Publications & Patents
2024
Beware your standard cells! on their role in static power side- channel attacks
J Bhandari, L Mankali, M Nabeel, O Sinanoglu, R Karri, J Knechtel
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Apr. 2024
Evaluating LLMs for Hardware Design and Test
J Blocklove, S Garg, R Karri, H Pearce
arXiv preprint arXiv:2405.02326; Apr. 2024
OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems
J Blocklove, M Raz, PB Roy, H Pearce, P Krishnamurthy, F Khorrami, R Karri
arXiv preprint arXiv:2404.15446; Apr. 2024
Verigen: A large language model for verilog code generation
S Thakur, B Ahmad, H Pearce, B Tan, B Dolan-Gavitt, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems, vol. 29, Issue 3, pp. 1-31; Apr. 2024
Identity-Aware Facial Age Editing Using Latent Diffusion
S Banerjee, G Mittal, A Joshi, SP Mullangi, C Hegde, N Memon
IEEE Transactions on Biometrics, Behavior, and Identity Science; Apr. 2024
A Subspace Projective Clustering Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Y Wang, W Li, E Sarkar, M Shafique, M Maniatakos, SE Jabari
IEEE Transactions on Artificial Intelligence; Mar. 2024
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
Christina Pöpper
Springer Nature; Mar. 2024
On Hardware Security Bug Code Fixes By Prompting Large Language Models
B Ahmad, S Thakur, B Tan, R Karri, H Pearce
IEEE Transactions on Information Forensics and Security ; Mar. 2024
(Security) Assertions by Large Language Models
R Kande, H Pearce, B Tan, B Dolan-Gavitt, S Thakur, R Karri, J Rajendran
IEEE Transactions on Information Forensics and Security; Mar. 2024
Mitigating the Impact of Attribute Editing on Face Recognition
S Banerjee, SP Mullangi, S Wagle, C Hegde, N Memon
arXiv preprint arXiv:2403.08092; Mar. 2024
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning- based Traffic Systems
Y Wang, W Li, M Maniatakos, SE Jabari
2024 Australian & New Zealand Control Conference (ANZCC), pp. 115-120; Feb. 2024
An Empirical Evaluation of LLMs for Solving Offensive Security Challenges
M Shao, B Chen, S Jancheska, B Dolan- Gavitt, S Garg, R Karri, M Shafique
arXiv preprint arXiv:2402.11814; Feb. 2024
MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation
S Acharya, HAU Khan, R Karri, Y Dvorkin
2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5; Feb. 2024
Grounding LLMs For Robot Task Planning Using Closed-loop State Feedback
V Bhat, AU Kaypak, P Krishnamurthy, R Karri, F Khorrami
arXiv preprint arXiv:2402.08546; Feb. 2024
Anomaly detection in real-time multi-threaded processes on embedded systems and devices using hardware performance counters and/or stack traces
F Khorrami, R Karri, P Krishnamurthy
US Patent App. 18/225,080
Make Every Move Count: LLM-based High-Quality RTL Code Generation Using MCTS
M DeLorenzo, AB Chowdhury, V Gohil, S Thakur, R Karri, S Garg, J Rajendran
arXiv preprint arXiv:2402.03289; Feb. 2024
Always be Pre-Training:Representation Learning for Network Intrusion Detection with GNNs
Z Gu, DT Lopez, L Alrahis, O Sinanoglu
arXiv preprint arXiv:2402.18986; Feb. 2024
Coherence Attacks and Countermeasures in Interposer-based Chiplet Systems
GA Chacon, C Williams, J Knechtel, O Sinanoglu, PV Gratz, V Soteriou
ACM Transactions on Architecture and Code Optimization 21 (2), pp. 1-25; Feb. 2024
Lightweight Masking Against Static Power Side-Channel Attacks
J Bhandari, M Nabeel, L Mankali, O Sinanoglu, R Karri, J Knechtel
arXiv preprint arXiv:2402.03196; Feb. 2024
AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response
G Mittal, A Jakobsson, KO Marshall, C Hegde, N Memon
arXiv preprint arXiv:2402.18085; Feb. 2024
ChIRAAG: ChatGPT Informed Rapid and Automated Assertion Generation
B Mali, K Maddala, S Reddy, V Gupta, C Karfa, R Karri
arXiv preprint arXiv:2402.00093 ; Jan. 2024
Silicon-proven ASIC design for the polynomial operations of Fully Homomorphic Encryption
M Nabeel, H Gamil, D Soni, M Ashraf, MA Gebremichael, E Chielle, R Karri, M Sanduleanu, M Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Jan. 2024
Retrieval-Guided Reinforcement Learning for Boolean Circuit Minimization
AB Chowdhury, M Romanelli, B Tan, R Karri, S Garg
arXiv preprint arXiv:2401.12205 ; Jan. 2024
Enabling digital manufacturing cyber-physical system for future manufacturing
N Gupta, R Karri ; Jan. 2024
NiLoPher: Breaking a Modern SAT- Hardened Logic-Locking Scheme via Power Analysis Attack
PB Roy, J Knechtel, A Saha, S Sreekumar, L Mankali, M Nabeel, D Mukhopadhyay, R Karri, O Sinanoglu
Cryptology ePrint Archive; 2024
Retrieval-Guided Reinforcement Learning for Boolean Circuit Minimization
A Basak Chowdhury, M Romanelli, B Tan, R Karri, S Garg
arXiv e-prints, arXiv: 2401.12205; Jan. 2024
HDCircuit: Brain-inspired Hyperdimensional Computing for Circuit Recognition
P Genssler, L Alrahis, O Sinanoglu, H Amrouch
Proceedings of the Conference on Design, Automation & Test in Europe (DATE); 2024
Global-liar: Factuality of llms over time and geographic regions
S Mirza, B Coelho, Y Cui, C Pöpper, D McCoy
arXiv preprint arXiv:2401.17839; Jan. 2024
Alpha-Wolves and Alpha-Mammals: Exploring Dictionary Attacks on Iris Recognition Systems
S Banerjee, A Jain, Z Jiang, N Memon, J Togelius, A Ross
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer, pp. 1072-1081; 2024
2023
RR Karn, J Knechtel, O Sinanoglu
IEEE Transactions on Circuits and Systems II: Express Briefs; Dec. 2023
UN-SPLIT: Attacking Split Manufacturing Using Link Prediction in Graph Neural Networks
L Alrahis, L Mankali, S Patnaik, A Sengupta, J Knechtel, O Sinanoglu
International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 197-213; Dec. 2023
Coherence Attacks and Countermeasures in Interposer- Based Chiplet Systems
GA Chacon, C Williams, J Knechtel, O Sinanoglu, PV Gratz, V Soteriou
ACM Transactions on Architecture and Code Optimization; Nov. 2023
Alleviating Barren Plateaus in Parameterized Quantum Machine Learning Circuits: Investigating Advanced Parameter Initialization Strategies
M Kashif, M Rashid, S Al-Kuwari, M Shafique
arXiv preprint arXiv:2311.13218; Nov. 2023
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications
H Benkraouda, A Agrawal, D Tychalas, M Sazos, M Maniatakos
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, pp. 83-89; Nov. 2023
Extending Browser Extension Fingerprinting to Mobile Devices
BH Kim, S Mirza, C Pöpper
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, pp. 141-146; Nov. 2023
Netlist Whisperer: AI and NLP Fight Circuit Leakage!
M Nair, R Sadhukhan, H Pearce, D Mukhopadhyay, R Karri
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware, pp . 83-92; Nov. 2023
A compact mode controller (switch) using an inverse-designed 2-mode y-junction
JE Villegas, MS Rasras
Journal of Lightwave Technology, DOI: 10.1109/JLT.2023.3327120; Nov. 2023
On the Vulnerability of Deep Reinforcement Learning to Backdoor Attacks in Autonomous Vehicles
Y Wang, E Sarkar, SE Jabari, M Maniatakos
Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging Challenges, pp. 315-341; Oct. 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network
A Bytes, PHN Rajput, C Doumanidis, M Maniatakos, J Zhou, NO Tippenhauer
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 499-512; Oct. 2023
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks
F Nikfam, R Casaburi, A Marchisio, M Martina, M Shafique
MDPI, vol. 14, issue 10, pp. 537; Oct. 2023
Bio-FP: Biochip Fingerprints for Authentication
NS Baban, S Saha, S Jancheska, J Zhou, S Vijayavenkataraman, S Bhattacharjee, YA Song, K Chakrabarty, R Karri
2023 IEEE Biomedical Circuits and Systems Conference (BioCAS), pp. 1-5; Oct. 2023
Biochip-PUF: Physically Unclonable Function for Microfluidic Biochips
NS Baban, A Orozaliev, YA Song, U Chatterjee, S Bose, S Bhattacharjee, R Karri, K Chakrabarty
2023 IEEE International Test Conference (ITC), pp. 166-175; Oct. 2023
Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review
L Niu, N Xue, C Pöpper
arXiv preprint arXiv:2309.05457; Sep. 2023
Shaheen: An Open, Secure, and Scalable RV64 SoC for Autonomous Nano-UAVs
L Valente, A Veeran, M Sinigaglia, YTortorella, A Nadalini, N Wistoff, B Sá, A Garofalo, R Psiakis, M Tolba, A Kulmala, N Limaye, O Sinanoglu, S Pinto, D Palossi, L Benini, B Mohammad, D Rossi
2023 IEEE Hot Chips 35 Symposium (HCS), pp. 1-12; Aug. 2023
Quantifying the Overheads of Modular Multiplication
D Soni, M Nabeel, N Neda, R Karri, M Maniatakos, B Reagen
2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED), pp. 1-6; Aug. 2023
Almost: Adversarial learning to mitigate oracle-less ml attacks via synthesis tuning
AB Chowdhury, L Alrahis, L Collini, J Knechtel, R Karri, S Garg, O Sinanoglu, B Tan
2023 60th ACM/IEEE Design Automation Conference (DAC), pp. 1-6; Jul. 2023
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses
H Ibrahim, F Liu, R Asim, B Battu, S Benabderrahmane, B Alhafni, M Maniatakos, M Rasras, B García de Soto…
Scientific Reports, vol. 13, issue 1, pp.12187; Jul. 2023
Cybersecurity Considerations for Deep Renovation
MS Sonkor, B García de Soto
Disrupting Buildings: Digitalisation and the Transformation of Deep Renovation, pp. 135-151; Jul. 2023
PerDoor: Persistent Backdoors in Federated Learning using Adversarial Perturbations
M Alam, E Sarkar, M Maniatakos
2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS), pp.1-6; Jul.2023
ShapeShifter: Protecting FPGAs from side-channel attacks with isofunctional heterogeneous modules
MM Ahmadi, L Alrahis, O Sinanoglu, M Shafique
2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 1-7; Jun. 2023
System, method, computer-accessible medium, and circuit for crippling the oracle in logic locking
O Sinanoglu
US Patent App. 17/923,674; Jun. 2023
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
E Bitsikas, T Schnitzler, C Pöpper, A Ranganathan
arXiv preprint arXiv:2306.07695; Jun. 2023
AutoLock: Automatic Design of Logic Locking with Evolutionary Computation
Z Wang, L Alrahis, D Sisejkovic, O Sinanoglu
arXiv preprint arXiv:2305.01840; May. 2023
HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
C Vasilatos, M Alam, T Rahwan, Y Zaki, M Maniatakos
arXiv preprint arXiv:2305.18226; May. 2023
Dissecting the Industrial Control Systems Software Supply Chain
C Doumanidis, Y Xie, PHN Rajput, R Pickren, B Sahin, S Zonouz, M Maniatakos
IEEE Security & Privacy; May. 2023
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
E Bitsikas, S Khandker, A Salous, A Ranganathan, R Piqueras Jover, C Pöpper
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 121-132; May. 2023
FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation
MM Ahmadi, L Alrahis, O Sinanoglu, M Shafique
arXiv preprint arXiv:2304.02510; Apr. 2023
Polarization encryption system using commercial LCDs for additive manufacturing
JE Villegas, YO Jimoh, M Rasras
Optics Continuum, vol. 2, issue 4, pp. 783-792; Apr. 2023
RPU: The Ring Processing Unit
D Soni, N Neda, N Zhang, B Reynwar, H Gamil, B Heyman, M Nabeel, AA Badawi, Y Polyakov, K Canida, M Pedram, M Maniatakos, DB Cousins, F Franchetti, M French, A Schmidt, B Reagen
2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 272-282; Apr. 2023
Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
M Alam, H Lamri, M Maniatakos
arXiv preprint arXiv:2304.10638; Apr. 2023
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation
DB Cousins, Y Polyakov, AA Badawi, M French, A Schmidt, A Jacob, B Reynwar, K Canida, A Jaiswal, C Mathew, H Gamil, N Neda, D Soni, M Maniatakos, B Reagen
arXiv preprint arXiv:2304.05237; Apr. 2023
Design Space Exploration of Modular Multipliers for ASIC FHE accelerators
D Soni, M Nabeel, H Gamil, O Mazonka, B Reagen, R Karri, M Maniatakos
2023 24th International Symposium on Quality Electronic Design (ISQED), pp. 1-8; Apr. 2023
Graph Neural Networks for Hardware Vulnerability Analysis–Can you Trust your GNN?
