Publications & Patents

2022
Design-time exploration of voltage switching against power analysis attacks in 14 nm FinFET technology
J Knechtel, T Ashraf, N Fernengel, S Patnaik, M Nabeel, M Ashraf, O Sinanoglu, H Amrouch
Integration, vol. 85, pp. 27-34; Jul. 2022

NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
MM Ahmadi, L Alrahis, A Colucci, O Sinanoglu, M Shafique
arXiv preprint arXiv:2206.00402; Jun. 2022

You have been warned: Abusing 5G’s Warning and Emergency Systems
E Bitsikas, C Pöpper
arXiv preprint arXiv:2207.02506; Jul. 2022

NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
M Morid Ahmadi, L Alrahis, A Colucci, O Sinanoglu, M Shafique
arXiv e-prints, pp. arXiv: 2206.00402; Jun. 2022

A new paradigm in split manufacturing: Lock the FEOL, unlock at the BEOL
A Sengupta, M Nabeel, M Ashraf, J Knechtel, O Sinanoglu
Cryptography, vol. 6, issue 2, pp. 22; May. 2022

PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations
M Alam, E Sarkar, M Maniatakos
arXiv preprint arXiv:2205.13523; May. 2022

Towards Security-Optimized Placement of ADS-B Sensors
A Darabseh, C Pöpper
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 39-44; May. 2022

Benchmarking Security Closure of Physical Layouts: ISPD 2022 Contest
J Knechtel, J Gopinath, M Ashraf, J Bhandari, O Sinanoglu, R Karri
Proceedings of the 2022 International Symposium on Physical Design, pp. 221-228; Apr. 2022

FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chainusing stateful system-level fuzzing
A Bytes, PHN Rajput, M Maniatakos, J Zhou
arXiv preprint arXiv:2204.13499; Apr. 2022

Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic
E Chielle, O Mazonka, H Gamil, M Maniatakos
arXiv preprint arXiv:2204.12201; Apr. 2022

CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution
M Nabeel, D Soni, M Ashraf, MA Gebremichael, H Gamil, E Chielle, R Karri, M Sanduleanu, M Maniatakos
arXiv preprint arXiv:2204.08742; Apr. 2022

Scalable privacy-preserving cancer type prediction with homomorphic encryption
E Sarkar, E Chielle, G Gursoy, L Chen, M Gerstein, M Maniatakos
arXiv preprint arXiv:2204.05496; Apr. 2022

MuxLink: circumventing learning-resilient MUX-locking using graph neural network-based link prediction
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 694-699; Mar. 2022

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Y Wang, W Li, E Sarkar, M Shafique, M Maniatakos, SE Jabari
arXiv preprint arXiv:2203.09289; Mar. 2022

Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking
N Limaye, S Patnaik, O Sinanoglu
IEEE Transactions on Information Forensics and Security, Vol. 17, pp. 744-759; Feb. 2022

ICSML: Industrial Control Systems Machine Learning inference framework natively
C Doumanidis, PHN Rajput, M Maniatakos
arXiv preprint arXiv:2202.10075; Feb. 2022

Privacy-preserving genotype imputation with fully homomorphic encryption
G Gürsoy, E Chielle, CM Brannon, M Maniatakos, M Gerstein
Cell Systems, vol. 13, issue 2, pp. 173-182. e3; Feb. 2022

HPC-based Malware Detectors Actually Work: Transition to Practice After a Decade of
C Konstantinou, X Wang, P Krishnamurthy, F Khorrami, M Maniatakos, R Karri
IEEE Design & Test; Jan. 2022

2021
SCANet: Securing the Weights With Superparamagnetic-MTJ Crossbar Array Networks
D Rajasekharan, N Rangarajan, S Patnaik, O Sinanoglu, YS Chauhan
IEEE transactions on neural networks and learning systems; Dec. 2021

MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
arXiv preprint arXiv:2112.07178; Dec. 2021

Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
N Limaye, AB Chowdhury, C Pilato, M Nabeel, O Sinanoglu, S Garg, R Karri
2021 58th ACM/IEEE Design Automation Conference (DAC), pp. 91-96; Dec. 2021

SuperVAULT: Superparamagnetic Volatile AUxiLiary Tamper-Proof Storage
N Rangarajan, J Knechtel, D Rajasekharan, O Sinanoglu
IEEE Embedded Systems Letters, Nov. 2021

Security Closure of Physical Layouts ICCAD Special Session Paper
J Knechtel, J Gopinath, J Bhandari, M Ashraf, H Amrouch, S Borkar, S-Kyu Lim, O Sinanoglu, R Karri
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1-9; Nov. 2021

Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper
J Lienig, S Rothe, M Thiele, N Rangarajan, M Ashraf, M Nabeel, H Amrouch, O Sinanoglu, J Knechtel
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp. 1-9; Nov. 2021

UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction
L Alrahis, S Patnaik, MA Hanif, M Shafique, O Sinanoglu
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), pp.1-9; Nov. 2021

OMLA: An Oracle-less Machine Learning-based Attack on Logic Locking
L Alrahis, S Patnaik, M Shafique, O Sinanoglu
IEEE Transactions on Circuits and Systems II: Express Briefs; Sep. 2021

Digitally-Assisted Mixed-Signal Circuit Security
J Leonhard, N Limaye, S Turk, A Sayed, ARD Rizo, H Aboushady, O Sinanoglu, H-G Stratigopoulos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2021

GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
L Alrahis, A Sengupta, J Knechtel, S Patnaik, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2021

Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems
Y Wang, E Sarkar, W Li, M Maniatakos, SE Jabari
IEEE Transactions on Information Forensics and Security; Sep. 2021

GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-based Oracle-less Unlocking Schemes for Provably Secure Logic Locking
L Alrahis, S Patnaik, MA Hanif, H Saleh, M Shafique, O Sinanoglu
IEEE Transactions on Emerging Topics in Computing, issue 01, pp. 1-1; Sep. 2021

AntiDOTE: Protecting Debug against Outsourced Test Entities
N Limaye, C Wachsmann, M Nabeel, M Ashraf, A Kanuparthi, O Sinanoglu
IEEE Transactions on Emerging Topics in Computing; Aug. 2021

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
E Sarkar, M Maniatakos
arXiv preprint arXiv:2108.10132; Aug. 2021

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
A Sengupta, N Limaye, O Sinanoglu
IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 418-440; July. 2021

Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption
E Sarkar, E Chielle, G Gürsoy, O Mazonka, M Gerstein, M Maniatakos
IEEE Access, vol. 9, pp. 93097-93110; Jun. 2021

PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans
N Limaye, N Rangarajan, S Patnaik, O Sinanoglu, K Basu
IEEE Transactions on Emerging Topics in Computing, issue 01, pp. 1-1; Jun. 2021

Cybersecurity in construction: Where do we stand and how do we get better prepared
Bharadwaj RK Mantha, Borja García de Soto
Frontiers in Built Environment, vol. 7, pp. 612668; May. 2021

Interposer-Based Root of Trust
T Mandal, G Chacon, J Knechtel, O Sinanoglu, P Gratz, V Soteriou
arXiv preprint arXiv:2105.02917; May. 2021

High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security
Christina Pöpper
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, pp. 3-4; May. 2021

System, method and computer-accessible medium for stripped-functionality logic locking
O Sinanoglu, J Rajendran, M Yasin
US Patent 10,990,580; Apr. 2021

Guest Editorial: Special Issue On Emerging Technologies in Computer Design
O Sinanoglu, U Ogras
IEEE Transactions on Emerging Topics in Computing, vol. 9, issue. 1, pp. 5-6; Mar. 2021

Cyber security research in the Arab region: a blooming ecosystem with global ambitions
Christina Pöpper, Michail Maniatakos, Roberto Di Pietro
Communications of the ACM, vol. 64, issue. 4, pp.96-101 ; Mar. 2021

UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
L Alrahis, S Patnaik, J Knechtel, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2508-2523; Feb. 2021

Towards Non-intrusive Malware Detection for Industrial Control Systems
PHN Rajput, M Maniatakos
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1703-1706; Feb. 2021

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance
K Jansen, L Niu, N Xue, I Martinovic, C Pöpper
Proceedings of the Network and Distributed System Security Symposium (NDSS); Feb. 2021

Concerted wire lifting: Enabling secure and cost-effective split manufacturing
S Patnaik, M Ashraf, H Li, J Knechtel, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Feb. 2021

A Cross-Layer Framework For Cost-Effective Intellectual Property (IP) Protection
Farinaz Koushanfar, Jeyavijayan Rajendran, Yiorgos Makris, Ozgur Sinanoglu
University of California, San DiegoUniversity of Texas at DallasNew York University; Feb. 2021

Real-time Private Membership Test using Homomorphic Encryption
E Chielle, H Gamil, M Maniatakos
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1282-1287; Feb. 2021

Operational Technology on Construction Sites: A Review from the Cybersecurity Perspective.
Muammer Semih Sonkor, Borja García de Soto
ASCE’s Journal of Construction Engineering and Management, [In press]; 2021

Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Christina Pöpper
Association for Computing Machinery; 2021

5G SUCI-Catchers: Still catching them all?
M Chlosta, D Rupprecht, C Pöpper, T Holz; 2021

SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data.
T Schnitzler, MS Mirza, M Dürmuth, C Pöpper
Proc. Priv. Enhancing Technol, vol. 2021, issue (1), pp. 229-249; 2021

ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications
Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos
30th {USENIX} Security Symposium ({USENIX} Security 21); 2021

2020
UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking
Lilas Alrahis, Satwik Patnaik, Johann Knechtel, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
arXiv preprint arXiv:2012.14938; Dec. 2020

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking
Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu
arXiv preprint arXiv:2012.05948; Dec. 2020

System, method and computer-accessible medium for satisfiability attack resistant logic locking
Ozgur Sinanoglu, Muhammad Yasin, Jeyavijayan Rajendra
US Patent 10,853,523; Dec. 2020

Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits
Shubham Rai, Satwik Patnaik, Ansh Rupani, Johann Knechtel, Ozgur Sinanoglu, Akash Kumar
IEEE Transactions on Emerging Topics in Computing; Nov. 2020

Deep Learning Analysis for Split Manufactured Layouts with Routing Perturbation
Haocheng Li, Satwik Patnaik, Mohammed Ashraf, Haoyu Yang, Johann Knechtel, Bei Yu, Ozgur Sinanoglu, Evangeline FY Young
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Nov. 2020

