Publications & Patents

2011 – 2016

2016

US Patent Applications

Two patent applications have been filed recently by the Design-for-Excellence group directed by CCS-AD affiliate faculty Ozgur Sinanoglu. These inventions describe the implementation of provably secure Design-for-Trust mechanisms on a given chip design. One of the inventions describe SARLock, a logic encryption technique, while the other invention is on CamoPerturb, an IC camouflaging technique. Both techniques are resilient by construction to all the known attacks.

  • O. Sinanoglu, M. Yasin and J. Rajendran, “System, Method and Computer-Accessible Medium for IC Camouflaging for Minterm Protection”, U.S. Patent pending, filed June 2016.
  • O. Sinanoglu, M. Yasin and J. Rajendran, “System, Method and Computer-Accessible Medium for Satisfiability Attack Resistant Logic Locking”, U.S. Patent pending, filed Mar 2016.

Lectures/Presentations

  • C. Konstantinou, M. Sazos and M. Maniatakos Attacking the Smart Grid using Public Information IEEE Latin-American Test Symposium (LATS) 2016 (Awaiting publication)
  • A. Keliris, C. Konstantinou, N.G. Tsoutsos, R. Baiad and M. Maniatakos Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds 21st Asia and South Pacific Design Automation Conference (ASPDAC) 2016(IEEEXplore)
  • X. Duan, N. Freris and P. Cheng “Secure clock synchronization under collusion attacks.” Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing, Sep 2016.
  • N. Freris, “Towards a Secure Cloud: Distributed computing over encrypted data.” Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing, Sep 2016.
  • Darabseh, N. Freris, Y. Jararweh and M. Al-Ayyoub, “SDCache: Software Defined Data Caching Control for Cloud Services.” Invited paper accepted to the 4th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2016).
  • O. Sinanoglu, Two-hour lecture, “Regaining Trust in Integrated Circuits: Design-for-Trust”, Test Spring School, IEEE European Test Symposium, May 2016
  • O. Sinanoglu, GRC Technology Transfer e-Workshop (along with Jeyavijayan Rajendran from UT Dallas), “Hardware Security and Trust for Low-Power Wireless Sensor SoC’s”, April 2016
  • O. Sinanoglu, Keynote talk, “Do You Trust Your Chip?”, IEEE Design and Technology of Integrated Systems in Nanoscale Era, April 2016
  • P. Gupta, Panel member at M3AAWG (Messaging, Malware and Mobile Anti-Abuse Working Group) 2016, San Fransisco, Feb 2016.
  • C. Fachkha, “Darknet as a Source of Cyber Security,” ASIS Presentation, New York University in Abu Dhabi, April 2016.
  • C. Fachkha, “Cyber Security Platform,” Demo Presentation for UAE Cyber Security Day, New York University in Abu Dhabi, May 2016.
  • C. Fachkha, “Malware and Darknet Analytics,” Demo Presentation for the National Electronic Security Authority (NESA), May 2016.
  • Claude Fachkha, “Cyber Security Platform,” Demo Presentation for the National Bank of Abu Dhabi, New York University in Abu Dhabi, June 2016.

Publications

  • O. Mazonka, N.G. Tsoutsos and M. Maniatakos Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation IEEE Transactions on Information Forensics and Security (IEEEXplore) (Author version)
  • S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri Manufacturing and Security Challenges in 3D Printing JOM (Springer)
  • S. McLaughlin, C. Konstantinou, X. Wang, L. Davi, A. R. Sadeghi, M. Maniatakos and R. Karri The Cybersecurity Landscape in Industrial Control Systems Proceedings of the IEEE (IEEEXplore)

 