L Alrahis, O Sinanoglu
arXiv preprint arXiv:2303.16690; Mar. 2023
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Y Wang, W Li, M Maniatakos, SE Jabari
arXiv preprint arXiv:2303.14197; Mar. 2023
Benchmarking Advanced Security Closure of Physical Layouts: ISPD 2023 Contest
M Eslami, J Knechtel, O Sinanoglu, R Karri, S Pagliarini
Proceedings of the 2023 International Symposium on Physical Design, pp. 256-264; Mar. 2023
Security Closure of IC Layouts Against Hardware Trojans
F Wang, Q Wang, B Fu, S Jiang, X Zhang, L Alrahis, O Sinanoglu, J Knechtel, T-Yi Ho, E FY Young
Proceedings of the 2023 International Symposium on Physical Design, pp. 229-237; Mar. 2023
PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems
L Alrahis, S Patnaik, MA Hanif, M Shafique, O Sinanoglu
arXiv preprint arXiv:2303.14009; Mar. 2023
VIGILANT: Vulnerability Detection Tool against Fault-Injection Attacks for Locking Techniques
L Mankali, S Patnaik, N Limaye, J Knechtel, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2023
DNN-Alias: Deep Neural Network Protection Against Side-Channel Attacks via Layer Balancing
MM Ahmadi, L Alrahis, O Sinanoglu, M Shafique
arXiv preprint arXiv:2303.06746; Mar. 2023
ALMOST: Adversarial Learning to Mitigate Oracle-less ML Attacks via Synthesis Tuning
AB Chowdhury, L Alrahis, L Collini, J Knechtel, R Karri, S Garg, O Sinanoglu, B Tan
arXiv preprint arXiv:2303.03372; Mar. 2023
DNN-Alias: Deep Neural Network Protection Against Side-Channel Attacks via Layer Balancing
M Morid Ahmadi, L Alrahis, O Sinanoglu, M Shafique
arXiv e-prints, arXiv: 2303.06746; Mar. 2023
ALMOST: Adversarial Learning to Mitigate Oracle-less ML Attacks via Synthesis Tuning
AB Chowdhury, L Alrahis, L Collini, J Knechtel, R Karri, S Garg, O Sinanoglu, B Tan
arXiv e-prints, arXiv: 2303.03372
TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
H Lashen, L Alrahis, J Knechtel, O Sinanoglu
arXiv preprint arXiv:2301.11804; Jan. 2023
Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs
L Alrahis, J Knechtel, O Sinanoglu
Proceedings of the 28th Asia and South Pacific Design Automation Conference, pp. 83-90; Jan. 2023
Privacy-preserving cancer type prediction with homomorphic encryption
E Sarkar, E Chielle, G Gursoy, L Chen, M Gerstein, M Maniatakos
Nature Scientific Reports, vol. 13, issue 1, pp.1661; Jan. 2023
Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks
J Bhandari, L Mankali, M Nabeel, O Sinanoglu, R Karri, J Knechtel
Cryptology ePrint Archive; 2023
Benchmarking Advanced Security Closure of Physical Layouts
M Eslami, J Knechtel, O Sinanoglu, R Karri, S Pagliarini; 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network
A Bytes, PHN Rajput, C Doumanidis, NO Tippenhauer, M Maniatakos, J Zhou
Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID); 2023
ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code
C Doumanidis, PHN Rajput, M Maniatakos
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, pp. 60-71; 2023
Privacy-preserving machine learning for healthcare: open challenges and future perspectives
A Guerra-Manzanares, L Lopez, M Maniatakos, FE Shamout
ICLR 2023 Workshop on Trustworthy Machine Learning for Healthcare; 2023
Tactics, threats & targets: Modeling disinformation and its mitigation
S Mirza, L Begum, L Niu, S Pardo, A Abouzied, P Papotti, C Pöpper
ISOC Network and Distributed Systems Security Symposium (NDSS); 2023
Material-level countermeasures for securing microfluidic biochips
NS Baban, S Saha, S Jancheska, I Singh, S Khapli, M Khobdabayev, J Kim, S Bhattacharjee, YA Song, K Chakrabarty, R Karri
Lab on a Chip, vol. 23, issue 19, pp. 4213-4231; 2023
CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution
M Nabeel, D Soni, M Ashraf, MA Gebremichael, H Gamil, E Chielle, R Karri, M Sanduleanu, M Maniatakos
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE); 2023
2022
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs
PHN Rajput, C Doumanidis, M Maniatakosar
Xiv preprint arXiv:2206.00402; Dec. 2022
RESCUE: Resilient, Scalable, High-corruption, Compact-Key-Set Locking Framework
N Limaye, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Dec. 2022
Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
L Alrahis, J Knechtel, O Sinanoglu
arXiv preprint arXiv:2211.16495; Nov. 2022
X-Volt: Joint Tuning of Driver Strengths and Supply Voltages Against Power Side-Channel Attacks
S Sreekumar, M Ashraf, M Nabeel, O Sinanoglu, J Knechtel
arXiv preprint arXiv:2211.08046; Nov. 2022
Security Closure of IC Layouts Against Hardware Trojans
F Wang, Q Wang, B Fu, S Jiang, X Zhang, L Alrahis, O Sinanoglu, J Knechtel, T-Yi Ho, E FY Young
arXiv preprint arXiv:2211.07997; Nov. 2022
Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
L Mankali, L Alrahis, S Patnaik, J Knechtel, O Sinanoglu
IEEE Transactions on Information Forensics and Security, vol.18, pp. 304-318; Oct. 2022
AppGNN: Approximation-Aware Functional Reverse Engineering using Graph Neural Networks
T Bücher, L Alrahis, G Paim, S Bampi, O Sinanoglu, H Amrouch
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided, pp. 1-9; Oct. 2022
Fast and Compact Interleaved Modular Multiplication Based on Carry Save Addition
O Mazonka, E Chielle, D Soni, M Maniatakos
arXiv preprint arXiv:2206.00402; Oct. 2022
Embracing Graph Neural Networks for Hardware Security
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, pp. 1-9; Oct. 2022
Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation
L Mankali, N Rangarajan, S Chatterjee, S Kumar, Y S Chauhan, O Sinanoglu, H Amrouch
IEEE Journal on Exploratory Solid-State Computational Devices and Circuits, Vol. 8, issue 2, pp. 102-110; Oct. 2022
Hardware Trojan Threats to Cache Coherence in Modern 2.5 D Chiplet Systems
GA Chacon, C Williams, J Knechtel, O Sinanoglu, PV Gratz
IEEE Computer Architecture Letters, Vol. 21, issue 2, pp. 133-136; Oct. 2022
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator
S Chatterjee, N Rangarajan, S Patnaik, D Rajasekharan, O Sinanoglu, YS Chauhan
IEEE Transactions on Emerging Topics in Computing; Oct. 2022
Hide and seek: Seeking the (un)-hidden key in provably-secure logic locking techniques
S Patnaik, N Limaye, O Sinanoglu
IEEE Transactions on Information Forensics and Security Vol. 17, pp. 3290-3305; Sep. 2022
GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
L Alrahis, J Knechtel, F Klemme, H Amrouch, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 41, issue 11, pp. 3826-2837; Aug. 2022
A Novel Attack Mode on Advanced Technology Nodes Exploiting Transistor Self-Heating
N Rangarajan, J Knechtel, N Limaye, O Sinanoglu, H Amrouch
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 41, issue 11, pp. 4134-4144; Aug. 2022
NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
MM Ahmadi, L Alrahis, A Colucci, O Sinanoglu, M Shafique
2022 International Joint Conference on Neural Networks (IJCNN), arXiv e-prints, pp. arXiv: 2206.00402; Jun. 2022
SCRAMBLE: A Secure and Configurable, Memristor-Based Neuromorphic Hardware Leveraging 3D Architecture
N Rangarajan, S Patnaik, M Nabeel, M Ashraf, S Rai, G Raut, H Abunahla, B Mohammad, S K Vishvakarma, A Kumar, J Knechtel, O Sinanoglu
2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 308-313; Jul. 2022
Design-time exploration of voltage switching against power analysis attacks in 14 nm FinFET technology
J Knechtel, T Ashraf, N Fernengel, S Patnaik, M Nabeel, M Ashraf, O Sinanoglu, H Amrouch
Integration, vol. 85, pp. 27-34; Jul. 2022
Design-time exploration of voltage switching against power analysis attacks in 14 nm FinFET technology
J Knechtel, T Ashraf, N Fernengel, S Patnaik, M Nabeel, M Ashraf, O Sinanoglu, H Amrouch
Integration, vol. 85, pp. 27-34; Jul. 2022
NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
MM Ahmadi, L Alrahis, A Colucci, O Sinanoglu, M Shafique
arXiv preprint arXiv:2206.00402; Jun. 2022
You have been warned: Abusing 5G’s Warning and Emergency Systems
E Bitsikas, C Pöpper
arXiv preprint arXiv:2207.02506; Jul. 2022
NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
M Morid Ahmadi, L Alrahis, A Colucci, O Sinanoglu, M Shafique
arXiv e-prints, pp. arXiv: 2206.00402; Jun. 2022
A new paradigm in split manufacturing: Lock the FEOL, unlock at the BEOL
A Sengupta, M Nabeel, M Ashraf, J Knechtel, O Sinanoglu
Cryptography, vol. 6, issue 2, pp. 22; May. 2022
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations
M Alam, E Sarkar, M Maniatakos
arXiv preprint arXiv:2205.13523; May. 2022
Towards Security-Optimized Placement of ADS-B Sensors
A Darabseh, C Pöpper
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 39-44; May. 2022
Benchmarking Security Closure of Physical Layouts: ISPD 2022 Contest
J Knechtel, J Gopinath, M Ashraf, J Bhandari, O Sinanoglu, R Karri
Proceedings of the 2022 International Symposium on Physical Design, pp. 221-228; Apr. 2022
FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chainusing stateful system-level fuzzing
A Bytes, PHN Rajput, M Maniatakos, J Zhou
arXiv preprint arXiv:2204.13499; Apr. 2022
Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic
E Chielle, O Mazonka, H Gamil, M Maniatakos
arXiv preprint arXiv:2204.12201; Apr. 2022
CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution
M Nabeel, D Soni, M Ashraf, MA Gebremichael, H Gamil, E Chielle, R Karri, M Sanduleanu, M Maniatakos
arXiv preprint arXiv:2204.08742; Apr. 2022
Scalable privacy-preserving cancer type prediction with homomorphic encryption
E Sarkar, E Chielle, G Gursoy, L Chen, M Gerstein, M Maniatakos
arXiv preprint arXiv:2204.05496; Apr. 2022
MuxLink: circumventing learning-resilient MUX-locking using graph neural network-based link prediction
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 694-699; Mar. 2022
PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Y Wang, W Li, E Sarkar, M Shafique, M Maniatakos, SE Jabari
arXiv preprint arXiv:2203.09289; Mar. 2022
Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking
N Limaye, S Patnaik, O Sinanoglu
IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 744-759; Feb. 2022
ICSML: Industrial Control Systems Machine Learning inference framework natively
C Doumanidis, PHN Rajput, M Maniatakos
arXiv preprint arXiv:2202.10075; Feb. 2022
Privacy-preserving genotype imputation with fully homomorphic encryption
G Gürsoy, E Chielle, CM Brannon, M Maniatakos, M Gerstein
Cell Systems, vol. 13, issue 2, pp. 173-182. e3; Feb. 2022
HPC-based Malware Detectors Actually Work: Transition to Practice After a Decade of
C Konstantinou, X Wang, P Krishnamurthy, F Khorrami, M Maniatakos, R Karri
IEEE Design & Test; Jan. 2022
2021
D Rajasekharan, N Rangarajan, S Patnaik, O Sinanoglu, YS Chauhan
IEEE transactions on neural networks and learning systems; Dec. 2021
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
arXiv preprint arXiv:2112.07178; Dec. 2021
Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
N Limaye, AB Chowdhury, C Pilato, M Nabeel, O Sinanoglu, S Garg, R Karri
2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 91-96; Dec. 2021
SuperVAULT: Superparamagnetic Volatile AUxiLiary Tamper-Proof Storage
N Rangarajan, J Knechtel, D Rajasekharan, O Sinanoglu
IEEE Embedded Systems Letters, Nov. 2021
Security Closure of Physical Layouts ICCAD Special Session Paper
J Knechtel, J Gopinath, J Bhandari, M Ashraf, H Amrouch, S Borkar, S-Kyu Lim, O Sinanoglu, R Karri
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1-9; Nov. 2021
Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper
J Lienig, S Rothe, M Thiele, N Rangarajan, M Ashraf, M Nabeel, H Amrouch, O Sinanoglu, J Knechtel
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1-9; Nov. 2021
UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction
L Alrahis, S Patnaik, MA Hanif, M Shafique, O Sinanoglu
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp.1-9; Nov. 2021
OMLA: An Oracle-less Machine Learning-based Attack on Logic Locking
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
IEEE Transactions on Circuits and Systems II: Express Briefs; Sep. 2021
Digitally-Assisted Mixed-Signal Circuit Security
J Leonhard, N Limaye, S Turk, A Sayed, ARD Rizo, H Aboushady, O Sinanoglu, H-G Stratigopoulos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2021
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
L Alrahis, A Sengupta, J Knechtel, S Patnaik, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2021
Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems
Y Wang, E Sarkar, W Li, M Maniatakos, SE Jabari
IEEE Transactions on Information Forensics and Security; Sep. 2021
GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-based Oracle-less Unlocking Schemes for Provably Secure Logic Locking
L Alrahis, S Patnaik, MA Hanif, H Saleh, M Shafique, O Sinanoglu
IEEE Transactions on Emerging Topics in Computing, issue 01, pp. 1-1; Sep. 2021
AntiDOTE: Protecting Debug against Outsourced Test Entities
N Limaye, C Wachsmann, M Nabeel, M Ashraf, A Kanuparthi, O Sinanoglu
IEEE Transactions on Emerging Topics in Computing; Aug. 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
E Sarkar, M Maniatakos
arXiv preprint arXiv:2108.10132; Aug. 2021
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
A Sengupta, N Limaye, O Sinanoglu
IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 418-440; July. 2021
Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption
E Sarkar, E Chielle, G Gürsoy, O Mazonka, M Gerstein, M Maniatakos
IEEE Access, vol. 9, pp. 93097-93110; Jun. 2021
PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans
N Limaye, N Rangarajan, S Patnaik, O Sinanoglu, K Basu