Design Flow for Active Interposer-Based 2.5-D ICs and Study of RISC-V Architecture With Secure NoC
H Park, J Kim, VCK Chekuri, MA Dolatsara, M Nabeel, A Bojesomo, S Patnaik, Ozgur Sinanoglu, M Swaminathan, S Mukhopadhyay, J Knechtel, Sung Kyu Lim
IEEE Transactions on Components, Packaging and Manufacturing Technology; Oct. 2020

Thwarting All Logic Locking Attacks: Dishonest Oracle with Truly Random Logic Locking
Nimisha Limaye, Emmanouil Kalligeros, Nikolaos Karousos, Irene G Karybali, Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Oct. 2020

Guest Editors’ Introduction: Special Issue on Emerging Technologies in Computer Design
Ozgur Sinanoglu, Umit Ogras
IEEE Annals of the History of Computing 8 (04),pp. 887-888; Oct. 2020

2.5 D Root of Trust: Secure System-Level Integration of Untrusted Chiplets
M Nabeel, M Ashraf, S Patnaik, V Soteriou, O Sinanoglu, J Knechtel
IEEE Transactions on Computers 69 (11),pp. 1611-1625; Sep. 2020

Power Side-Channel Attacks in Negative Capacitance Transistor
J Knechtel, S Patnaik, M Nabeel, M Ashraf, Y S Chauhan, J Henkel, Ozgur Sinanoglu, H Amrouch
IEEE Micro 40 (6),pp. 74-84; Jul. 2020

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking
B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, …
arXiv preprint arXiv:2006.06806; Jun. 2020

Design Obfuscation versus Test
Farimah Farahmandi, Ozgur Sinanoglu, Ronald Blanton, Samuel Pagliarini
2020 IEEE European Test Symposium (ETS),pp. 1-10; May. 2020

System, method and computer-accessible medium providing secure integrated circuit camouflaging for minterm protection
Ozgur Sinanoglu, Jeyavijayan Rajendran, Muhammad Yasin
US Patent 10,642,947; Jun. 2020

Explainability Matters: Backdoor Attacks on Medical Imaging
Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout
arXiv preprint arXiv:2101.00008; Dec. 2020

Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining
Anand Agrawal, Marios Sazos, Ahmed Al Durra, Michail Maniatakos
Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, pp. 31-36; Nov. 2020

Demonstration of man in the middle attack on a feeder power factor correction unit
L Hadjidemetriou, G Tertytchny, H Karbouj, C Charalambous, M K Michael, M Sazos, M Maniatakos
2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), pp. 126-130; Oct. 2020

CPSIOTSEC’20: 2020 Joint Workshop on CPS&IoT Security and Privacy
Michail Maniatakos, Yuqing Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 2135-2136; Oct. 2020

Demonstration of Man in the Middle Attack on a Commercial Photovoltaic Inverter Providing Ancillary Services
G Tertytchny, H Karbouj, L Hadjidemetriou, C Charalambous, M K Michael, M Sazos, M Maniatakos
2020 IEEE CyberPELS (CyberPELS), pp. 1-7; Oct. 2020

Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers
Dimitrios Tychalas, Michail Maniatakos
2020 IEEE 38th International Conference on Computer Design (ICCD), pp. 33-36; Oct. 2020

I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems
Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 744-758; Oct. 2020

Muon-Ra: Quantum random number generation from cosmic rays
H Gamil, P Mehta, E Chielle, A Di Giovanni, M Nabeel, F Arneodo, M Maniatakos
2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 1-6; Jul. 2020

Encrypt-Everything-Everywhere: ISA Extensions for Private Computation
E Chielle, NG Tsoutsos, O Mazonka, M Maniatakos
IEEE Transactions on Dependable and Secure Computing; Jul. 2020

FaceHack: Triggering backdoored facial recognition systems using facial characteristics
E Sarkar, H Benkraouda, M Maniatakos
arXiv preprint arXiv:2006.11623; Jun. 2020

Stealthy Information Leakage through Peripheral Exploitation in Modern Embedded Systems
D Tychalas, A Keliris, M Maniatakos
IEEE Transactions on Device and Materials Reliability; May. 2020

SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs
H Benkraouda, MA Chakkantakath, A Keliris, M Maniatakos
2020 IEEE 38th VLSI Test Symposium (VTS),pp. 1-6; Apr. 2020

DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper
Annual Computer Security Applications Conference, pp. 304-319; Dec. 2020

On ADS-B Sensor Placement for Secure Wide-Area Multilateration
E Bitsikas, B Tedongmo, C Pöpper
Multidisciplinary Digital Publishing Institute Proceedings, vol. 59, issue 1; Dec. 2020

MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors
A Darabseh, H AlKhzaimi, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 53-64; Jul. 2020

Protecting wi-fi beacons from outsider forgeries
M Vanhoef, P Adhikari, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 155-160; Jul. 2020

Imp4gt: Impersonation attacks in 4g networks
D Rupprecht, K Kohls, T Holz, C Pöpper
Symposium on Network and Distributed System Security (NDSS). ISOC; Feb. 2020

On ADS-B Sensor Placement for Secure Wide-Area Multilateration
A Darabseh, E Bitsikas, B Tedongmo, C Pöpper
Multidisciplinary Digital Publishing Institute Proceedings, vol. 59, issue 1, pp. 3

Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th {USENIX} Security Symposium ({USENIX} Security 20), pp. 1985-2002; 2020

