

    A. Zouzias and N. Freris
    In: Proceedings of the 14th IEEE European Control Conference (ECC), pp. 1920-1925; 2015
  • 2014

  • Differential Fault Attacks on AES and Their Countermeasures

    S. S. Ali, X. Guo, D. Mukhopadhyay and R. Karri
    In: Side and Covert Channels: Foundations and Applications, edited by Miodrag Potkonjak and Yali Liu, Springer; 2014
  • AES Design Space Exploration New Line for Scan Attack Resiliency

    Sk Subidh Ali, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE International Conference on Very Large Scale Integration (VLSI-SOC); 2014
  • New Scan Attacks Against State-of-the-art Countermeasures and DFT

    Sk Subidh Ali, Samah Saeed, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE Hardware Oriented Security and Trust Conference (HOST); 2014
  • New Scan-Based Attack Using Only the Test Mode And An Input Corruption Countermeasure

    S. S. Ali, S. M. Saeed, O. Sinanoglu, and R. Karri
    In: VLSI-SoC: From Algorithms to Circuits and System-on-Chip Design, edited by H. Fatih Ugurdag, Alex Orailoglu, Ricardo Reis, Martin Margala, Luigi Carro, L. Miguel Silveira, Springer; 2014
  • New Scan Attacks Against State-of-The-Art Countermeasures And DFT

    S. S. Ali, S. M. Saeed, O. Sinanoglu, and R, Karri
    In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), p.142-147; 2014
  • Test-Mode-Only Scan Attack Using the Boundary Scan Chain

    Sk Subidh Ali, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE European Test Symposium (ETS); 2014
  • Exploring Internet Security Attitudes and Practices in Urban Ghana

    J. Chen, M. Paik, K. McCabe
    In: Proceedings of the Symposium On Usable Privacy and Security (SOUPs),; 2014
  • FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions

    H. Corrigan-Gibbs, J. Chen
    In: Proceedings of the Annual Symposium on Computing for Development (DEV); 2014
  • Analysis of Seam-Carving Based Anonymization of Images Against PRNU Noise Pattern Based Source Attribution

    E. Dirik, H. T. Sencar, N. Memon
    In: IEEE Transactions on Information Forensics and Security, p. 2277 – 2290; 2014
  • M3AAWG Telephony Honeypots: Benefits and Deployment Options

    P. Gupta, M. Ahamad, J. Curtis, V. Balasubramaniyan and A. Bobotek
    In: Messaging, Malware and Mobile Anti-Abuse Working Group (MAAWG); 2014
  • Secure Memristor-Based Main Memory

    Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri and Ozgur Sinanoglu
    In: IEEE/ACM Design Automation Conference (DAC); 2014
  • Detection, Diagnosis, and Repair of Faults in Memristor-based Memories

    Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri and Ozgur Sinanoglu
    In: IEEE VLSI Test Symposium (VTS); 2014
  • Regaining Trust in VLSI Manufacturing: Design-for-Trust Techniques

    J. Rajendran, O. Sinanoglu and R. Karri
    In: Proceedings of the IEEE, vol. 102, no. 8, pp. 1266-1282; 2014
  • Regaining Trust in VLSI Manufacturing: Design-for-Trust Techniques

    Jeyavijayan Rajendran, Ozgur Sinanoglu and Ramesh Karri
    In: Proceedings of the IEEE, vol. 102, no. 8, pp. 1266-1282; 2014
  • Automatic Detection of Explicit-like Child Images Using An Improved Skin Color Filter and New Facial Features

    N. Sae-Bea, X. Sun, H. T. Sencar and N. Memon
    In: Proc. of IEEE International Conference on Image Processing (ICIP); 2014
  • DfT Support for Launch and Capture Power Reduction in Launch-Off-Shift and Launch-Off-Capture Testing

    Samah Saeed and Ozgur Sinanoglu
    In: IEEE Transactions on Very Large Scale Integration Systems, vol. 22, no. 3, pp. 516-521; 2014
  • DfST: Design for Secure Testability

    Samah Saeed and Ozgur Sinanoglu
    In: IEEE International Test Conference (ITC); 2014
  • Test-Mode-Only Scan Attack and Countermeasure for Contemporary Scan Architectures