IEEE Transactions on Emerging Topics in Computing, issue 01, pp. 1-1; Jun. 2021
Cybersecurity in construction: Where do we stand and how do we get better prepared
Bharadwaj RK Mantha, Borja García de Soto
Frontiers in Built Environment, vol. 7, pp. 612668; May. 2021
Interposer-Based Root of Trust
T Mandal, G Chacon, J Knechtel, O Sinanoglu, P Gratz, V Soteriou
arXiv preprint arXiv:2105.02917; May. 2021
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security
Christina Pöpper
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, pp. 3-4; May. 2021
System, method and computer-accessible medium for stripped-functionality logic locking
O Sinanoglu, J Rajendran, M Yasin
US Patent 10,990,580; Apr. 2021
Guest Editorial: Special Issue On Emerging Technologies in Computer Design
O Sinanoglu, U Ogras
IEEE Transactions on Emerging Topics in Computing, vol. 9, issue. 1, pp. 5-6; Mar. 2021
Cyber security research in the Arab region: a blooming ecosystem with global ambitions
Christina Pöpper, Michail Maniatakos, Roberto Di Pietro
Communications of the ACM, vol. 64, issue. 4, pp.96-101 ; Mar. 2021
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
L Alrahis, S Patnaik, J Knechtel, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2508-2523; Feb. 2021
Towards Non-intrusive Malware Detection for Industrial Control Systems
PHN Rajput, M Maniatakos
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1703-1706; Feb. 2021
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance
K Jansen, L Niu, N Xue, I Martinovic, C Pöpper
Proceedings of the Network and Distributed System Security Symposium (NDSS); Feb. 2021
Concerted wire lifting: Enabling secure and cost-effective split manufacturing
S Patnaik, M Ashraf, H Li, J Knechtel, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Feb. 2021
A Cross-Layer Framework For Cost-Effective Intellectual Property (IP) Protection
Farinaz Koushanfar, Jeyavijayan Rajendran, Yiorgos Makris, Ozgur Sinanoglu
University of California, San DiegoUniversity of Texas at DallasNew York University; Feb. 2021
Real-time Private Membership Test using Homomorphic Encryption
E Chielle, H Gamil, M Maniatakos
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1282-1287; Feb. 2021
Operational Technology on Construction Sites: A Review from the Cybersecurity Perspective.
Muammer Semih Sonkor, Borja García de Soto
ASCE’s Journal of Construction Engineering and Management, [In press]; 2021
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Christina Pöpper
Association for Computing Machinery; 2021
5G SUCI-Catchers: Still catching them all?
M Chlosta, D Rupprecht, C Pöpper, T Holz; 2021
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data.
T Schnitzler, MS Mirza, M Dürmuth, C Pöpper
Proc. Priv. Enhancing Technol, vol. 2021, issue (1), pp. 229-249; 2021
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications
Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
30th {USENIX} Security Symposium ({USENIX} Security 21); 2021
2020
Lilas Alrahis, Satwik Patnaik, Johann Knechtel, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
arXiv preprint arXiv:2012.14938; Dec. 2020
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu
arXiv preprint arXiv:2012.05948; Dec. 2020
System, method and computer-accessible medium for satisfiability attack resistant logic locking
Ozgur Sinanoglu, Muhammad Yasin, Jeyavijayan Rajendra
US Patent 10,853,523; Dec. 2020
Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits
Shubham Rai, Satwik Patnaik, Ansh Rupani, Johann Knechtel, Ozgur Sinanoglu, Akash Kumar
IEEE Transactions on Emerging Topics in Computing; Nov. 2020
Deep Learning Analysis for Split Manufactured Layouts with Routing Perturbation
Haocheng Li, Satwik Patnaik, Mohammed Ashraf, Haoyu Yang, Johann Knechtel, Bei Yu, Ozgur Sinanoglu, Evangeline FY Young
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Nov. 2020
Design Flow for Active Interposer-Based 2.5-D ICs and Study of RISC-V Architecture With Secure NoC
H Park, J Kim, VCK Chekuri, MA Dolatsara, M Nabeel, A Bojesomo, S Patnaik, Ozgur Sinanoglu, M Swaminathan, S Mukhopadhyay, J Knechtel, Sung Kyu Lim
IEEE Transactions on Components, Packaging and Manufacturing Technology; Oct. 2020
Thwarting All Logic Locking Attacks: Dishonest Oracle with Truly Random Logic Locking
Nimisha Limaye, Emmanouil Kalligeros, Nikolaos Karousos, Irene G Karybali, Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Oct. 2020
Guest Editors’ Introduction: Special Issue on Emerging Technologies in Computer Design
Ozgur Sinanoglu, Umit Ogras
IEEE Annals of the History of Computing 8 (04),pp. 887-888; Oct. 2020
2.5 D Root of Trust: Secure System-Level Integration of Untrusted Chiplets
M Nabeel, M Ashraf, S Patnaik, V Soteriou, O Sinanoglu, J Knechtel
IEEE Transactions on Computers 69 (11),pp. 1611-1625; Sep. 2020
Power Side-Channel Attacks in Negative Capacitance Transistor
J Knechtel, S Patnaik, M Nabeel, M Ashraf, Y S Chauhan, J Henkel, Ozgur Sinanoglu, H Amrouch
IEEE Micro 40 (6),pp. 74-84; Jul. 2020
Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking
B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, …
arXiv preprint arXiv:2006.06806; Jun. 2020
Design Obfuscation versus Test
Farimah Farahmandi, Ozgur Sinanoglu, Ronald Blanton, Samuel Pagliarini
2020 IEEE European Test Symposium (ETS),pp. 1-10; May. 2020
System, method and computer-accessible medium providing secure integrated circuit camouflaging for minterm protection
Ozgur Sinanoglu, Jeyavijayan Rajendran, Muhammad Yasin
US Patent 10,642,947; Jun. 2020
Explainability Matters: Backdoor Attacks on Medical Imaging
Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout
arXiv preprint arXiv:2101.00008; Dec. 2020
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining
Anand Agrawal, Marios Sazos, Ahmed Al Durra, Michail Maniatakos
Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, pp. 31-36; Nov. 2020
Demonstration of man in the middle attack on a feeder power factor correction unit
L Hadjidemetriou, G Tertytchny, H Karbouj, C Charalambous, M K Michael, M Sazos, M Maniatakos
2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), pp. 126-130; Oct. 2020
CPSIOTSEC’20: 2020 Joint Workshop on CPS&IoT Security and Privacy
Michail Maniatakos, Yuqing Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 2135-2136; Oct. 2020
Demonstration of Man in the Middle Attack on a Commercial Photovoltaic Inverter Providing Ancillary Services
G Tertytchny, H Karbouj, L Hadjidemetriou, C Charalambous, M K Michael, M Sazos, M Maniatakos
2020 IEEE CyberPELS (CyberPELS), pp. 1-7; Oct. 2020
Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers
Dimitrios Tychalas, Michail Maniatakos
2020 IEEE 38th International Conference on Computer Design (ICCD), pp. 33-36; Oct. 2020
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems
Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 744-758; Oct. 2020
Muon-Ra: Quantum random number generation from cosmic rays
H Gamil, P Mehta, E Chielle, A Di Giovanni, M Nabeel, F Arneodo, M Maniatakos
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 1-6; Jul. 2020
Encrypt-Everything-Everywhere: ISA Extensions for Private Computation
E Chielle, NG Tsoutsos, O Mazonka, M Maniatakos
IEEE Transactions on Dependable and Secure Computing; Jul. 2020
FaceHack: Triggering backdoored facial recognition systems using facial characteristics
E Sarkar, H Benkraouda, M Maniatakos
arXiv preprint arXiv:2006.11623; Jun. 2020
Stealthy Information Leakage through Peripheral Exploitation in Modern Embedded Systems
D Tychalas, A Keliris, M Maniatakos
IEEE Transactions on Device and Materials Reliability; May. 2020
SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs
H Benkraouda, MA Chakkantakath, A Keliris, M Maniatakos
2020 IEEE 38th VLSI Test Symposium (VTS),pp. 1-6; Apr. 2020
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper
Annual Computer Security Applications Conference, pp. 304-319; Dec. 2020
On ADS-B Sensor Placement for Secure Wide-Area Multilateration
E Bitsikas, B Tedongmo, C Pöpper
Multidisciplinary Digital Publishing Institute Proceedings, vol. 59, issue 1; Dec. 2020
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors
A Darabseh, H AlKhzaimi, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 53-64; Jul. 2020
Protecting wi-fi beacons from outsider forgeries
M Vanhoef, P Adhikari, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 155-160; Jul. 2020
Imp4gt: Impersonation attacks in 4g networks
D Rupprecht, K Kohls, T Holz, C Pöpper
Symposium on Network and Distributed System Security (NDSS). ISOC; Feb. 2020
On ADS-B Sensor Placement for Secure Wide-Area Multilateration
A Darabseh, E Bitsikas, B Tedongmo, C Pöpper
Multidisciplinary Digital Publishing Institute Proceedings, vol. 59, issue 1, pp. 3
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th {USENIX} Security Symposium ({USENIX} Security 20), pp. 1985-2002; 2020
Thwarting Bio-IP Theft Through Dummy-Valve-based Obfuscation
Mohammed Shayan, Sukanta Bhattacharjee, Ajymurat Orozaliev, Yong-Ak Song, Krishnendu Chakrabarty, Ramesh Karri
IEEE Transactions on Information Forensics and Security; Dec. 2020
Cyber Security Threat Modeling in the AEC Industry: An Example for the Commissioning of the Built Environment
Bharadwaj Mantha, Borja García de Soto, Ramesh Karri
Sustainable Cities and Society, pp. 102682; Dec. 2020
Computer aided design (CAD) model search and retrieval using frequency domain file conversion
Wenjin Li, Gary Mac, Nektarios Georgios Tsoutsos, Nikhil Gupta, Ramesh Karri
Additive Manufacturing 36, vol. 36, pp. 101554; Dec. 2020
Hardware Architectures for Post-Quantum Digital Signature Schemes
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, Ramesh Karri
Springer Nature; Nov. 2020
Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective
Samrat Acharya, Yury Dvorkin, Hrvoje Pandžić, Ramesh Karri
IEEE Access, vol. 8, pp. 214434-214453; Nov. 2020
Explaining and Interpreting Machine Learning CAD Decisions: An IC Testing Case Study
Prashanth Krishnamurthy, Animesh Basak Chowdhury, Benjamin Tan, Farshad Khorrami, Ramesh Karri
Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 129-134; Nov. 2020
DAVE: Deriving Automatically Verilog from English
Hammond Pearce, Benjamin Tan, Ramesh Karri
Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27-32; Nov. 2020
A Survey of Cybersecurity of Digital Manufacturing
P Mahesh, A Tiwari, C Jin, PR Kumar, AL N Reddy, STS Bukkapatanam, N Gupta, R Karri
Proceedings of the IEEE; Nov. 2020
PROGRAM COMMITTEE (CASES)
PP Pande, U Ogras, A Akoglu, L Bauer, S Bhunia, O Bringmann, R Karri, …
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue 11, pp. 4293; Nov. 2020
Security Assessment of Interposer-based Chiplet Integration
Mohammed Shayan, Kanad Basu, Ramesh Karri
arXiv preprint arXiv:2010.13155
ASSURE: RTL Locking Against an Untrusted Foundry
Christian Pilato, Animesh Basak Chowdhury, Donatella Sciuto, Siddharth Garg, Ramesh Karri
arXiv preprint arXiv:2010.05344
Exposing Hardware Trojans in Embedded Platforms via Short-Term Aging
Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Ramesh Karri, Farshad Khorrami
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue. 11, pp. 3519-3530; Oct. 2020
Determining an aspect of behavior of an embedded device such as, for example, detecting unauthorized modifications of the code and/or behavior of an embedded device
Farshad Khorrami, Ramesh Karri, Prashanth Krishnamurthy
US Patent 10,783,248; Sep. 2020
Training Data Poisoning in ML-CAD: Backdooring DL-based Lithographic Hotspot Detectors
Kang Liu, Benjamin Tan, Ramesh Karri, Siddharth Garg
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2020
Cybersecurity Road Map for Digital Manufacturing
Nektarios Georgios Tsoutsos, Nikhil Gupta, Ramesh Karri
Computer, vol. 53, issue 9, pp.80-84
Towards Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
Benjamin Tan, Rana Elnaggar, Jason M Fung, Ramesh Karri, Krishnendu Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Aug. 2020
Security Against Data-Sniffing and Alteration Attacks in IJTAG
Rana Elnaggar, Ramesh Karri, Krishnendu Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Aug. 2020
Adversarial Perturbation Attacks on ML-based CAD: A Case Study on CNN-based Lithographic Hotspot Detection
K Liu, H Yang, Y Ma, B Tan, B Yu, EFY Young, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 25, issue 5; pp. 1-31; Aug 2020
Challenges and New Directions for AI and Hardware Security
Benjamin Tan, Ramesh Karri
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 277-280; Aug. 2020
System, method and computer-accessible medium for network intrusion detection
Sateesh K Addepalli, Ramesh Karri, Vinayaka Jyothi
US Patent 10,735,438; Aug. 2020
A Survey of Cybersecurity and Resilience of Digital Manufacturing
Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R Kumar, AL Reddy, Satish TS Bukkapatanam, Nikhil Gupta, Ramesh Karri
arXiv preprint arXiv:2006.05042; Jun. 2020
Anomaly Detection in Embedded Systems Using Power and Memory Side Channels
Jiho Park, Virinchi Roy Surabhi, Prashanth Krishnamurthy, Siddharth Garg, Ramesh Karri, Farshad Khorrami
2020 IEEE European Test Symposium (ETS), pp. 1-2; May. 2020
Molecular Barcoding as a Defense against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics
Mohamed Ibrahim, Tung-Che Liang, Kristin Scott, Krishnendu Chakrabarty, Ramesh Karri
IEEE Transactions on Information Forensics and Security; May. 2020
Public Plug-in Electric Vehicles+ Grid Data: Is a New Cyberattack Vector Viable?