  • C. Konstantinou, M. Sazos, and M. Maniatakos. “Attacking the smart grid using public information.” 2016 17th Latin-American Test Symposium (LATS). IEEE, 2016.
  • A. Adam J., M. Dürmuth, and P. Gupta, Position Paper: “Measuring the Impact of Alphabet and Culture on Graphical Passwords,” In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Who Are You?! Adventures in Authentication Workshop, Menlo Park, US, June 2016
  • M. Balduzzi, P. Gupta, L. Gu, D. Gao and M. Ahamad, “MobiPot: Understanding Mobile Telephony Threats with Honeycards,” In Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016, Xian, China, May 2016
  • C. K. H. Suresh, B. Mazumdar, S. S. Ali and O. Sinanoglu, “A Comparative Security Analysis of Current and Emerging Technologies”, IEEE Micro (Sept/Oct Special Issue on Security), to appear 2016.
  • C. K. H. Suresh, B. Mazumdar, S. S. Ali and O. Sinanoglu, “A Comparative Security Analysis of Current and Emerging Technologies”, IEEE Micro (Sept/Oct Special Issue on Security), to appear 2016.
  • B. Srinivasan, P. Gupta, M. Antonakakis and M. Ahamad, “Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution,”
    In The 21st European Symposium on Research in Computer Security (ESORICS 2016), Greece, September 26-30, 2016
  • A. Darabseh, N. Freris, Y. Jararweh and M. Al-Ayyoub, “SDCache: Software Defined Data Caching Control for Cloud Services,” Invited paper accepted to the 4th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2016).
  • A. Adam J., M. Dürmuth, and P. Gupta, Position Paper: “Measuring the Impact of Alphabet and Culture on Graphical Passwords,” In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Who Are You?! Adventures in Authentication Workshop , Menlo Park, US, June 2016.
  • M. Balduzzi, P Gupta, L Gu, D. Gao and M. Ahamad, “MobiPot: Understanding Mobile Telephony Threats with Honeycards,” In Proceedings of the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2016, Xian, China, May 2016.
  • S. Taspinar, M. Mohanty, and N. Memon, “PRNU based source attribution with a collection of seam-carved images”, IEEE International Conference on Image Processing, Phonix, USA, 2016 [Accepted]
  • M. Mohanty, M. Rizwan Asghar, and G. Russello, “3DCrypt: Privacy–Preserving Pre-Classification Volume Ray-Casting of 3D Images in the Cloud”, In Data Security in Cloud Computing, IET, Chapter 8, 2016 [Accepted].
  • M. Mohanty, M. Rizwan Asghar, and G. Russello, “Image Scaling and Cropping in Encrypted Domains”, IEEE Transactions on Information Forensics and Security, 2016 [Accepted].
  • M. Mohanty, M. Rizwan Asghar, and G. Russello, “3DCrypt: Privacy-Preserving Pre-Classification Volume Ray-Casting of 3D Images in the Cloud”, International Conference on Security and Cryptography, Lisbon, Portugal, 2016 [Accepted].
  • O-A. Kristensen, M. Mohanty, P. K Atrey, “Don’t See Me, Just Edit Me: Towards Secure Cloud-based Video Editing”, Annual Symposium on Information Assurance, Albany, USA, 2016 [Accepted].
  • C. Fachkha, et al. “DDoS Analytics: Characterization and Amplification Estimation”. Annual Computer Security Applications Conference (ACSAC), 2016 [Submitted].