    Samah Saeed, Sk Subidh Ali, Ozgur Sinanoglu and Ramesh Karri
    In: IEEE International Test Conference (ITC); 2014
  • A semi-automatic Deshredding Method based on Curve Matching

    S. Shang, H. T. Sencar, N. Memon and X. Kong
    In: Proc. of IEEE International Conference on Image Processing (ICIP); 2014
  • Keystroke Biometrics: the user perspective

    C. M. Tey, P. Gupta, K. Muralidharan and D. Gao
    In: Proceedings of the fourth ACM conference on Data and Application Security and Privacy (CODASPY); 2014
  • A Preliminary Examination Technique for Audio Evidence to Distinguish Speech from Non-Speech Using Objective Speech Quality Measures

    E. Uzun and H. T. Sencar
    In: Speech Communication, vol. 61, no. 6, pp. 1-16; 2014
  • 2013

  • Seam-Carving Based Anonymization Against Image Video Source Attribution

    S. Bayram, H. T. Sencar, and N. Memon
    In: IEEE International Workshop on Multimedia Signal Processing; 2013
  • Sensor Fingerprint Matching in _Large Image and Video Databases

    S. Bayram, H. T. Sencar, and N. Memon
    Under Review; 2013
  • Selective Robust Image Encryption For Social Networks

    E. Dirik and N. Memon
    In: Multimedia Communications, Services & Security (MCSS’13); 2013
  • Audio Codec Identification from Coded and Transcoded Audios

    S. Hicsonmez, H. T. Sencar and I. Avcibas
    In: Elsevier Digital Signal Processing; 2013
  • Methods for Identifying Traces of Compression in Audio

    S. Hicsonmez, E. Uzun, and H. T. Sencar
    International Conference on Communications, Signal _Processing, and their Applications (ICCSPA’13); 2013
  • ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates

    Terry Nelms, Roberto Perdisci, Mustaque Ahamad,
    In: 22nd USENIX Security Symposium; 2013
  • Is Split Manufacturing Secure?

    J. Rajendran, O. Sinanoglu, R. Karri
    In: IEEE/ACM Design Automation Test in Europe Conference; 2013
  • Reconciling the Dichotomy Between _Test and Security

    O. Sinanoglu, Y. Makris and R. Karri
    In: IEEE European Test Symposium; 2013
  • Regaining Hardware Security and Trust

    O. Sinanoglu, J. Rajendran, R. Karri
    In: IEEE Latin American Test Workshop; 2013
  • 2012

  • Efficient Sensor Fingerprint Matching Through Fingerprint Binarization

    S Bayram, H T Sencar, N Memon
    In: IEEE Transactions on Information Forensics and Security, vol. 7, no. 4; 2012
  • Design and Analysis of Ring Oscillator Based Design-for-Trust Technique

    J Rajendran, V Jyothi, O Sinanoglu and R Karri
    In: IEEE VLSI Test Symposium; 2012
  • Applying IC Testing Concepts To Secure ICs

    J Rajendran, Y Pino, O Sinanoglu and R Karri
    In: Government MicroCircuit Applications & Critical Technology Conference, Paper 23.3; 2012
  • Logic Encryption: A Fault Analysis Perspective

    J Rajendran, Y Pino, O Sinanoglu and R Karri
    In: IEEE/ACM Design Automation Test in Europe Conference; 2012
  • Security Analysis for Logic Obfuscation

    J Rajendran, Y Pino, O Sinanoglu and R Karri
    In: ACM/IEEE Design Automation Conference; 2012
  • Applying IC Testing Concepts To Secure ICs

    J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri
    In: Government MicroCircuit Applications & Critical Technology Conference, Paper 23.3; 2012
  • Leveraging Testing Tools for Protecting Design IP

    O. Sinanoglu
    In: IEEE International Test Conference; 2012
  • 2011

  • Design and Analysis of Ring Oscillator Based Design-for-Trust Technique

    J Rajendran, V Jyothi, O Sinanoglu and R Karri
    In: IEEE VLSI Test Symposium; 2011