Samrat Acharya, Yury Dvorkin, Ramesh Karri
IEEE Transactions on Smart Grid; May. 2020
Security of Cloud FPGAs: A Survey
Chenglu Jin, Vasudev Gohil, Ramesh Karri, Jeyavijayan Rajendran
arXiv preprint arXiv:2005.04867; May. 2020
HACK3D: Evaluating Cybersecurity of Additive Manufacturing by Crowdsourcing
Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta, Ramesh Karri
arXiv preprint arXiv:2005.04368; May. 2020
IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference
Irene Amerini, Chang-Tsun Li, Nasir Memon, Jiwu Huang
IEEE Access, vol. 8, pp. 209657-209659; Dec. 2020
Camera identification of multi-format devices
Samet Taspinar, Manoranjan Mohanty, Nasir Memon
Pattern Recognition Letters, vol. 140, pp. 288-294; Dec. 2020
The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon
arXiv preprint arXiv:2011.05773; Nov. 2020
Media Authentication and Forensics—New Solutions and Research Opportunities
Edward Delp, Jiwu Huang, Nasir Memon, Anderson Rocha, Matt Turek, Luisa Verdoliva
IEEE Journal of Selected Topics in Signal Processing, vol. 14, issue 5, pp. 906-909; Aug. 2020
FiFTy: large-scale file fragment type identification using convolutional neural networks
Govind Mittal, Paweł Korus, Nasir Memon
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 28-41; Jun. 2020
SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ozgur Sinanoglu and Shaloo Rakheja
IEEE Access; Apr. 2020
System, method and computer-accessible medium for security-centric electronic system design
Jeyavijayan Rajendran, Ramesh Karri and Ozgur Sinanoglu
US Patent 10,614,18; Apr. 2020
DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Ozgur Sinanoglu and N Limaye
IEEE/ACM Design Automation Test in Europe Conference ; Mar. 2020
Obfuscating the interconnects: Low-cost and resilient full-chip layout camouflaging
S Patnaik, M Ashraf, O Sinanoglu and J Knechtel
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020
Mixed-Signal IP Protection Against Piracy Based on Logic Locking
Julian Leonhard, Marie-Minerve Louërat, Hassan Aboushady, Ozgur Sinanoglu and Haralampos-G Stratigopoulos
32. GI/GMM/ITG-Workshop Testmethoden und Zuverlässigkeit von Schaltungen und Systemen; Feb. 2020
Truly Stripping Functionality for Logic Locking: A Fault-based Perspective
Abhrajit Sengupta, Mohammed Nabeel, Nimisha Limaye, Mohammed Ashraf and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Jan. 2020
DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Nimisha Limaye and Ozgur Sinanoglu
arXiv preprint arXiv:2001.06724; Jan. 2020
Structural Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 77-92; 2020
The Need for Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 1-16; 2020
Post-SAT 3: Stripped-Functionality Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 103-118; 2020
A Brief History of Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 17-31; 2020
Approximate Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 69-76; 2020
Side-Channel Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 119-130; 2020
The SAT Attack
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 47-56; 2020
Post-SAT 2: Insertion of SAT-Unresolvable Structures
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 93-102; 2020
Post-SAT 1: Point Function-Based Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 57-67; 2020
Pre-SAT Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 33-46; 2020
Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems
Yue Wang, Esha Sarkar, Michail Maniatakos and Saif Eddin Jabari
arXiv preprint arXiv:2003.07859; Mar. 2020
Practical Data-in-Use Protection Using Binary Decision Diagrams
Oleg Mazonka, Esha Sarkar, Eduardo Chielle, Nektarios Georgios Tsoutsos and Michail Maniatakos
IEEE Access, pp. 23847-23862; Jan. 2020
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting
Esha Sarkar, Yousif Alkindi and Michail Maniatakos
IEEE Design & Test, pp. 103-110; Jan. 2020
Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE
David Rupprecht, Katharina Kohls, Thorsten Holz and Christina Pöpper
29th {USENIX} Security Symposium Conference({USENIX} Security 20); to appear Aug. 2020
Exploring user perceptions of deletion in mobile instant messaging applications
Theodor Schnitzler, Christine Utz, Florian M Farke, Christina Pöpper and Markus Dürmuth
Journal of Cybersecurity, Volume 6, Issue 1; Jan. 2020
Effects of Credibility Indicators on Social Media News Sharing Intent
Waheeb Yaqub, Otari Kakhidze, Morgan L Brockman, Nasir Memon and Sameer Patil
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-14; Apr. 2020
Empirical evaluation of PRNU fingerprint variation for mismatched imaging pipelines
Sharad Joshi, Pawel Korus, Nitin Khanna and Nasir Memon
arXiv preprint arXiv:2004.01929; Apr. 2020
Camera Fingerprint Extraction via Spatial Domain Averaged Frames
Samet Taspinar, Manoranjan Mohanty and Nasir Memon
IEEE Transactions on Information Forensics and Security, pp. 3270-3282; Apr. 2020
Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük and Nasir Memon
arXiv preprint arXiv:2002.10123; Feb. 2020
Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks
Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris and Ramesh Karri
arXiv preprint arXiv:2004.12492; Apr. 2020
Hardware Trojan Detection Using Controlled Circuit Aging
Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri and Farshad Khorrami
IEEE Access; Apr. 2020
How Secure are Checkpoint-based Defenses in Digital Microfluidic Biochips?
Mohammed Shayan, Sukanta Bhattacharjee, Robert Wille, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Apr. 2020
COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity
Kanad Basu, Suha Sabi Hussain, Ujjwal Gupta and Ramesh Karri
IEEE Transactions on Information Forensics and Security, pp. 3213-3226; Mar. 2020
Towards Secure Checkpointing for Micro-Electrode-Dot-Array Biochips
Mohammed Shayan, Tung-Che Liang, Sukanta Bhattacharjee, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020
Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks
Nikhil Gupta, Akash Tiwari, Satish TS Bukkapatnam and Ramesh Karri
IEEE Access, pp. 47322-47333; Mar. 2020
NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs
Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt and Siddharth Garg
arXiv preprint arXiv:2002.08313; Feb. 2020
Towards a new thermal monitoring based framework for embedded cps device security
Naman Kamleshbhai Patel, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Michael Shamouilian, Ramesh Karri and Farshad Khorrami
IEEE Transactions on Dependable and Secure Computing; Feb. 2020
Programmable Daisychaining of Microelectrodes to Secure Bioassay IP in MEDA Biochips
Tung-Che Liang, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp. 1269-1282; Feb. 2020
Secure Assay Execution on MEDA Biochips to Thwart Attacks Using Real-Time Sensing
Tung-Che Liang, Mohammed Shayan, Krishnendu Chakrabarty and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES), pp. 1-25; Jan. 2020
Secure and Trustworthy Cyberphysical Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Springer International Publishing; 2020
Cyberphysical Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 1-17; 2020
Mitigation: Tamper-Mitigating Routing Fabrics
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 109-133; 2020
Prevention: Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 51-77; 2020
Security and Trust
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 19-49; 2020
Detection: Randomizing Checkpoints on Cyberphysical Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 79-107; 2020
2019
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory
Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu and Muhammad Yasin
International Conference on Information Technology and Communications Security, pp. 172-192; Nov. 2019
System, method and computer-accessible medium for satisfiability attack resistant logic locking
Ozgur Sinanoglu, Muhammad Yasin and Jeyavijayan Rajendran
US Patent App. 16/087,911; Nov. 2019
Trustworthy Hardware Design: Combinational Logic Locking Techniques
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Springer, pp. 1-xxi, 142 pages; Oct. 2019
Keynote: A Disquisition on Logic Locking
Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin and Michael Zuzak
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2019
System, method and computer-accessible medium for providing secure split manufacturing
J Rajendran, O Sinanoglu, R Karri
US Patent 10,423,749; Sep. 2019
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation
O Sinanoglu, L Alrahis, M Yasin, N Limaye, H Saleh
IEEE Transactions on Emerging Topics in Computing, pp. 1-1; Sep. 2019
ScanSAT: Unlocking Static and Dynamic Scan Obfuscation
Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Alqutayri, Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing; Sep. 2019
A modern approach to IP protection and trojan prevention: Split manufacturing for 3D ICs and obfuscation of vertical interconnects
S Patnaik, M Ashraf, O Sinanoglu, J Knechtel
IEEE Transactions on Emerging Topics in Computing; Aug. 2019
Mixed-Signal Hardware Security Using MixLock: Demonstration in an Audio Application
J Leonhard, MM Louërat, H Aboushady, O Sinanoglu, HG Stratigopoulos
2019 16th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), pp. 185-188; July. 2019
3D integration: Another dimension toward hardware security
J Knechtel, S Patnaik, O Sinanoglu
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 147-150; July. 2019
Is robust design-for-security robust enough? attack on locked circuits with restricted scan chain access
N Limaye, A Sengupta, M Nabeel, O Sinanoglu
arXiv preprint arXiv:1906.07806
Toward physically unclonable functions from plasmonics-enhanced silicon disc resonators
J Knechtel, J Gosciniak, A Bojesomo, S Patnaik, O Sinanoglu, M Rasras
Journal of Lightwave Technology 37 (15), pp. 3805-3814; June. 2019
An interposer-based root of trust: Seize the opportunity for secure system-level integration of untrusted chiplets
M Nabeel, M Ashraf, S Patnaik, V Soteriou, O Sinanoglu, J Knechtel
arXiv preprint arXiv:1906.02044; June. 2019
Guest Editors Introduction: Special Section on Emerging Technologies in Computer Design
O Sinanoglu, O Khan
IEEE Transactions on Emerging Topics in Computing 7 (2), pp. 242-243; June. 2019
Attacking split manufacturing from a deep learning perspective
H Li, S Patnaik, A Sengupta, H Yang, J Knechtel, Bei Yu, E FY Young, O Sinanoglu
2019 56th ACM/IEEE Design Automation Conference (DAC), pp. 1-6; June. 2019
Revisiting Logic Locking for Reversible Computing
N Limaye, M Yasin, O Sinanoglu
2019 IEEE European Test Symposium (ETS), pp. 1-6; May 2019
Spin-orbit torque devices for hardware security: From deterministic to probabilistic regime
S Patnaik, N Rangarajan, J Knechtel, O Sinanoglu, S Rakheja
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; May. 2019
Protect your chip design intellectual property: An overview
J Knechtel, S Patnaik, O Sinanoglu
Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 211-216; May. 2019
System, method and computer-accessible medium for stripped-functionality logic locking
O Sinanoglu, J Rajendran, M Yasin
US Patent App. 16/170,378; May. 2019
Piezo-PUF: Physical Unclonable Functions for Vacuum-Packaged, Piezoelectric MEMS
A Bojesomo, IAM Elfadel, O Sinanoglu
2019 Symposium on Design, Test, Integration and Packaging of MEMS and MOEMS, pp. 8752778; May. 2019
Mixlock: Securing mixed-signal circuits via logic locking
J Leonhard, M Yasin, S Turk, MT Nabeel, MM Louërat, R Chotin-Avot, H Aboushady, O Sinanoglu, HG Stratigopoulos
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 84-89; March. 2019
A new paradigm in split manufacturing: Lock the FEOL, unlock at the BEOL
A Sengupta, M Nabeel, J Knechtel, O Sinanoglu
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 414-419; March. 2019
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd)–Unlocked
F Yang, M Tang, O Sinanoglu
IEEE Transactions on Information Forensics and Security 14 (10), pp. 2778-2786; March. 2019
Systems, processes and computer-accessible medium for providing a bi-directional scan path for peak capture power reduction in launch-off-shift testing
O Sinanoglu
US Patent 10,203,368; Feb. 2019
Logic Locking with Provable Security Against Power Analysis Attacks
O Sinanoglu, A Sengupta, B Mazumdar, M Yasin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1; Feb. 2019
Logic locking with provable security against power analysis attacks
A Sengupta, B Mazumdar, M Yasin, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 766-778; Feb. 2019
Spin-based reconfigurable logic for power-and area-efficient applications
N Rangarajan, S Patnaik, J Knechtel, SO Sinanoglu, S Rakheja
IEEE Design & Test 36 (3), pp. 22-30; Jan. 2020
ScanSAT: Unlocking obfuscated scan chains
L Alrahis, M Yasin, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
Proceedings of the 24th Asia and South Pacific Design Automation Conference, pp. 352-357; Jan. 2019
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist.