  • C. Fachkha, T. Keliris, N. Memon, M. Ahamad. “Investigating Modbus Internet Threat Activities”. 2016 [work in progress]
  • B. Mazumdar, S. S. Ali and O. Sinanoglu, “A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities”, ACM Transactions on Design Automation of Electronic Systems, to appear 2016.
  • S. S. Ali, M. Ibrahim, J. Rajendran, O. Sinanoglu, and K. Chakrabarty, “Supply-Chain Security of Digital Microfluidic Biochips”, IEEE Computer Magazine, to appear 2016. <Cover Feature>
  • B. Mazumdar, S. Saeed, S. S. Ali and O. Sinanoglu, “Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers”, IEEE Transactions on Emerging Topics in Computing (TETC), to appear 2016.
  • J. Rajendran, O. Sinanoglu and R. Karri, “Building Trustworthy Hardware Using Untrusted Components During High-Level Synthesis”, IEEE Transactions on Very Large Scale Integration Systems, to appear 2016.
  • S. Saeed and O. Sinanoglu, “A Comprehensive Design-for-Test Infrastructure In the Context Of Security-Critical Applications”, IEEE Design and Test, to appear 2016.
  • S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty and R. Karri, “Security Assessment of Cyberphysical Digital Microfluidic Biochips”, IEEE/ACM Transactions on Computational Biology and Bioinformatics, to appear 2016 (DOI: 10.1109/TCBB.2015.2509991).
  • M. Yasin, J. Rajendran, O.Sinanoglu and R. Karri, “On Improving the Security of Logic Locking”,IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2016 (DOI: 10.1109/TCAD.2015.2511144).
  • M. Yasin, B. Mazumdar, J. Rajendran and O. Sinanoglu, “CamoPerturb: Secure IC Camouflaging for Minterm Protection”, IEEE International Conference on Computer Aided Design (ICCAD), Austin TX, US, 2016.
  • C. K. H. Suresh, B. Mazumdar, S. S. Ali and O. Sinanoglu, “Power-Side-Channel Analysis of Carbon Nanotube FET Based Design”, IEEE International On-Line Testing Symposium (IOLTS), Sant Feliu de Guixos, Spain, 2016.
  • M. Yasin, B. Mazumdar, J. Rajendran and O. Sinanoglu, “SARLock: SAT Attack Resistant Logic Locking”,IEEE Hardware Oriented Security and Trust Conference (HOST), Washington DC, US, 2016.
  • Sk S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty and R. Karri, “Security Assessment of Cyberphysical Digital Microfluidic Biochips”, IEEE/ACM Transactions on Computational Biology and Bioinformatics, to appear 2016.
  • M. Yasin, J. Rajendran, O. Sinanoglu and R. Karri, “On Improving the Security of Logic Locking”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2016.
  • C. K. H. Suresh, O. Sinanoglu and S. Ozev, “Adapting to Varying Distributions of Unknown Response Bits”, ACM Transactions on Design Automation of Electronic Systems, to appear 2016.
  • S. Saeed, B. Mazumdar, Sk S. Ali and O. Sinanoglu, “Thwarting Timing Attacks on NEMS Relay Based Designs” IEEE VLSI Test Symposium (VTS), Las Vegas, NV, USA, 2016.
  • M. Yasin, S. Saeed, J. Rajendran and O. Sinanoglu, “Activation of Logic Encrypted Chips: Pre-Test or Post-Test?”, IEEE/ACM Design Automation Test in Europe Conference (DATE), Dresden, Germany, 2016.