Thwarting Bio-IP Theft Through Dummy-Valve-based Obfuscation
Mohammed Shayan, Sukanta Bhattacharjee, Ajymurat Orozaliev, Yong-Ak Song, Krishnendu Chakrabarty, Ramesh Karri
IEEE Transactions on Information Forensics and Security; Dec. 2020

Cyber Security Threat Modeling in the AEC Industry: An Example for the Commissioning of the Built Environment
Bharadwaj Mantha, Borja García de Soto, Ramesh Karri
Sustainable Cities and Society, pp. 102682; Dec. 2020

Computer aided design (CAD) model search and retrieval using frequency domain file conversion
Wenjin Li, Gary Mac, Nektarios Georgios Tsoutsos, Nikhil Gupta, Ramesh Karri
Additive Manufacturing 36, vol. 36, pp. 101554; Dec. 2020

Hardware Architectures for Post-Quantum Digital Signature Schemes
Deepraj Soni, Kanad Basu, Mohammed Nabeel, Najwa Aaraj, Marc Manzano, Ramesh Karri
Springer Nature; Nov. 2020

Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective
Samrat Acharya, Yury Dvorkin, Hrvoje Pandžić, Ramesh Karri
IEEE Access, vol. 8, pp. 214434-214453; Nov. 2020

Explaining and Interpreting Machine Learning CAD Decisions: An IC Testing Case Study
Prashanth Krishnamurthy, Animesh Basak Chowdhury, Benjamin Tan, Farshad Khorrami, Ramesh Karri
Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 129-134; Nov. 2020

DAVE: Deriving Automatically Verilog from English
Hammond Pearce, Benjamin Tan, Ramesh Karri
Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27-32; Nov. 2020

A Survey of Cybersecurity of Digital Manufacturing
P Mahesh, A Tiwari, C Jin, PR Kumar, AL N Reddy, STS Bukkapatanam, N Gupta, R Karri
Proceedings of the IEEE; Nov. 2020

PROGRAM COMMITTEE (CASES)
PP Pande, U Ogras, A Akoglu, L Bauer, S Bhunia, O Bringmann, R Karri, …
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue 11, pp. 4293; Nov. 2020

Security Assessment of Interposer-based Chiplet Integration
Mohammed Shayan, Kanad Basu, Ramesh Karri
arXiv preprint arXiv:2010.13155

ASSURE: RTL Locking Against an Untrusted Foundry
Christian Pilato, Animesh Basak Chowdhury, Donatella Sciuto, Siddharth Garg, Ramesh Karri
arXiv preprint arXiv:2010.05344

Exposing Hardware Trojans in Embedded Platforms via Short-Term Aging
Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Ramesh Karri, Farshad Khorrami
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue. 11, pp. 3519-3530; Oct. 2020

Determining an aspect of behavior of an embedded device such as, for example, detecting unauthorized modifications of the code and/or behavior of an embedded device
Farshad Khorrami, Ramesh Karri, Prashanth Krishnamurthy
US Patent 10,783,248; Sep. 2020

Training Data Poisoning in ML-CAD: Backdooring DL-based Lithographic Hotspot Detectors
Kang Liu, Benjamin Tan, Ramesh Karri, Siddharth Garg
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2020

Cybersecurity Road Map for Digital Manufacturing
Nektarios Georgios Tsoutsos, Nikhil Gupta, Ramesh Karri
Computer, vol. 53, issue 9, pp.80-84

Towards Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
Benjamin Tan, Rana Elnaggar, Jason M Fung, Ramesh Karri, Krishnendu Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Aug. 2020

Security Against Data-Sniffing and Alteration Attacks in IJTAG
Rana Elnaggar, Ramesh Karri, Krishnendu Chakrabarty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Aug. 2020

Adversarial Perturbation Attacks on ML-based CAD: A Case Study on CNN-based Lithographic Hotspot Detection
K Liu, H Yang, Y Ma, B Tan, B Yu, EFY Young, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 25, issue 5; pp. 1-31; Aug 2020

Challenges and New Directions for AI and Hardware Security
Benjamin Tan, Ramesh Karri
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 277-280; Aug. 2020

System, method and computer-accessible medium for network intrusion detection
Sateesh K Addepalli, Ramesh Karri, Vinayaka Jyothi
US Patent 10,735,438; Aug. 2020

A Survey of Cybersecurity and Resilience of Digital Manufacturing
Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R Kumar, AL Reddy, Satish TS Bukkapatanam, Nikhil Gupta, Ramesh Karri
arXiv preprint arXiv:2006.05042; Jun. 2020

Anomaly Detection in Embedded Systems Using Power and Memory Side Channels
Jiho Park, Virinchi Roy Surabhi, Prashanth Krishnamurthy, Siddharth Garg, Ramesh Karri, Farshad Khorrami
2020 IEEE European Test Symposium (ETS), pp. 1-2; May. 2020

Molecular Barcoding as a Defense against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics
Mohamed Ibrahim, Tung-Che Liang, Kristin Scott, Krishnendu Chakrabarty, Ramesh Karri
IEEE Transactions on Information Forensics and Security; May. 2020

Public Plug-in Electric Vehicles+ Grid Data: Is a New Cyberattack Vector Viable?
Samrat Acharya, Yury Dvorkin, Ramesh Karri
IEEE Transactions on Smart Grid; May. 2020

Security of Cloud FPGAs: A Survey
Chenglu Jin, Vasudev Gohil, Ramesh Karri, Jeyavijayan Rajendran
arXiv preprint arXiv:2005.04867; May. 2020