A Sengupta, O Sinanoglu
IACR Cryptol. ePrint Arch. 2019, pp. 1443
Hardware security and trust: Logic locking as a design-for-trust solution
M Yasin, B Mazumdar, J Rajendran, O Sinanoglu
The IoT Physical Layer, pp. 353-373
A data-based detection method against false data injection attacks
C Konstantinou, M Maniatakos
IEEE Design & Test 37 (5), pp. 67-74; Nov. 2019
System and method for malware detection in additive manufactured parts
NG Tsoutsos, N Gupta, M Maniatakos
US Patent App. 16/295,171; Nov. 2019
Process-aware cyberattacks for thermal desalination plants
PHN Rajput, P Rajput, M Sazos, M Maniatakos
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 441-452; Jul. 2019
JTAG: A Multifaceted Tool for Cyber Security
PHN Rajput, M Maniatakos
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 155-158; Jul. 2019
LED alert: Supply chain threats for stealthy data exfiltration in industrial control systems
D Tychalas, A Keliris, M Maniatakos
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 194-199; Jul. 2019
Assessment of Low-Budget Targeted Cyberattacks Against Power Systems
M Sazos, M Maniatakos
VLSI-SoC: Design and Engineering of Electronics Systems Based on New Computing Paradigms, Vol. 561, pp. 232; Jun. 2019
Hardware-layer intelligence collection for smart grid embedded systems
C Konstantinou, M Maniatakos
Journal of Hardware and Systems Security, vol. 3, issue 2, pp. 132-146; Jun. 2019
Cophee: Co-processor for partially homomorphic encrypted execution
M Nabeel, M Ashraf, E Chielle, NG Tsoutsos, M Maniatakos
2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 131-140; Jun. 2019
On automating delayered IC analysis for hardware IP protection
E Sarkar, M Maniatakos
Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 205-210; Jun. 2019
Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials, vol. 21, issue 4, pp. 1800495; Apr. 2019
FLEP-SGS2: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security
C Konstantinou, M Sazos, M Maniatakos
2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5; Feb. 2019
Open source intelligence for energy sector cyberattacks
A Keliris, C Konstantinou, M Sazos, M Maniatakos
Critical infrastructure security and resilience, pp. 261-281; 2019
Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
NG Tsoutsos, M Maniatakos
Security and Fault Tolerance in Internet of Things, pp. 87-110; 2019
Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations
P Korus, N Memon
International Conference on Learning Representations
Sep. 2019
Image Classification Through Top-Down Image Pyramid Traversal
A Papadopoulos, P Korus, N Memon
Sep. 2019
Masterprint attack resistance: A maximum cover based approach for automatic fingerprint template selection
A Roy, N Memon, A Ross
2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS)
pp. 1-9; Sep. 2019
Camera fingerprint extraction via spatial domain averaged frames
S Taspinar, M Mohanty, N Memon arXiv preprint arXiv:1909.04573; Sep. 2019
FiFTy: Large-scale File Fragment Type Identification using Neural Networks
G Mittal, P Korus, N Memon arXiv preprint arXiv:1908.06148; Aug. 2019
Kid on the phone! Toward automatic detection of children on mobile devices
T Nguyen, A Roy, N Memon Computers & Security, vol. 84, pp. 334-348; Jul. 2019
The effect of light source on ENF based video forensics
S Vatansever, AE Dirik, N Memon; May. 2019
Factors affecting enf based time-of-recording estimation for video
S Vatansever, AE Dirik, N Memon
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2497-2501; May. 2019
Source camera attribution of multi-format devices
S Taspinar, M Mohanty, N Memon
arXiv preprint arXiv:1904.01533; Apr. 2019
Neural imaging pipelines-the scourge or hope of forensics?
P Korus, N Memon
arXiv preprint arXiv:1902.10707, Feb. 2019
Every shred helps: Assembling evidence from orphaned JPEG fragments
E Durmus, P Korus, N Memon
IEEE Transactions on Information Forensics and Security, vol. 14, issue 9, pp. 2372-2386; Feb. 2019
Analysis of rolling shutter effect on ENF-based video forensics
S Vatansever, AE Dirik, N Memon
IEEE Transactions on Information Forensics and Security, vol. 14, issue 9, pp. 2262-2275; Jan. 2019
Emerging NUI-based methods for user authentication: A new taxonomy and survey
N Sae-Bae, J Wu, N Memon, J Konrad, P Ishwar
IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 1, issue 1, pp. 5-31; Jan. 2019
Adversarial Optimization for Dictionary Attacks on Speaker Verification.
M Marras, P Korus, ND Memon, G Fenu Interspeech, pp. 2913-2917; 2019
Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels
P Korus, N Memon
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition
pp. 8621-8629; 2019
2018
O Sinanoglu, Y Pino, J Rajendran, R Karri
US Patent 10,153,769; Dec. 2018
Customized locking of IP blocks on a multi-million-gate SoC
A Sengupta, M Ashraf, M Nabeel, O Sinanoglu
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-7; Nov. 2018
Best of both worlds: Integration of split manufacturing and camouflaging into a security-driven CAD flow for 3D ICs
S Patnaik, M Ashraf, O Sinanoglu, J Knechtel
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018
Trustworthy Hardware Design: Combinational Logic Locking Techniques
O Sinanoglu, J Rajendran, M Yasin
Springer; Nov. 2018
Raise your game for split manufacturing: Restoring the true functionality through BEOL
S Patnaik, M Ashraf, J Knechtel, O Sinanoglu
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2018
ATPG-based cost-effective, secure logic locking
A Sengupta, M Nabeel, M Yasin, O Sinanoglu
2018 IEEE 36th VLSI Test Symposium (VTS), pp. 1-6; Apr. 2018
Advancing hardware security using polymorphic and stochastic spin-hall effect devices
S Patnaik, N Rangarajan, J Knechtel, O Sinanoglu, S Rakheja
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 97-102; Mar. 2018
Towards provably-secure performance locking
M Zaman, A Sengupta, D Liu, O Sinanoglu, Y Makris, JJV Rajendran
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1592-1597; Mar. 2018
Towards Provably Secure Logic Locking for Hardening Hardware Security
M Yasin, O Sinanoglu
2018 IEEE International Test Conference (ITC), pp. 1-10; 2018
Open platform systems under scrutiny: A cybersecurity analysis of the device tree
D Tychalas, M Maniatakos
2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 477-480; Dec. 2018
ICSREF: A framework for automated reverse engineering of industrial control systems binaries
A Keliris, M Maniatakos
arXiv preprint arXiv:1812.03478; Dec. 2018
Assessment of low-budget targeted cyberattacks against power systems
XR Liu, A Keliris, C Konstantinou, M Sazos, M Maniatakos
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip, pp. 232-256; Oct. 2018
Low-budget energy sector cyberattacks via open source exploitation
A Keliris, C Konstantinou, M Sazos, M Maniatakos
2018 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pp. 101-106; Oct. 2018
Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption
M Maniatakos, C Konstantinou, A Keliris
US Patent 10,079,674; Sep. 2018
Guest Editor Introduction: Embedded Security Challenge
M Maniatakos
IEEE Embedded Systems Letters, vol. 10, issue 3, pp. 81-82; Aug. 2018
Anatomy of memory corruption attacks and mitigations in embedded systems
NG Tsoutsos, M Maniatakos
IEEE Embedded Systems Letters, vol. 10, issue 3, pp. 95-98; Apr. 2018
Phylax: Snapshot-based profiling of real-time embedded devices via jtag interface
C Konstantinou, E Chielle, M Maniatakos
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 869-872; Mar. 2018
Terminator suite: Benchmarking privacy-preserving architectures
D Mouris, NG Tsoutsos, M Maniatakos
IEEE Computer Architecture Letters, vol. 17, issue 2, pp. 122-125; Mar. 2018
E3: A Framework for Compiling C++ Programs with Encrypted Operands.
E Chielle, O Mazonka, NG Tsoutsos, M Maniatakos
IACR Cryptol. ePrint Arch., vol. 2018, pp. 1013; 2018
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
European Symposium on Research in Computer Security, pp. 512-530; Sep. 2018
Crowd-gps-sec: Leveraging crowdsourcing to detect and localize gps spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), pp. 1018-1031; May. 2018
User Perception and Expectations on Deleting Instant Messages—or—“What Happens If I Press This Button?”
T Schnitzler, C Utz, FM Farke, C Pöpper, M Dürmuth
EuroUSEC 2018 – European Workshop on Usable Security, pages 13; Apr. 2018
On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials, vol. 20, issue 3, pp. 2518-2542; Apr. 2018
Forgetting with puzzles: using cryptographic puzzles to support digital forgetting
G Amjad, MS Mirza, C Pöpper
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 342-353; Mar. 2018
Black-hat high-level synthesis: Myth or reality?