2015

  • Karaküçük, A. E. Dirik, H. T. Sencar, N. Memon, Recent Advances in Counter PRNU Based Source Attribution and Beyond, SPIE 9409, Media Watermarking, Security, and Forensics 2015; March 2015. pdf
  •  

    H. Siadati, N. Memon, “Fortifying Android Patterns using Persuasive Security Framework,” Proceedings of UBICOMM, Accepted March 2015

  • A. Karaküҫük, AE. Dirik, HT. Sencar, ND. Memon “An overview of methods for countering PRNU based source attribution and beyond.” IS&T/SPIE Electronic Imaging,  February 2015
  • T. Halevi, N. Memon, “Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks” O Nov Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks, January 2015
  • A. Alattar, N. Memon, Edited proceedings: Media Watermarking, Security, and Forensics 2015. CD Heitzenrater Proc. of SPIE-IS&T Vol 9409, 940901-1
  • J. Rajendran, A. Ali, O. Sinanoglu, R. Karri: “Belling the CAD: Toward Security-Centric Electronic System Design.” IEEE Trans. on CAD of Integrated Circuits and Systems 34(11): 1756-1769, 2015.
  • X. Guo, C. Jin, C. Zhang, A. Papadimitriou, D. Hely and R. Karri: “Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?,” IEEE Transactions on  Emerging Topics in Computing, vol.PP, no.99, pp.1-1 doi: 10.1109/TETC.2015.2434103
  • X. Guo, D. Mukhopadhyay, C. Jin, R. Karri: “Security analysis of concurrent error detection against differential fault analysis.” Journal of Cryptographic Engineering 5(3): 153-169, 2015
  • J. Rajendran, R. Karri, J. B.Wendt, M. Potkonjak, N. R. McDonald, G. S. Rose, B. T. Wysocki: “Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications.” Proceedings of the IEEE 103(5): 829-849, 2015
  • A. K. Kanuparthi, R. Karri: “Reliable Integrity Checking in Multicore Processors,” ACM Transactions on Compiler Optimizations  12(2): 10, 2015
  • N. Karimi, A. K. Kanuparthi, X. Wang, O. Sinanoglu, R. Karri: “MAGIC: Malicious Aging in Circuits/Cores.” ACM Transactions on Compiler Optimizations 12(1): 5, 2015
  • J. Rajendran, R. Karri, G. S. Rose: “Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors.” IEEE Transactions on Computers 64(3): 733-746, 2015
  • J. Rajendran, H. Zhang, C. Zhang, G. S. Rose, Y. Pino, O. Sinanoglu, R. Karri: “Fault Analysis-Based Logic Encryption.” IEEE Transactions on Computers 64(2): 410-424, 2015
  • S. Kannan, N. Karimi, O. Sinanoglu, R. Karri: “Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures.” IEEE Transactions on CAD of Integrated Circuits and Systems 34(1): 2-15, 2015
  • Sk S. Ali, S. M. Saeed, O. Sinanoglu, R. Karri: “Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures.” IEEE Transactions on CAD of Integrated Circuits and Systems 34(5): 808-821, 2015
  • S. Kannan, N. Karimi, R. Karri, O. Sinanoglu: “Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor Memories.” IEEE Transactions on CAD of Integrated Circuits and Systems 34(5): 822-834, 2015
  • X. Wang, C Konstantinou, M. Maniatakos and R. Karri, “ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters,” Proceedings of IEEE ICCAD, November 2015
  • V. Jyothi, Sateesh K. Addepalli and R. Karri. “Deep Packet Field Extraction Engine (DPFEE): A Pre-processor for Network Intrusion Detection and Denial-of-Service Detection Systems,” Proceedings of IEEE ICCD, October 2015
  • Sk S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty and R. Karri, “Can Assay Outcomes of Digital Microfluidic Biochips be Manipulated?,” Proceedings of IEEE ICCD, October 2015
  • J. Backer, D. Hely and R. Karri, “On Enhancing the Debug Architecture of a System-on-Chip (SoC) to Detect Software Attacks, Proceedings of IEEE DFTS,” October 2015 (Nominated for Best Student Paper).
  • J. Backer, R. Karri, and D. Hely, “Secure Design-for-Debug for Systems- on-Chip,” Proceedings of IEEE International Test Conference, October 2015
  • J. Rajendran, V. Vedula, R. Karri: “Detecting malicious modifications of data in third-party intellectual property cores.” Proceedings of IEEE/ACM DAC pp. 112:1-112:6, June 2015.