HACK3D: Evaluating Cybersecurity of Additive Manufacturing by Crowdsourcing
Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta, Ramesh Karri
arXiv preprint arXiv:2005.04368; May. 2020

IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference
Irene Amerini, Chang-Tsun Li, Nasir Memon, Jiwu Huang
IEEE Access, vol. 8, pp. 209657-209659; Dec. 2020

Camera identification of multi-format devices
Samet Taspinar, Manoranjan Mohanty, Nasir Memon
Pattern Recognition Letters, vol. 140, pp. 288-294; Dec. 2020

The Role of the Crowd in Countering Misinformation: A Case Study of the COVID-19 Infodemic
Nicholas Micallef, Bing He, Srijan Kumar, Mustaque Ahamad, Nasir Memon
arXiv preprint arXiv:2011.05773; Nov. 2020

Media Authentication and Forensics—New Solutions and Research Opportunities
Edward Delp, Jiwu Huang, Nasir Memon, Anderson Rocha, Matt Turek, Luisa Verdoliva
IEEE Journal of Selected Topics in Signal Processing, vol. 14, issue 5, pp. 906-909; Aug. 2020

FiFTy: large-scale file fragment type identification using convolutional neural networks
Govind Mittal, Paweł Korus, Nasir Memon
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 28-41; Jun. 2020

SMART: A Secure Magnetoelectric AntifeRromagnet-Based Tamper-Proof Non-Volatile Memory
Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ozgur Sinanoglu and Shaloo Rakheja
IEEE Access; Apr. 2020

System, method and computer-accessible medium for security-centric electronic system design
Jeyavijayan Rajendran, Ramesh Karri and Ozgur Sinanoglu
US Patent 10,614,18; Apr. 2020

DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Ozgur Sinanoglu and N Limaye
IEEE/ACM Design Automation Test in Europe Conference ; Mar. 2020

Obfuscating the interconnects: Low-cost and resilient full-chip layout camouflaging
S Patnaik, M Ashraf, O Sinanoglu and J Knechtel
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020

Mixed-Signal IP Protection Against Piracy Based on Logic Locking
Julian Leonhard, Marie-Minerve Louërat, Hassan Aboushady, Ozgur Sinanoglu and Haralampos-G Stratigopoulos
32. GI/GMM/ITG-Workshop Testmethoden und Zuverlässigkeit von Schaltungen und Systemen; Feb. 2020

Truly Stripping Functionality for Logic Locking: A Fault-based Perspective
Abhrajit Sengupta, Mohammed Nabeel, Nimisha Limaye, Mohammed Ashraf and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Jan. 2020

DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Nimisha Limaye and Ozgur Sinanoglu
arXiv preprint arXiv:2001.06724; Jan. 2020

Structural Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 77-92; 2020

The Need for Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 1-16; 2020

Post-SAT 3: Stripped-Functionality Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 103-118; 2020

A Brief History of Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 17-31; 2020

Approximate Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 69-76; 2020

Side-Channel Attacks
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 119-130; 2020

The SAT Attack
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 47-56; 2020

Post-SAT 2: Insertion of SAT-Unresolvable Structures
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 93-102; 2020

Post-SAT 1: Point Function-Based Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 57-67; 2020

Pre-SAT Logic Locking
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Trustworthy Hardware Design: Combinational Logic Locking Techniques, pp. 33-46; 2020

Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems
Yue Wang, Esha Sarkar, Michail Maniatakos and Saif Eddin Jabari
arXiv preprint arXiv:2003.07859; Mar. 2020

Practical Data-in-Use Protection Using Binary Decision Diagrams
Oleg Mazonka, Esha Sarkar, Eduardo Chielle, Nektarios Georgios Tsoutsos and Michail Maniatakos
IEEE Access, pp. 23847-23862; Jan. 2020

Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting
Esha Sarkar, Yousif Alkindi and Michail Maniatakos
IEEE Design & Test, pp. 103-110; Jan. 2020

Call Me Maybe: Eavesdropping Encrypted {LTE} Calls With ReVoLTE
David Rupprecht, Katharina Kohls, Thorsten Holz and Christina Pöpper
29th {USENIX} Security Symposium Conference({USENIX} Security 20); to appear Aug. 2020

Exploring user perceptions of deletion in mobile instant messaging applications
Theodor Schnitzler, Christine Utz, Florian M Farke, Christina Pöpper and Markus Dürmuth
Journal of Cybersecurity, Volume 6, Issue 1; Jan. 2020

Effects of Credibility Indicators on Social Media News Sharing Intent
Waheeb Yaqub, Otari Kakhidze, Morgan L Brockman, Nasir Memon and Sameer Patil
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1-14; Apr. 2020

Empirical evaluation of PRNU fingerprint variation for mismatched imaging pipelines
Sharad Joshi, Pawel Korus, Nitin Khanna and Nasir Memon
arXiv preprint arXiv:2004.01929; Apr. 2020

Camera Fingerprint Extraction via Spatial Domain Averaged Frames
Samet Taspinar, Manoranjan Mohanty and Nasir Memon
IEEE Transactions on Information Forensics and Security, pp. 3270-3282; Apr. 2020

Fusion of Camera Model and Source Device Specific Forensic Methods for Improved Tamper Detection
Ahmet Gökhan Poyraz, Ahmet Emir Dirik, Ahmet Karaküçük and Nasir Memon
arXiv preprint arXiv:2002.10123; Feb. 2020

Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks
Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris and Ramesh Karri
arXiv preprint arXiv:2004.12492; Apr. 2020

Hardware Trojan Detection Using Controlled Circuit Aging
Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri and Farshad Khorrami
IEEE Access; Apr. 2020

How Secure are Checkpoint-based Defenses in Digital Microfluidic Biochips?
Mohammed Shayan, Sukanta Bhattacharjee, Robert Wille, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Apr. 2020

COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity
Kanad Basu, Suha Sabi Hussain, Ujjwal Gupta and Ramesh Karri
IEEE Transactions on Information Forensics and Security, pp. 3213-3226; Mar. 2020

Towards Secure Checkpointing for Micro-Electrode-Dot-Array Biochips
Mohammed Shayan, Tung-Che Liang, Sukanta Bhattacharjee, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Mar. 2020

Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks
Nikhil Gupta, Akash Tiwari, Satish TS Bukkapatnam and Ramesh Karri
IEEE Access, pp. 47322-47333; Mar. 2020

NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs
Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt and Siddharth Garg
arXiv preprint arXiv:2002.08313; Feb. 2020

Towards a new thermal monitoring based framework for embedded cps device security
Naman Kamleshbhai Patel, Prashanth Krishnamurthy, Hussam Amrouch, Jörg Henkel, Michael Shamouilian, Ramesh Karri and Farshad Khorrami
IEEE Transactions on Dependable and Secure Computing; Feb. 2020

Programmable Daisychaining of Microelectrodes to Secure Bioassay IP in MEDA Biochips
Tung-Che Liang, Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp. 1269-1282; Feb. 2020

Secure Assay Execution on MEDA Biochips to Thwart Attacks Using Real-Time Sensing
Tung-Che Liang, Mohammed Shayan, Krishnendu Chakrabarty and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES), pp. 1-25; Jan. 2020

Secure and Trustworthy Cyberphysical Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Springer International Publishing; 2020

Cyberphysical Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 1-17; 2020

Mitigation: Tamper-Mitigating Routing Fabrics
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 109-133; 2020

Prevention: Tamper-Resistant Pin-Constrained Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 51-77; 2020

Security and Trust
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 19-49; 2020

Detection: Randomizing Checkpoints on Cyberphysical Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty and Ramesh Karri
Secure and Trustworthy Cyberphysical Microfluidic Biochips, pp 79-107; 2020

2019

Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory
Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu and Muhammad Yasin
International Conference on Information Technology and Communications Security, pp. 172-192; Nov. 2019

System, method and computer-accessible medium for satisfiability attack resistant logic locking
Ozgur Sinanoglu, Muhammad Yasin and Jeyavijayan Rajendran
US Patent App. 16/087,911; Nov. 2019

Trustworthy Hardware Design: Combinational Logic Locking Techniques
Muhammad Yasin, Jeyavijayan JV Rajendran and Ozgur Sinanoglu
Springer, pp. 1-xxi, 142 pages; Oct. 2019

Keynote: A Disquisition on Logic Locking
Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin and Michael Zuzak
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; Sep. 2019

System, method and computer-accessible medium for providing secure split manufacturing
J Rajendran, O Sinanoglu, R Karri
US Patent 10,423,749; Sep. 2019

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation
O Sinanoglu, L Alrahis, M Yasin, N Limaye, H Saleh
IEEE Transactions on Emerging Topics in Computing, pp. 1-1; Sep. 2019

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation
Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Alqutayri, Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing; Sep. 2019

A modern approach to IP protection and trojan prevention: Split manufacturing for 3D ICs and obfuscation of vertical interconnects
S Patnaik, M Ashraf, O Sinanoglu, J Knechtel
IEEE Transactions on Emerging Topics in Computing; Aug. 2019

Mixed-Signal Hardware Security Using MixLock: Demonstration in an Audio Application
J Leonhard, MM Louërat, H Aboushady, O Sinanoglu, HG Stratigopoulos
2019 16th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), pp. 185-188; July. 2019

3D integration: Another dimension toward hardware security
J Knechtel, S Patnaik, O Sinanoglu
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 147-150; July. 2019

Is robust design-for-security robust enough? attack on locked circuits with restricted scan chain access
N Limaye, A Sengupta, M Nabeel, O Sinanoglu
arXiv preprint arXiv:1906.07806

Toward physically unclonable functions from plasmonics-enhanced silicon disc resonators
J Knechtel, J Gosciniak, A Bojesomo, S Patnaik, O Sinanoglu, M Rasras
Journal of Lightwave Technology 37 (15), pp. 3805-3814; June. 2019

An interposer-based root of trust: Seize the opportunity for secure system-level integration of untrusted chiplets
M Nabeel, M Ashraf, S Patnaik, V Soteriou, O Sinanoglu, J Knechtel
arXiv preprint arXiv:1906.02044; June. 2019

Guest Editors Introduction: Special Section on Emerging Technologies in Computer Design
O Sinanoglu, O Khan
IEEE Transactions on Emerging Topics in Computing 7 (2), pp. 242-243; June. 2019

Attacking split manufacturing from a deep learning perspective
H Li, S Patnaik, A Sengupta, H Yang, J Knechtel, Bei Yu, E FY Young, O Sinanoglu
2019 56th ACM/IEEE Design Automation Conference (DAC), pp. 1-6; June. 2019