C Pilato, K Basu, F Regazzoni, R Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 27, issue 4, pp. 913-926; Dec. 2018
Systems, processes and computer-accessible medium for providing logic encryption utilizing fault analysis
O Sinanoglu, Y Pino, J Rajendran, R Karri
US Patent 10,153,769; Dec. 2018
Synthesis of tamper-resistant pin-constrained digital microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue 1, pp. 171-184; Nov. 2018
IC/IP piracy assessment of reversible logic
SM Saeed, X Cui, A Zulehner, R Wille, R Drechsler, K Wu, R Karri
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018
Shadow attacks on MEDA biochips
M Shayan, S Bhattacharjee, TC Liang, J Tang, K Chakrabarty, R Karri
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018
Hardware Trojan detection using the order of path delay
X Cui, E Koopahi, K Wu, R Karri
ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 14, issue 3, pp. 1-23; Oct. 2018
Abetting planned obsolescence by aging 3D networks-on-chip
S Das, K Basu, JR Doppa, PP Pande, R Karri, K Chakrabarty
2018 Twelfth IEEE/ACM International Symposium on Networks-on-Chip (NOCS), pp. 1-8; Oct. 2018
System, method and computer-accessible medium for security verification of third party intellectual property cores
V Vedula, J Rajendran, A Dhandayuthapany, R Karri
US Patent 10,083,303, Sep. 2018
Security assessment of micro-electrode-dot-array biochips
M Shayan, J Tang, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 10, pp. 1831-1843; Aug. 2018
Toward secure and trustworthy cyberphysical microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 4, pp. 589-603; Jul. 2018
Process-aware side channel shaping and watermarking for cyber-physical systems
P Krishnamurthy, F Khorrami, R Karri, H Salehghaffari
2018 Annual American Control Conference (ACC), pp. 386-391; Jun. 2018
TAO: Techniques for algorithm-level obfuscation during high-level synthesis
C Pilato, F Regazzoni, R Karri, S Garg
Proceedings of the 55th Annual Design Automation Conference, pp. 1-6; Jun. 2018
Tamper-resistant pin-constrained digital microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2018
Locking of biochemical assays for digital microfluidic biochips
S Bhattacharjee, J Tang, M Ibrahim, K Chakrabarty, R Karri
2018 IEEE 23rd European Test Symposium (ETS), pp. 1-6, May. 2018
Hardware Trojan detection using path delay order encoding with process variation tolerance
X Cui, K Wu, R Karri
2018 IEEE 23rd European Test Symposium (ETS), pp. 1-2; May. 2018
Tainthls: High-level synthesis for dynamic information flow tracking
C Pilato, K Wu, S Garg, R Karri, F Regazzoni
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 5, pp. 798-808; May. 2018
Process-aware covert channels using physical instrumentation in cyber-physical systems
P Krishnamurthy, F Khorrami, R Karri, D Paul-Pena, H Salehghaffari
IEEE Transactions on Information Forensics and Security, vol. 13, issue 11, pp. 2761-2771; May. 2018
Securing IJTAG against data-integrity attacks
R Elnaggar, R Karri, K Chakrabarty
2018 IEEE 36th VLSI Test Symposium (VTS), pp. 1-6; Apr. 2018
On the difficulty of inserting trojans in reversible computing architectures
X Cui, SM Saeed, A Zulehner, R Wille, K Wu, R Drechsler, R Karri
IEEE Transactions on Emerging Topics in Computing, vol. 8, issue 4, pp. 960-972; Apr. 2018
IEEE COUNCIL ON ELECTRONIC DESIGN AUTOMATION
S Parameswaran, T Mitra, Y Chen, R Karri, …
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication; 2018
Distinctiveness, complexity, and repeatability of online signature templates
N Sae-Bae, N Memon, P Sooraksa
Pattern Recognition, vol. 84, pp. 332-344; Dec. 2018
Encrypted domain skin tone detection for pornographic image filtering
W Yaqub, M Mohanty, N Memon
2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1-5; Nov. 2018
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*
P Bontrager, A Roy, J Togelius, N Memon, A Ross
2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)
pp. 1-9; Oct. 2018
Peeling the Onion’s User Experience Layer: Examining Naturalistic Use of the Tor Browser
K Gallagher, S Patil, B Dolan-Gavitt, D McCoy, N Memon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1290-1305;
Oct. 2018
Towards camera identification from cropped query images
W Yaqub, M Mohanty, N Memon
2018 25th IEEE International Conference on Image Processing (ICIP), pp. 3798-3802; Oct. 2018
Introduction to the special issue on integrating biometrics and forensics
M Nappi, N Memon, D Riccio, A Uhl
Pattern Recognition Letters, vol. 113, pp. 1-2; Oct. 2018
Tap-based user authentication for smartwatches
T Nguyen, N Memon
Computers & Security, vol. 78, pp. 174-186; Sep. 2018
EFFECT OF PROCESSING TREATMENTS ON THE NUTRITIVE COMPOSITION AND CONSUMER ACCEPTANCE OF RED AND WHITE TURNIP VEGETABLES WITH GREEN TOPS: Institute of Food Sciences and …
SA Sheikh, AS Shar, AA Panhwar, SM Nizamani, NS Memon
Pakistan Journal of Agriculture, Agricultural Engineering and Veterinary Sciences
vol. 34, issue 1, pp. 31-39; Jun. 2018
Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition
A Roy, N Memon, J Togelius, A Ross
2018 International Conference on Biometrics (ICB), pp. 39-46; Feb. 2018
Emerging NUI-based methods for user authentication
N Memon
2018 IEEE International Conference on Consumer Electronics (ICCE), pp. 1-1; Jan. 2018
2017
Efficient Gray-level Image Sharing Algorithm using Non- Recursive Hash Value based Stream Cipher
K.K Soundra Pandian and Hoda A. Alkhzaimi
IET Information Security; Under review 2017
FPGA Prototype of non-recursive hash key based stream cipher using sequence folding technique
K.K Soundra Pandian and Hoda A. Alkhzaimi
IACR Transactions on Symmetric Cryptology; Under review 2017
Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
Kai Jansen, Christina Pöpper
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec); Jul. 2017
Memory-bounded Randomness for Hardware constrained Encrypted Computation
N.G. Tsoutsos, O. Mazonka, and M. Maniatakos
IEEE International Conference on Computer Design, pp.673-680; Nov. 2017
Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests
N.G. Tsoutsos and M. Maniatakos
IEEE Asian Hardware Oriented Security and Trust Symposium, pp.1-6; Oct. 2017
GE Multilin SR Protective Relays Passcode Vulnerability
Keliris, C. Konstantinou, and M. Maniatakos
BlackHat USA; Apr. 2017
Obligations for Social Media Companies
Otto Kakhidze and Adam Ramey
International Association for Computing and Philosophy; accepted for publication 2017
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Dimitris Mouris, Nektarios Georgios Tsoutsos, and Michail Maniatakos
Cryptology ePrint Archive, report 2017/1218; Dec. 2017
Image Carving with Missing Headers and Missing Fragments
Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun and Nasir Memon
Information Forensics and Security (WIFS), IEEE Workshop; Dec. 2017
PRNU-Based Camera Attribution from Multiple Seam-Carved Images
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol 12, issue 12, pp. 3065 – 3080; Dec. 2017
Provably-Secure Logic Locking: From Theory To Practice
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran and Ozgur Sinanoglu
ACM SIGSAC Conference; Nov. 2017
Detecting Structurally Anomalous Logins Within Enterprise Networks
Hossein Siadati and Nasir Memon
ACM SIGSAC Conference on Computer and Communications Security, pp. 1273-1284; Nov. 2017
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization
Giovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri and Nasir Memon
ASHES ’17 Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, pp. 7-16; Nov. 2017
Securing Hardware Accelerators: a New Challenge for High-Level Synthesis (Perspective Paper)
Christian Pilato, Siddharth Garg, Kaijie Wu, Ramesh Karri and Francesco Regazzoni
IEEE Embedded Systems Letters, vol pp, issue 99, pp. 1-1; Nov. 2017
Optimal Checkpointing for Secure Intermittently-Powered IoT Devices
Zahra Ghodsi, Siddharth Garg and Ramesh Karri
IEEE/ACM International Conference on Computer-Aided Design (ICCAD); Nov. 2017
Identifying Synthesis Approaches for IP Piracy of Reversible Circuits
Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille and Ramesh Karri
Computer Design (ICCD); Nov. 2017
Special session: emerging (Un-)reliability based security threats and mitigations for embedded systems
Hussam Amrouch, Prashanth Krishnamurthy, Naman Patel, Jörg Henkel, Ramesh Karri and Farshad Khorrami
Compilers, Architectures and Synthesis For Embedded Systems (CASES); Nov. 2017
Evolution of Logic Locking
Muhammad Yasin and Ozgur Sinanoglu
Conference Paper; VLSI SOC Abu Dhabi; Nov. 2017
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar, Mahesh Sreekumar Rajasree, and Hoda AlKhzaimi
Cryptology ePrint Archive; Nov. 2017
Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging
Muhammad Yasin, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 11, pp. 2668-2682; Nov. 2017
Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, and Ozgur Sinanoglu
CoRR; Nov. 2017
Preserving privacy in pre-classification volume ray-casting of 3D images
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
IET Book Data Security in Cloud Computing (Book Chapter), pp. 45-64; Oct. 2017
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg, and Ozgur Sinanoglu
CoRR; Oct. 2017
DPFEE: A High Performance Scalable Pre-processor for Network Security Systems
Vinayaka Jyothi, Sateesh K. Addepalli and Ramesh Karri
IEEE Transactions on Multi-Scale Computing Systems, vol. 4, issue 1, pp. 55-68; Oct. 2017
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Muhammad Yasin, Temesghen Tekeste, Hani Saleh, Baker Mohammad, Ozgur Sinanoglu, and Mohammed Ismail
IEEE Transactions on Circuits and Systems I (TCSI): Regular Papers, vol. 64, issue 9, pp. 2624-2637; Sep. 2017
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
Aditi Roy, Nasir Memon, and Arun Ross
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 9, pp. 2013-2025; Sep. 2017
A novel framework for software defined based secure storage systems
Ala’ Darabseh, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelif, Mladen Vouk, and Andy Rindos
Simulation Modelling Practice and Theory, vol. 77, pp. 407-423; Sep. 2017
Privacy-Preserving Disease Susceptibility Test with Shamir’s Secret Sharing
Guyu Fan and Manoranjan Mohanty
14th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 6, pp. 525-533; Aug. 2017
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE Transactions on Emerging Topics in Computing (TETC), vol. PP, issue 99, pp. 1-1; Aug. 2017
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos, and Murat Kantarcioglu
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 7-17; Aug. 2017
Large-Scale 3D Chips: Challenges and Solution for Design Automation, Testing, and Trustworthy Integration
Johann Knechtel, Ozgur Sinanoglu, Ibrahim M. Elfadel, Jens Lienig, and Cliff C. N. Sze
IPSJ Transactions System LSI Design Methodology (TSLDM), vol. 10, pp. 45-62; Aug. 2017
GPS Spoofing Effect on Phase Angle Monitoring and Control in an RTDS-based Hardware-In-The-Loop Environment
Charalambos Konstantinou, Marios Sazos, Ahmed S. Musleh, Anastasis Keliris, Ahmed Al-Durra, Michail Maniatakos
IET Cyber-Physical Systems: Theory and Applications, pp. 1-7; Aug. 2017
Secure Randomized Checkpointing for Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim,Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1; Aug. 2017
Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach
Saffet Vatansever, Ahmet Emer Dirik and Nasir Memon
IEEE Signal Processing Letters, vol. 24, issue 10; Aug. 2017
Cyber-Physical Systems Security and Privacy
Michail Maniatakos, Alvaro A. Cardenas, and Ramesh Karri
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 5-6; Aug. 2017
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities
Swarup Bhunia, An Chen, Ozgur Sinanoglu, and Jason M. Fung
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 302-303; Jul. 2017
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images
Athanasios Papadopoulos, Toan Nguyen, Emre Durmus and Nasir Memon
IEEE Transactions on Information Forensics and Security, vol. 12, issue 12, pp. 2875-2889; Jul. 2017
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
Bodhisatwa Mazumdar, Samah M. Saeed, Sk Subidh Ali and Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2017
How Biometric Authentication Poses New Challenges to Our Security and Privacy
Nasir Memon
IEEE Signal Processing Magazine, vol. 34, issue 4, pp. 194-196; Jul. 2017
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network
Kevin Gallagher, Sameer Patil, Nasir Memon
SOUPS; Jul. 2017
Smartwatches Locking Methods: A Comparative Study
Toan Nguyen and Nasir Memon
SOUPS; Jul. 2017
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE Transactions on Computers (TC), vol. 67, issue 1, pp. 16-31; Jul. 2017
Cyber– Physical Systems Security and Privacy
Guest Editors: Michail Maniatakos, Ramesh Karri and Alvaro A. Cardenas
IEEE Design & Test, vol. 34, issue 4, pp. 5-6; Jun. 2017
Adaptive Reduction of the Frequency Search for Multi-Vdd Digital Circuits Using Variation Sensitive Ring Oscillators
Chandra K. H. Suresh, Sule Ozev, and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 36, issue 6, pp. 1043-1053; Jun. 2017
ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited
Nikhil Gupta, Fei Chen, Nektarios G. Tsoutsos, and Michail Maniatakos
ACM/EDAC/IEEE 54th Annual Design Automation Conference (DAC), pp. 82:1-82:6; Jun. 2017
Software-defined systems support for secure cloud computing based on data classification
Yaser Jararweh, Mahmoud Al- Ayyoub, Lo’ai Tawalbeh, Ala Darabseh, and Houbing Song
Annales des Telecommunications, vol. 72, issue 5-6, pp. 335-345; Jun. 2017
On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity
Johann Knechtel and Ozgur Sinanoglu