  • X. Guo, N. Karimi, F. Regazzoni, C. Jin, R. Karri: “Simulation and analysis of negative-bias temperature instability aging on power analysis attacks.” Proceedings of IEEE/ACM HOST, pp. 124-129, May 2015.
  • A. DeTrano, S. Guilley, X. Guo, N. Karimi, R. Karri: “Exploiting small leakages in masks to turn a second-order attack into a first-order attack.” Proceedings of HASP@ISCA pp. 7:1-7:5, May 2015.
  • J. Backer, Sk S. Ali, K. Rosenfeld, D. Hély, O. Sinanoglu, R. Karri: “A secure design-for-test infrastructure for lifetime security of SoCs.” Proceedings of IEEE ISCAS, pp.  37-40, May 2015.
  • V. Vedula, J. Rajendran, A. Murugadhandayuthapany and R. Karri, “Security Verification of 3rd Party Intellectual Property Cores for Information Leakage,” in Proceedings of the GOMACTECH, March 2015
  • M. Vlachos, N. Freris and A. Kyrillidis, “Compressive Mining: Fast and Optimal Data Mining in the Compressed Domain.” International Springer Journal on Very Large Data Bases (the VLDB Journal), vol. 24(1), pp. 1-24, 2015. 
  • A. Zouzias and N. Freris, “Randomized Gossip Algorithms for Solving Laplacian Systems.” Proceedings of the 14th IEEE European Control Conference (ECC), pp. 1920-1925, July 2015. 
  • Chandra K. H. Suresh, Sule Ozev and Ozgur Sinanoglu, “Adaptive Generation of Unique IDs for Digital Chips Through Analog Excitation”, ACM Transactions on Design Automation of Electronic Systems, to appear 2015.
  • Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu and Ramesh Karri, “Modeling, Detection, and Diagnosis of Faults in Multi-level Memristor Memories”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2015.
  • Naghmeh Karimi, Arun Kanuparthi, Xueyang Wang, Ramesh Karri and Ozgur Sinanoglu, “MAGIC: Malicious Aging in Circuits/Cores”, ACM Transactions on Architecture and Code Optimization, to appear 2015.
  • Jeyavijayan Rajendran, Aman Ali, Ozgur Sinanoglu and Ramesh Karri, “Belling the CAD: Towards Security-Centric Electronic System Design”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2015.
  • Sk S. Ali, S. Saeed, O. Sinanoglu and R. Karri, “Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2015.
  • S. Kannan, N. Karimi, O. Sinanoglu and R. Karri, “Security Vulnerability of Emerging Non-volatile Main Memories and Countermeasures”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, to appear 2015.
  • J. Rajendran, H. Zhang, C. Zhang, G. Rose, Y. Pino, O. Sinanoglu and R. Karri, “Fault Analysis-based Logic Encryption”, IEEE Transactions on Computers, to appear 2015. (IEEE Early Access available DOI: 10.1109/TC.2013.193)  
  • M. Yasin and O. Sinanoglu, “Transforming Between Logic Locking and IC Camouflaging”, IEEE International Design and Test Symposium (IDT), Dead Sea, Jordan, 2015.
  • Sk S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty and R. Karri, “Can Assay Outcomes of Digital Microfluidic Biochips be Manipulated?”, IEEE International Conference on Computer Design (ICCD), New York, NY, USA, 2015.
  • M. Yasin, B. Mazumdar, Sk S. Ali and O. Sinanoglu, “Security Analysis of Logic Encryption Against the Most Effective Side-Channel Attack: DPA”, IEEE International Symposium on Defect and Fault Tolerance (DFTS),Amherst, MA, USA, 2015.
  • Sk S. Ali and O. Sinanoglu,  “Scan Attack on Elliptic Curve Cryptosystem”, IEEE International Symposium on Defect and Fault Tolerance (DFTS), Amherst, MA, USA, 2015.
  • S. Saeed, B. Mazumdar, Sk S. Ali and O. Sinanoglu, “Timing Attack on NEMS Relay Based Design of AES”, IEEE International Conference on Very Large Scale Integration (VLSI-SOC), Daejeon, South Korea, 2015.
  • B. Mazumdar, Sk S. Ali and O. Sinanoglu, “Power Analysis Attacks on ARX: An Application to Salsa20”, IEEE International On-Line Testing Symposium (IOLTS), Halkidiki, Greece, 2015.