Revisiting Logic Locking for Reversible Computing
N Limaye, M Yasin, O Sinanoglu
2019 IEEE European Test Symposium (ETS), pp. 1-6; May 2019

Spin-orbit torque devices for hardware security: From deterministic to probabilistic regime
S Patnaik, N Rangarajan, J Knechtel, O Sinanoglu, S Rakheja
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems; May. 2019

Protect your chip design intellectual property: An overview
J Knechtel, S Patnaik, O Sinanoglu
Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 211-216; May. 2019

System, method and computer-accessible medium for stripped-functionality logic locking
O Sinanoglu, J Rajendran, M Yasin
US Patent App. 16/170,378; May. 2019

Piezo-PUF: Physical Unclonable Functions for Vacuum-Packaged, Piezoelectric MEMS
A Bojesomo, IAM Elfadel, O Sinanoglu
2019 Symposium on Design, Test, Integration and Packaging of MEMS and MOEMS, pp. 8752778; May. 2019

Mixlock: Securing mixed-signal circuits via logic locking
J Leonhard, M Yasin, S Turk, MT Nabeel, MM Louërat, R Chotin-Avot, H Aboushady, O Sinanoglu, HG Stratigopoulos
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 84-89; March. 2019

A new paradigm in split manufacturing: Lock the FEOL, unlock at the BEOL
A Sengupta, M Nabeel, J Knechtel, O Sinanoglu
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 414-419; March. 2019

Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd)–Unlocked
F Yang, M Tang, O Sinanoglu
IEEE Transactions on Information Forensics and Security 14 (10), pp. 2778-2786; March. 2019

Systems, processes and computer-accessible medium for providing a bi-directional scan path for peak capture power reduction in launch-off-shift testing
O Sinanoglu
US Patent 10,203,368; Feb. 2019

Logic Locking with Provable Security Against Power Analysis Attacks
O Sinanoglu, A Sengupta, B Mazumdar, M Yasin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1; Feb. 2019

Logic locking with provable security against power analysis attacks
A Sengupta, B Mazumdar, M Yasin, O Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 766-778; Feb. 2019

Spin-based reconfigurable logic for power-and area-efficient applications
N Rangarajan, S Patnaik, J Knechtel, SO Sinanoglu, S Rakheja
IEEE Design & Test 36 (3), pp. 22-30; Jan. 2020

ScanSAT: Unlocking obfuscated scan chains
L Alrahis, M Yasin, H Saleh, B Mohammad, M Al-Qutayri, O Sinanoglu
Proceedings of the 24th Asia and South Pacific Design Automation Conference, pp. 352-357; Jan. 2019

CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist.
A Sengupta, O Sinanoglu
IACR Cryptol. ePrint Arch. 2019, pp. 1443

Hardware security and trust: Logic locking as a design-for-trust solution
M Yasin, B Mazumdar, J Rajendran, O Sinanoglu
The IoT Physical Layer, pp. 353-373

A data-based detection method against false data injection attacks
C Konstantinou, M Maniatakos
IEEE Design & Test 37 (5), pp. 67-74; Nov. 2019

System and method for malware detection in additive manufactured parts
NG Tsoutsos, N Gupta, M Maniatakos
US Patent App. 16/295,171; Nov. 2019

Process-aware cyberattacks for thermal desalination plants
PHN Rajput, P Rajput, M Sazos, M Maniatakos
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 441-452; Jul. 2019

JTAG: A Multifaceted Tool for Cyber Security
PHN Rajput, M Maniatakos
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 155-158; Jul. 2019

LED alert: Supply chain threats for stealthy data exfiltration in industrial control systems
D Tychalas, A Keliris, M Maniatakos
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 194-199; Jul. 2019

Assessment of Low-Budget Targeted Cyberattacks Against Power Systems
M Sazos, M Maniatakos
VLSI-SoC: Design and Engineering of Electronics Systems Based on New Computing Paradigms, Vol. 561, pp. 232; Jun. 2019

Hardware-layer intelligence collection for smart grid embedded systems
C Konstantinou, M Maniatakos
Journal of Hardware and Systems Security, vol. 3, issue 2, pp. 132-146; Jun. 2019

Cophee: Co-processor for partially homomorphic encrypted execution
M Nabeel, M Ashraf, E Chielle, NG Tsoutsos, M Maniatakos
2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 131-140; Jun. 2019

On automating delayered IC analysis for hardware IP protection
E Sarkar, M Maniatakos
Proceedings of the International Conference on Omni-Layer Intelligent Systems, pp. 205-210; Jun. 2019

Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials, vol. 21, issue 4, pp. 1800495; Apr. 2019

FLEP-SGS2: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security
C Konstantinou, M Sazos, M Maniatakos
2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5; Feb. 2019

Open source intelligence for energy sector cyberattacks
A Keliris, C Konstantinou, M Sazos, M Maniatakos
Critical infrastructure security and resilience, pp. 261-281; 2019

Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data
NG Tsoutsos, M Maniatakos
Security and Fault Tolerance in Internet of Things, pp. 87-110; 2019

Quantifying the Cost of Reliable Photo Authentication via High-Performance Learned Lossy Representations
P Korus, N Memon
International Conference on Learning Representations
Sep. 2019

Image Classification Through Top-Down Image Pyramid Traversal
A Papadopoulos, P Korus, N Memon
Sep. 2019