IEEE/ACM 54th Annual Design Automation Conference (DAC), pp. 12:1-12:6; Jun. 2017
Malicious firmware detection with hardware performance counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou, and Steve Kim
IEEE Transactions on Multi-Scale Computing Systems, vol. 2, issue 3, pp. 160-173; May 2017
DeepMasterPrint: Generating Fingerprints for Presentation Attacks
Philip Bontrager, Julian Togelius, and Nasir Memon
CoRR; May 2017
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
Masooda Bashir, Colin Wee, Nasir Memon, and Boyi Guo
Computers & Security, vol. 65, pp. 153-165; May 2017
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
Toan Van Nguyen, Napa Sae-Bae, and Nasir Memon
Computers & Security, vol. 66, pp. 115-128; May 2017
On the Difficulty of Inserting Trojans in Reversible Computing Architectures
Xiaotong Cui, Samah M. Saeed, Alwin Zulehner, Robert Wille, Rolf Drechsler, Kaijie Wu, and Ramesh Karri
CoRR; May 2017
A Software Defined Architecture for Cyberphysical Systems
Ala’ Darabseh and Nikolaos M. Freris
4th International Conference on Software Defined Systems (SDS), pp. 54-60; May 2017
TTLock: Tenacious and traceless logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 166-166; May 2017
What to Lock? Functional and Parametric Locking
Muhammad Yasin, Abhrajit Sengupta, Benjamin Carrion Schafer, Yiorgos Makris, Ozgur Sinanoglu, and Jeyavijayan Rajendran
ACM Great Lakes Symposium on VLSI (GLSVLSI), pp. 351-356; May 2017
X-Platform Phishing: Abusing Trust for Targeted Attacks
Hossein Siadati, Toan Nguyen, and Nasir Memon
Targeted Attacks Conference; Apr. 2017
Towards Reverse Engineering Reversible Logic
Samah M. Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri
CoRR; Apr. 2017
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering
Nektarios G. Tsoutsos, Homer Gamil, and Michail Maniatakos
3rd ACM Workshop on Cyber-Physical System Security (CPSS), pp. 15- 20; Apr. 2017
Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis
Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, and Mustaque Ahamad
Network and Distributed System Security (NDSS) Symposium, vol. 17; Mar. 2017
Demystifying Advanced Persistent Threats for Industrial Control Systems
Anastasis Keliris and Michail Maniatakos
American Society of Mechanical Engineers (ASME) Dynamic Systems and Control Magazine, vol. 139, issue 3, pp. S13-S17; Mar. 2017
Mind your SMSes: Mitigating social engineering in second factor authentication
Hossein Siadati, Toan Nguyen, Payas Gupta, Markus Jakobsson, and Nasir Memon
Computers and Security, vol. 65, pp. 14-28; Mar. 2017
Secure and Flexible Trace-Based Debugging of Systems-on-Chip
Jerry Backer, David Hely and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES) – Special Section of IDEA: Integrating Dataflow, Embedded Computing, and Architecture, vol. 22, issue 2; Mar. 2017
Automotive Electrical/Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring
Peter Waszecki, Philipp Mundhenk, Sebastian Steinhorst, Martin Lukasiewycz, Ramesh Karri, and Samarjit Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. PP, issue 99, pp. 1-1; Feb. 2017
A Comprehensive Design-for-Test Infrastructure In the Context Of Security-Critical Applications
Samah M. Saeed and Ozgur Sinanoglu
IEEE Design and Test (MDAT), vol. 34, issue 1, pp. 57-64; Feb. 2017
Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing
Yaser Jararweh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala’ Darabseh, Brij Gupta, and Ahmad Doulat
The Computer Journal; Feb. 2017
SGXCrypter: IP Protection for Portable Executables using Intel’s SGX Technology
Tychalas, N.G. Tsoutsos, and M. Maniatakos
Asia and South Pacific Design Automation Conference, pp. 354-359; Jan. 2017
Scan Design: Basics, Advancements, and Vulnerabilities
Samah M. Saeed, Sk Subidh Ali, and Ozgur Sinanoglu
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, pp. 107-126; Jan. 2017
Security Analysis of Anti-SAT
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
22nd Asia South Pacific Design Automation Conference (ASP-DAC), pp. 342-347 ; Jan. 2017
Physical Unclonable Functions and Intellectual Property Protection Techniques
Ramesh Karri, Ozgur Sinanoglu, and Jeyavijayan Rajendran
Fundamentals of IP and SoC Security: Design, Verification, and Debug, pp. 199-222; Jan. 2017
2016
Source camera attribution using stabilized video
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6; Dec. 2016
Secure and Flexible Trace-Based Debugging of Systems-on-Chip
Jerry Backer, David Hely, and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 2, pp. 31:1-31:25; Dec. 2016
Machine Learning-based Defense Against Process-Aware Attacks on Industrial Control Systems
Anastasis Keliris, Hossein Salehghaffari, Brian Cairl, Prashanth Krishnamurthy, Michail Maniatakos, and Farshad Khorrami
IEEE International Test Conference (ITC), pp. 1-10; Nov. 2016
A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities
Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 1, pp. 11:1-11:26; Nov. 2016
2DCrypt: Image Scaling and Cropping in Encrypted Domains
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 11, pp. 2542-2555; Nov. 2016
CamoPerturb: Secure IC camouflaging for minterm protection
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 1-8; Nov. 2016
Microfluidic Encryption of on-Chip Biochemical Assays
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE Biomedical Circuits and Systems Conference (BioCAS), pp. 152-155; Oct. 2016
Remote field device fingerprinting using device-specific modbus information
Anastasis Keliris and Michail Maniatakos
IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1-4; Oct. 2016
Secure clock synchronization under collusion attacks
Xiaoming Duan, Nikolaos M. Freris, and Peng Cheng
54th Annual Allerton Conference on Communication, Control, and Computing, pp. 1142-1148; Sep. 2016
Towards a Secure Cloud: Distributed computing over encrypted data
Nikolaos M. Freris and Panagiotis Patrinos
Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing pp. 1116-1122; Sep. 2016
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka, Nektarios G. Tsoutsos, and Michail Maniatakos
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 9, pp. 2123-2138; Sep. 2016
Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 24, issue 9, pp. 2946-2959; Sep. 2016
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
Bharat Srinivasan, Payas Gupta, Manos Antonakakis, and Mustaque Ahamad
21st European Symposium on Research in Computer Security (ESORICS), pp.3-26; Sep. 2016
A Comparative Security Analysis of Current and Emerging Technologies
Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE Micro, vol. 36, issue 5, pp. 50-61; Sep. 2016
PRNU based source attribution with a collection of seam-carved images
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE International Conference on Image Processing (ICIP), pp. 156-160; Sep. 2016
On Improving the Security of Logic Locking
Muhammad Yasin, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 35, issue 9, pp. 1411-1424; Sep. 2016
Supply-Chain Security of Digital Microfluidic Biochips
Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty
IEEE Computer Magazine, vol. 49, issue 8, pp. 36-43; Aug. 2016
SDCache: Software Defined Data Caching Control for Cloud Services
Ala’ Darabseh, Nikolaos M. Freris, Yaser Jararweh and Mahmoud Al-Ayyoub
IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 164-169; Aug. 2016
Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords
Adam Aviv, Markus Dürmuth, and Payas Gupta
12th Symposium on Usable Privacy and Security (SOUPS); Aug. 2016
Malicious firmware detection with hardware performance counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou and Steve Kim
IEEE Transactions on Multi- Scale Computing Systems (TMSCS), vol. 2, issue 3, pp. 160-173; Jul. 2016
Taxonomy of firmware Trojans in smart grid devices
Charalambos Konstantinou, Anastasis Keliris, and Michail Maniatakos
Power and Energy Society General Meeting, (PES-GM), pp. 1-5; Jul. 2016
Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
Bodhisatwa Mazumdar, Samah M. Saeed, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2016
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
13th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 283-291; Jul. 2016
Power-side-channel analysis of carbon nanotube FET based design
Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 215-218; Jul. 2016
Manufacturing and Security Challenges in 3D Printing
Steven Eric Zeltmann, Nikhil Gupta, N. Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri
The Journal of The Minerals, Metals & Materials Society (TMS), vol. 68, issue 7, pp. 1872–1881; Jul. 2016
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hély, and Ramesh Karri
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 4, issue 3, pp. 363-373; Jul. 2016
Don’t See Me, Just Edit Me: Towards Secure Cloud-based Video Editing
Odd-Arild Kristensen, Manoranjan Mohanty, and Pradeep Atrey
11th Annual Symposium on Information Assurance (ASIA); Jun. 2016
Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation
Chandra K. H. Suresh, Sule Ozev, and Ozgur Sinanoglu
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 20, issue 3, pp. 46:1-46:18; Jun. 2016
System, Method and Computer-Accessible Medium for IC Camouflaging for Minterm Protection
Ozgur Sinanoglu, Muhammed Yasin, and Jeyavijayan Rajendran
U.S. Patent pending, filed Jun. 2016
Security Assessment of Cyberphysical Digital Microfluidic Biochips
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 13, issue 3, pp. 445-458; May 2016
MobiPot: Understanding Mobile Telephony Threats with Honeycards
Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, and Mustaque Ahamad
11th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 723-734; May 2016
The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, and Ramesh Karri
Proceedings of the IEEE, vol. 104, issue 5, pp. 1039-1057; May 2016
SARLock: SAT attack resistant logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236-241; May 2016
Distortion-free fragile watermark for relational databases
Ibrahim Kamel, Maha AlaaEddin, Waheeb Yaqub, and Kareem Kamel
International Journal of Big Data Intelligence (IJBDI), vol. 3, issue 3, pp. 190-201; May 2016
Attacking the smart grid using public information
Charalambos Konstantinou, Marios Sazos, and Michail Maniatakos
17th Latin-American Test Symposium (LATS), pp.105-110; Apr. 2016
Thwarting timing attacks on NEMS relay based designs
Bodhisatwa Mazumdar, Samah M. Saeed, , Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 34th VLSI Test Symposium (VTS), pp. 1-4; Apr. 2016
Do you trust your chip?
Ozgur Sinanoglu
International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1-1; Apr. 2016
SDMEC: Software Defined System for Mobile Edge Computing
Yaser Jararweh, Ahmad Doulat, Ala’ Darabseh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa
IEEE International Conference on Cloud Engineering Workshop (IC2EW), pp. 88-93; Apr. 2016
System, Method and Computer-Accessible Medium for Satisfiability Attack Resistant Logic Locking
Ozgur Sinanoglu, Muhammed Yasin, and Jeyavijayan Rajendran
U.S. Patent pending, filed Mar. 2016
Activation of logic encrypted chips: Pre-test or post-test?
Muhammad Yasin, Samah M. Saeed, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE/ACM Design Automation Test in Europe Conference (DATE), pp. 139-144; Mar. 2016
Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds
Anastasis Keliris, Charalambos Konstantinou, Nektarios G. Tsoutsos, Raghad Baiad, and Michail Maniatakos
21st Asia and South Pacific Design Automation Conference (ASPDAC), pp. 511-518; Jan. 2016
Adapting to Varying Distribution of Unknown Response Bits
Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 21, issue 2, pp. 33:1-33:22; Jan. 2016
Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage
Jeyavijayan Rajendran, Arunshankar M. Dhandayuthapany, Vivekananda Vedula, and Ramesh Karri
29th International Conference on VLSI Design (VLSID) and 15th International Conference on Embedded Systems, pp. 547-552; Jan. 2016
Fault Attacks on AES and Their Countermeasures
Sk Subidh Ali, Xiaofei Guo, Ramesh Karri, and Debdeep Mukhopadhyay
Secure System Design and Trustable Computing, pp. 163-208; 2016
2015
Nektarios G. Tsoutsos and Michail Maniatakos
10th International Design and Test (IDT) Symposium, pp. 5-8; Dec. 2015
Transforming between logic locking and IC camouflaging
Muhammad Yasin and Ozgur Sinanoglu
10th International Design and Test Symposium (IDT), pp. 1-4; Dec. 2015
Codo: Fundraising with Conditional Donations
Juan Felipe-Beltran, Aysha Siddique, Azza Abouzied, and Jay Chen
28th Annual ACM Symposium on User Interface Software & Technology (UIST), pp. 213-222; Nov. 2015
Impact of firmware modification attacks on power systems field devices
Charalambos Konstantinou and Michail Maniatakos
IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 283-288; Nov. 2015
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving
Michail Maniatakos, Maria Michael, and Yiorgos Makris
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, issue 11, pp. 2447-2460; Nov. 2015
Belling the CAD: Toward Security-Centric Electronic System Design
Jeyavijayan Rajendran, Aman Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 11, pp. 1756-1769; Nov. 2015
ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, and Ramesh Karri
IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 544-551; Nov. 2015
On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks
Jerry Backer, David Hély, and Ramesh Karri
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 29-34; Oct. 2015
Secure design-for-debug for Systems-on-Chip
Jerry Backer, David Hély, and Ramesh Karri
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2015
Can assay outcomes of digital microfluidic biochips be manipulated?