  • Sk S. Ali and O. Sinanoglu,  “TMO: A New Class of Attack on Cipher Misusing Test Infrastructure”, IEEE VLSI Test Symposium (VTS), Napa, CA, USA, 2015.
  • J. Backer, R. Karri, Sk S. Ali, O. Sinanoglu and D. Hely “A Secure Design-for-Test Architecture to Thwart Attacks Throughout The Life Cycle of SoCs”, IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal, 2015.    
  • N.G. Tsoutsos and M. Maniatakos . “The HEROIC Framework: Encrypted Computation without Shared Keys.” In: Special Issue of IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  34.6 (2015), pp. 875 – 888
  • M. Maniatakos , M. Michael, and Y. Makris. “Multiple-Bit Upset Protection in Microprocessor Memory Arrays using Vulnerability-based Parity Optimization and Interleaving.” In: IEEE Transactions on VLSI  23.11 (2015), pp. 24472460
  • M. Maniatakos , M. Michael, C. Tirumurti, and Y. Makris. “Revisiting Vulnerability Analysis in Modern Microprocessors.” In: IEEE Transactions on Computers  64.9 (2015), pp. 26642674
  • N.G. Tsoutsos and M. Maniatakos. “Obfuscated Arbitrary Computation using Cryptographic Primitives.” In:  IEEE International Design and Test Symposium. 2015
  • C. Konstantinou and M. Maniatakos. “Impact of Firmware Modication Attacks on Power Systems Field Devices.” In:  IEEE International Conference on Smart Grid Communications. 2015
  • A. Keliris, V. Dimitsas, O. Kremmyda, D. Gizopoulos, and M. Maniatakos. “Ecient parallelization of the Discrete Wavelet Transform algorithm using memory oblivious optimizations.” In:  International Workshop on Power and Timing Modeling, Optimization and Simulation. 2015, pp. 2532 (Best paper award)
  • X. Wang, C. Konstantinou, R. Karri, and M. Maniatakos. “ConFirm: Detecting Firmware Modications in Embedded Systems using Hardware Performance Counters.” In: IEEE International Conference on Computer-Aided Design. 2015, pp. 544551
  • N.G. Tsoutsos and M. Maniatakos. “Extending Residue-based Fault Tolerance to Encrypted Computation.” In: IEEE International Test Conference. 2015, pp. 23.3.123.3.10
  • C. Konstantinou, M. Maniatakos, F. Saqib, S. Hu, J. Plusquellic, and Y. Jin. “Cyber-Physical Systems: A Security Perspective.” In: IEEE European Test Symposium. 2015, pp. 18
  • C. Konstantinou, A. Keliris, and M. Maniatakos, “Privacy-Preserving Functional IP Verication utilizing Fully Homomorphic Encryption.” In:  IEEE Design, Automation and Test in Europe. 2015, pp. 333338
  • H. Siadati, P. Gupta, S. Smith, M. Ahamad and N. Memon, “Fortifying Android Patterns using Persuasive Security Framework,” In The Ninth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) 2015, Nice, France, July 2015
  • P. Gupta, B. Srinivasan, V. Balasubramaniyan and M. Ahamad, Phoneypot: “Data-driven Understanding of Telephony Threats,” In Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS) 2015, San Diego, CA, USA , Feb 2015
  • T. Nelms, R. Perdisci, M. Antonakakis, M. Ahamad: “WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths.” USENIX Security 2015: 1025-1040.
  • A. Abouzied, J. Chen, “Harnessing Data Loss with Forgetful Data Structures,” ACM Symposium on Cloud Computing (SOCC), Hawaii, US, August 2015.
  • Y. Zaki, T. Pötsch, J. Chen, L. Subramanian, C. Görg, “Adaptive Congestion Control for Unpredictable Cellular Networks,” ACM Special Interest Group on Data Communication (SIGCOMM), London, UK, August 2015.
  • J. Chen, “Computing within Limits and ICTD,” First Workshop on Computing within Limits (LIMITS), Irvine, USA, June 2015.
  • I. Ghosh, J. Chen, J. Ming, A. Abouzied, “The Persistence of Paper: A Case Study in Microfinance from Ghana,”  Proceedings of the 7th International Conference on Information and Communication Technology for Development (ICTD), Singapore, May 2015.
  • J. Felipe-Beltran, A. Siddique, A. Abouzied, J. Chen, “Codo: Fundraising with Conditional Donations,”  ACM User Interface Software and Technology Symposium (UIST), Charlotte, US, November 2015.