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE International Conference on Computer Design (ICCD); Oct. 2015
Scan attack on Elliptic Curve Cryptosystem
Sk Subidh Ali and Ozgur Sinanoglu
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 115-118; Oct. 2015
Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems
Vinayaka Jyothi, Sateesh K. Addepalli, and Ramesh Karri
33rd IEEE International Conference on Computer Design (ICCD), pp. 266-272; Oct. 2015
Timing attack on NEMS relay based design of AES
Samah M. Saeed, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 264-269; Oct. 2015
Extending residue-based fault tolerance to encrypted computation
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2015
Security analysis of logic encryption against the most effective side-channel attack: DPA
Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 97-102; Oct. 2015
Adaptive Congestion Control for Unpredictable Cellular Networks
Yasir Zaki, Thomas Potsch, Jay Chen, Lakshminarayanan Subramanian, and Carmelita Görg
ACM Special Interest Group on Data Communication (SIGCOMM), pp. 509-522; Aug. 2015
Security analysis of concurrent error detection against differential fault analysis
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri
Journal of Cryptographic Engineering, vol. 5, issue 3, pp. 153-169; Sep. 2015
Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations
Anastasis Keliris, Vasilis Dimitsas, Olympia Kremmyda, Dimitris Gizopoulos, and Michail Maniatakos
25th International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 25-32; Sep. 2015
Revisiting Vulnerability Analysis in Modern Microprocessors
Michail Maniatakos, Maria Michael, Chandra Tirumurti, and Yiorgos Makris
IEEE Transactions on Computers (TC), vol. 64, issue 9, pp. 2664-2674; Sep. 2015
WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad
24th USENIX Security Symposium, pp. 1025-1040; Aug. 2015
Harnessing data loss with forgetful data structures
Azza Abouzied and Jay Chen
6th ACM Symposium on Cloud Computing (SOCC), pp. 168-173; Aug. 2015
Computing within Limits and ICTD
Jay Chen
1st Workshop on Computing within Limits (LIMITS); Jul. 2015
Reliable Integrity Checking in Multicore Processors
Arun Kanuparthi and Ramesh Karri
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 2, pp. 10:1-10:23; Jul. 2015
Power analysis attacks on ARX: An application to Salsa20
Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 21st International On-Line Testing Symposium (IOLTS), pp. 40-43; Jul. 2015
Fortifying Android Patterns using Persuasive Security Framework
Hossein Siadati, Payas Gupta, Sarah Smith, Nasir Memon, and Mustaque Ahamad
9th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies of UBICOMM; Jul. 2015
Randomized gossip algorithms for solving Laplacian systems
Anastasios Zouzias and Nikolaos M. Freris
IEEE European Control Conference (ECC), pp. 1920-1925; Jul. 2015
Exploiting small leakages in masks to turn a second-order attack into a first-order attack
Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, and Ramesh Karri
4th Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pp. 7:1-7:5; Jun. 2015
Detecting malicious modifications of data in third-party intellectual property cores
Jeyavijayan Rajendran, Vivekananda Vedula, and Ramesh Karri
52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2015
The HEROIC Framework: Encrypted Computation Without Shared Keys
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 6, pp. 875-888; Jun. 2015
A secure design-for-test infrastructure for lifetime security of SoCs
Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hély, Ozgur Sinanoglu, and Ramesh Karri
IEEE International Symposium on Circuits and Systems (ISCAS), pp. 37-40; May 2015
The persistence of paper: a case study in microfinance from Ghana
Ishita Ghosh, Jay Chen, Joy Ming, and Azza Abouzied
7th International Conference on Information and Communication Technology for Development (ICTD), pp. 13:1-13:10; May 2015
Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures
Sk Subidh Ali, Samah M. Saeed, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 808-821; May 2015
Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor Memories
Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri, and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 822-834; May 2015
Cyber-physical systems: A security perspective
Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Yier Jin
20th IEEE European Test Symposium (ETS), pp. 1-8; May 2015
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
Proceedings of the IEEE, vol. 103, issue 5, pp. 829-849; May 2015
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni, Chenglu Jin, and Ramesh Karri
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 124-129; May. 2015
Edited proceedings: Media Watermarking, Security, and Forensics
Adnan M. Alattar, Nasir Memon, and Chad D. Heitzenrater
CD Heitzenrater Proc. of SPIE-IS, vol. 9409, 940901-1; Apr. 2015
TMO: A new class of attack on cipher misusing test infrastructure
Sk Subidh Ali and Ozgur Sinanoglu
IEEE 33rd VLSI Test Symposium (VTS), pp. 1-4; Apr. 2015
MAGIC: Malicious Aging in Circuits/Cores
Naghmeh Karimi, Arun Kanuparthi, Xueyang Wang, Ramesh Karri, and Ozgur Sinanoglu
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 1, pp. 5:1-5:25; Apr. 2015
Phoneypot: Data-driven Understanding of Telephony Threats
Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, and Mustaque Ahamad
20th Annual Network and Distributed System Security Symposium (NDSS); Feb. 2015
Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks
Tzipora Halevi, Nasir Memon, and Oded Nov
Social Science Research Network (SSRN); Jan. 2015
Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures
Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 1, pp. 2-15; Jan. 2015
Recent advances in counter PRNU based source attribution and beyond
Ahmet Karaküҫük, Ahmet E. Dirik, Hüsrev T. Sencar, and Nasir Memon
SPIE 9409, Media Watermarking, Security, and Forensics, vol. 9409, pp. 9409-9409-11; Mar. 2015
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Charalambos Konstantinou, Anastasis Keliris, and Michail Maniatakos
Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 333-338; Mar. 2015
Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors
Jeyavijayan Rajendran, Ramesh Karri, and Garrett S. Rose
IEEE Transactions on Computers (TC), vol. 64, issue 3, pp. 733-746; Mar. 2015
Security verification of 3rd party intellectual property cores for information leakage
Vivekananda Vedula, Jeyavijayan Rajendran, Arunshankar M. Dhandayuthapany, and Ramesh Karri
Proceedings of the GOMACTECH; Mar. 2015
Compressive mining: fast and optimal data mining in the compressed domain
Michail Vlachos, Nikolaos M. Freris, and Anastasios Kyrillidis
Very Large Data Bases (VLDB) Journal, vol. 24, issue 1, pp. 1-24; Feb. 2015
Fault Analysis-Based Logic Encryption
Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S. Rose, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computers (TC), vol. 64, issue 2, pp. 410-424; Feb. 2015
2014
FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions
Henry Corrigan-Gibbs, Jay Chen
5th ACM Symposium on Computing for Development (DEV), pp. 1-10; Dec. 2014
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
Ahmet E. Dirik, Hüsrev T. Sencar, Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, issue 12, p. 2277-2290; Dec. 2014
AES design space exploration new line for scan attack resiliency
Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE 22nd International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 1-6; Oct. 2014
Towards automatic detection of child pornography
Napa Sae-Bae, Xiaoxi Sun, Hüsrev T. Sencar, and Nasir Memon
IEEE International Conference on Image Processing (ICIP), pp. 5332-5336; Oct. 2014
DfST: Design for secure testability
Samah M. Saeed
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2014
Test-mode-only scan attack and countermeasure for contemporary scan architectures
Samah M. Saeed, Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2014
A semi-automatic deshredding method based on curve matching
Shize Shang, Hüsrev T. Sencar, Nasir Memon, and Xiangwei Kong
IEEE International Conference on Image Processing (ICIP), pp. 5537-5541; Oct. 2014
M3AAWG Telephony Honeypots: Benefits and Deployment Options
Payas Gupta, Mustaque Ahamad, Jonathan Curtis, Vijay Balasubramaniyan, and Alex Bobotek
Messaging, Malware and Mobile Anti-Abuse Working Group (MAAWG); Aug. 2014
Regaining Trust in VLSI Design: Design-for-Trust Techniques
Jeyavijayan Rajendran, Ozgur Sinanoglu and Ramesh Karri
Proceedings of the IEEE, vol. 102, issue 8, pp. 1266-1282; Aug. 2014
Exploring Internet Security Perceptions and Practices in Urban Ghana
Jay Chen, Michael Paik, and Kelly McCabe
Symposium On Usable Privacy and Security (SOUPS), pp. 129-142; Jul. 2014
Secure memristor-based main memory
Sachhidh Kannan, Naghmeh Karimi, and Ozgur Sinanoglu
51st ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2014
A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures
Erkam Uzun and Hüsrev T. Sencar
Speech Communication, vol. 61, issue 6, pp. 1-16; Jun. 2014
New Scan Attacks Against State-of-the-art Countermeasures and DFT
Sk Subidh Ali,Ozgur Sinanoglu, Samah M. Saeed, and Ramesh Karri
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 142-147; May 2014
Test-mode-only scan attack using the boundary scan chain
Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
19th IEEE European Test Symposium (ETS), pp. 1-6; May 2014
Detection, diagnosis, and repair of faults in memristor-based memories
Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri, and Ozgur Sinanoglu
IEEE 32nd VLSI Test Symposium (VTS), pp. 1-6; Apr. 2014
Design for Testability Support for Launch and Capture Power Reduction in Launch-Off-Shift and Launch-Off-Capture Testing
Samah M. Saeed and Ozgur Sinanoglu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, issue 3, pp. 516-521; Mar. 2014
Keystroke Biometrics: the user perspective
Chee M. Tey, Payas Gupta, Kartik Muralidharan, and Debin Gao
4th ACM conference on Data and Application Security and Privacy (CODASPY), pp. 289-296; Mar. 2014
2013
New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure
Sk Subidh Ali, Samah M. Saeed, Ozgur Sinanoglu, and Ramesh Karri
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 48-68; Oct. 2013
Audio codec identification from coded and transcoded audios
Samet Hicsonmez, Hüsrev T. Sencar and Ismail Avcibas
Elsevier Digital Signal Processing, vol. 23, issue 5, pp. 1720-1730; Sep. 2013
Seam-carving based anonymization against image & video source attribution
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 272-277; Sep. 2013
ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates
Terry Nelms, Roberto Perdisci, and Mustaque Ahamad
22nd USENIX Security Symposium, pp. 589-604; Aug. 2013
Selective Robust Image Encryption for Social Networks
Ahmet E. Dirik and Nasir Memon
Multimedia Communications, Services and Security (MCSS), pp. 71-81; Jun. 2013
Reconciling the IC test and security dichotomy
Ozgur Sinanoglu, Naghmeh Karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Ke Huang, and Yiorgos Makris
18th IEEE European Test Symposium (ETS), pp. 1-6, May 2013
Embedded tutorial: Regaining hardware security and trust
Ozgur Sinanoglu
14th Latin American Test Workshop (LATW), pp. 1-1; Apr. 2013
Is Split Manufacturing Secure?
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1259-1264; Mar. 2013
Sensor fingerprint matching in large image and video databases
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
U.S. Patent No. US 8374386 B2; Feb. 2013
Methods for identifying traces of compression in audio
Samet Hicsonmez, Erkam Uzun, and Hüsrev T. Sencar
1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA’13), pp. 1-6; Feb. 2013
2012
Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, issue 4, pp. 1404-1413; Aug. 2012
Security analysis of logic obfuscation
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
49th ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 83-89; Jun. 2012
Applying IC testing concepts to secure ICs
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
Government MicroCircuit Applications and Critical Technology Conference; Mar. 2012
Logic encryption: A fault analysis perspective
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 953-958; Mar. 2012
2011
2010
Efficient techniques for sensor fingerprint matching in large image and video databases
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
Proceedings of SPIE, Media Forensics and Security II, vol. 7541, pp. 7541-7541-8; Jan. 2010