2014

 

  • H. Corrigan-Gibbs, J. Chen, “FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions,” Proceedings of the Annual Symposium on Computing for Development (DEV), San Jose, USA, Dec 2014.
  • P. Gupta, M. Ahamad, J. Curtis, V. Balasubramaniyan and A. Bobotek, “M3AAWG Telephony Honeypots: Benefits and Deployment Options” In Messaging, Malware and Mobile Anti-Abuse Working Group (MAAWG), Aug 2014.
  • J. Chen, M. Paik, K. McCabe, “Exploring Internet Security Attitudes and Practices in Urban Ghana Proceedings of the Symposium On Usable Privacy and Security (SOUPs),” Menlo Park, USA, July 2014.
  • C. M. Tey, P. Gupta, K. Muralidharan and D. Gao, “Keystroke Biometrics: the user perspective,” In Proceedings of the fourth ACM conference on Data and Application Security and Privacy (CODASPY) 2014, San Antonio, TX, USA, Mar 2014.
  • S. S. Ali, S. M. Saeed, O. Sinanoglu, and R. Karri, “New Scan-Based Attack Using Only the Test Mode And An Input Corruption Countermeasure”, VLSI-SoC: From Algorithms to Circuits and System-on-Chip Design, edited by H. Fatih Ugurdag, Alex Orailoglu, Ricardo Reis, Martin Margala, Luigi Carro, L. Miguel Silveira, Springer, New York, USA, 2014.
  • S. S. Ali, X. Guo, D. Mukhopadhyay and R. Karri, “Differential Fault Attacks on AES and Their Countermeasures” In “Side and Covert Channels: Foundations and Applications”, edited by Miodrag Potkonjak and Yali Liu, Springer, New York, USA, 2014 Journal.
  • S. S. Ali, O. Sinanoglu, and R. Karri, “AES Design Space Exploration New Line for Scan Attack Resiliency,” IFIP/IEEE 22nd International Conference on Very Large Scale Integration (VLSI-SoC), Cancun, Mexico 2014.
  • S. M. Saeed, S. S. Ali, O. Sinanoglu, and R. Karri, “Novel Test-Mode-Only Scan Attack and Countermeasure for Contemporary Scan Architectures,” 2014 IEEE International Test Conference, ITC 2014 (accepted).
  • S. S. Ali, O. Sinanoglu, and R. Karri, “Test-Mode-Only Scan Attack Using The Boundary Scan Chain,” 19th IEEE European Test Symposium (ETS), 2014, p.1-6, Paderborn, Germany.
  • A. E. Dirik, H. T. Sencar and N. Memon, “Analysis of Seam-Carving Based Anonymization of Images Against PRNU Noise Pattern Based Source Attribution,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2277 – 2290, 2014.
  • S. S. Ali, S. M. Saeed, O. Sinanoglu, and R, Karri, “New Scan Attacks Against State-of-The-Art Countermeasures And DFT,” 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), p.142-147, Arlington, USA.
  • E. Uzun and H. T. Sencar, “A Preliminary Examination Technique for Audio Evidence to Distinguish Speech from Non-Speech Using Objective Speech Quality Measures,” Speech Communication, vol. 61, no. 6, pp. 1-16, 2014.
  • N. Sae-Bea, X. Sun, H. T. Sencar and N. Memon, “Automatic Detection of Explicit-like Child Images Using An Improved Skin Color Filter and New Facial Features,” Proc. of IEEE International Conference on Image Processing (ICIP), 2014.
  • S. Shang, H. T. Sencar, N. Memon and X. Kong “A semi-automatic Deshredding Method based on Curve Matching,” Proc. of IEEE International Conference on Image Processing (ICIP), 2014.
  • J. Rajendran, O. Sinanoglu and R. Karri, “Regaining Trust in VLSI Manufacturing: Design-for-Trust Techniques,” Proceedings of the IEEE, vol. 102, no. 8, pp. 1266-1282, 2014.

2013

  • E. Dirik, N. Memon, Selective Robust Image Encryption For Social Networks, Multimedia Communications, Services & Security (MCSS’13), June, 2013.
  • S. Bayram, H. T. Sencar, and N. Memon, “Seam-Carving Based Anonymization Against Image Video Source Attribution,” IEEE International Workshop on Multimedia Signal Processing, Oct. 2013.
  • Terry Nelms, Roberto Perdisci, Mustaque Ahamad,”ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates,” 22nd USENIX Security Symposium, Washington,DC, Aug. 2013.
  • S. Bayram, H. T. Sencar, and N. Memon, “Sensor Fingerprint Matching in 
Large Image and Video Databases,” Under Review.
  • S. Hicsonmez, E. Uzun, and H. T. Sencar, “Methods for Identifying Traces of Compression in Audio”, International Conference on Communications, Signal 
Processing, and their Applications (ICCSPA’13), Dubai, Feb. 2013.
  • S. Hicsonmez, H. T. Sencar and I. Avcibas “Audio Codec Identification from Coded and Transcoded Audios,” Elsevier Digital Signal Processing, 2013.
  • O. Sinanoglu, Y. Makris and R. Karri “Reconciling the Dichotomy Between 
Test and Security,” IEEE European Test Symposium, Avignon, France, 2013.
  • O. Sinanoglu, J. Rajendran, R. Karri, “Regaining Hardware Security and 
Trust,” IEEE Latin American Test Workshop, Cordoba, Argentina, 2013.
  • J. Rajendran, O. Sinanoglu, R. Karri, “Is Split Manufacturing Secure?,” IEEE/ACM Design Automation Test in Europe Conference, Grenoble, France, 2013.

2012

  • O. Sinanoglu, “Leveraging Testing Tools for Protecting Design IP”, IEEE International Test Conference, Anaheim, CA, USA, Elevator Talks Session, 2012. Presentation Only
  • J. Rajendran, Y. Pino, O. Sinanoglu and R. Karri, “Applying IC Testing Concepts To Secure ICs”, Government MicroCircuit Applications & Critical Technology Conference, Las Vegas, NV, USA, Paper 23.3, 2012.
  • J Rajendran, Y Pino, O Sinanoglu and R Karri, “Security Analysis for Logic Obfuscation”, ACM/IEEE Design Automation Conference, San Francisco, CA, US, June 2012.
  • J Rajendran, V Jyothi, O Sinanoglu and R Karri, “Design and Analysis of Ring Oscillator Based Design-for-Trust Technique”, IEEE VLSI Test Symposium, Dana Point, CA, USA, 2011.S Bayram, H T Sencar, N Memon, “Efficient Sensor Fingerprint Matching Through Fingerprint Binarization”, IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, Aug. 2012.
  • J Rajendran, Y Pino, O Sinanoglu and R Karri, “Applying IC Testing Concepts To Secure ICs”, Government MicroCircuit Applications & Critical Technology Conference, Las Vegas, NV, USA, Paper 23.3, March 2012.
  • J Rajendran, Y Pino, O Sinanoglu and R Karri, “Logic Encryption: A Fault Analysis Perspective”, IEEE/ACM Design Automation Test in Europe Conference, Dresden, Germany, March 2012.

2011

  • J Rajendran, V Jyothi, O Sinanoglu and R Karri, “Design and Analysis of Ring Oscillator Based Design-for-Trust Technique”, IEEE VLSI Test Symposium, Dana Point, CA, USA, 2011.