Masterprint attack resistance: A maximum cover based approach for automatic fingerprint template selection
A Roy, N Memon, A Ross
2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS)
pp. 1-9; Sep. 2019

Camera fingerprint extraction via spatial domain averaged frames
S Taspinar, M Mohanty, N Memon arXiv preprint arXiv:1909.04573; Sep. 2019

FiFTy: Large-scale File Fragment Type Identification using Neural Networks
G Mittal, P Korus, N Memon arXiv preprint arXiv:1908.06148; Aug. 2019

Kid on the phone! Toward automatic detection of children on mobile devices
T Nguyen, A Roy, N Memon Computers & Security, vol. 84, pp. 334-348; Jul. 2019

The effect of light source on ENF based video forensics
S Vatansever, AE Dirik, N Memon; May. 2019

Factors affecting enf based time-of-recording estimation for video
S Vatansever, AE Dirik, N Memon
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2497-2501; May. 2019

Source camera attribution of multi-format devices
S Taspinar, M Mohanty, N Memon
arXiv preprint arXiv:1904.01533; Apr. 2019

Neural imaging pipelines-the scourge or hope of forensics?
P Korus, N Memon
arXiv preprint arXiv:1902.10707, Feb. 2019

Every shred helps: Assembling evidence from orphaned JPEG fragments
E Durmus, P Korus, N Memon
IEEE Transactions on Information Forensics and Security, vol. 14, issue 9, pp. 2372-2386; Feb. 2019

Analysis of rolling shutter effect on ENF-based video forensics
S Vatansever, AE Dirik, N Memon
IEEE Transactions on Information Forensics and Security, vol. 14, issue 9, pp. 2262-2275; Jan. 2019

Emerging NUI-based methods for user authentication: A new taxonomy and survey
N Sae-Bae, J Wu, N Memon, J Konrad, P Ishwar
IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 1, issue 1, pp. 5-31; Jan. 2019

Adversarial Optimization for Dictionary Attacks on Speaker Verification.
M Marras, P Korus, ND Memon, G Fenu Interspeech, pp. 2913-2917; 2019

Content authentication for neural imaging pipelines: End-to-end optimization of photo provenance in complex distribution channels
P Korus, N Memon
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition
pp. 8621-8629; 2019

2018
Systems, processes and computer-accessible medium for providing logic encryption utilizing fault analysis
O Sinanoglu, Y Pino, J Rajendran, R Karri
US Patent 10,153,769; Dec. 2018

Customized locking of IP blocks on a multi-million-gate SoC
A Sengupta, M Ashraf, M Nabeel, O Sinanoglu
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-7; Nov. 2018

Best of both worlds: Integration of split manufacturing and camouflaging into a security-driven CAD flow for 3D ICs
S Patnaik, M Ashraf, O Sinanoglu, J Knechtel
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018

Trustworthy Hardware Design: Combinational Logic Locking Techniques
O Sinanoglu, J Rajendran, M Yasin
Springer; Nov. 2018

Raise your game for split manufacturing: Restoring the true functionality through BEOL
S Patnaik, M Ashraf, J Knechtel, O Sinanoglu
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2018

ATPG-based cost-effective, secure logic locking
A Sengupta, M Nabeel, M Yasin, O Sinanoglu
2018 IEEE 36th VLSI Test Symposium (VTS), pp. 1-6; Apr. 2018

Advancing hardware security using polymorphic and stochastic spin-hall effect devices
S Patnaik, N Rangarajan, J Knechtel, O Sinanoglu, S Rakheja
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 97-102; Mar. 2018

Towards provably-secure performance locking
M Zaman, A Sengupta, D Liu, O Sinanoglu, Y Makris, JJV Rajendran
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1592-1597; Mar. 2018

Towards Provably Secure Logic Locking for Hardening Hardware Security
M Yasin, O Sinanoglu
2018 IEEE International Test Conference (ITC), pp. 1-10; 2018

Open platform systems under scrutiny: A cybersecurity analysis of the device tree
D Tychalas, M Maniatakos
2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 477-480; Dec. 2018

ICSREF: A framework for automated reverse engineering of industrial control systems binaries
A Keliris, M Maniatakos
arXiv preprint arXiv:1812.03478; Dec. 2018

Assessment of low-budget targeted cyberattacks against power systems
XR Liu, A Keliris, C Konstantinou, M Sazos, M Maniatakos
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip, pp. 232-256; Oct. 2018

Low-budget energy sector cyberattacks via open source exploitation
A Keliris, C Konstantinou, M Sazos, M Maniatakos
2018 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pp. 101-106; Oct. 2018

Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption
M Maniatakos, C Konstantinou, A Keliris
US Patent 10,079,674; Sep. 2018

Guest Editor Introduction: Embedded Security Challenge
M Maniatakos
IEEE Embedded Systems Letters, vol. 10, issue 3, pp. 81-82; Aug. 2018

Anatomy of memory corruption attacks and mitigations in embedded systems
NG Tsoutsos, M Maniatakos
IEEE Embedded Systems Letters, vol. 10, issue 3, pp. 95-98; Apr. 2018

Phylax: Snapshot-based profiling of real-time embedded devices via jtag interface
C Konstantinou, E Chielle, M Maniatakos
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 869-872; Mar. 2018

Terminator suite: Benchmarking privacy-preserving architectures
D Mouris, NG Tsoutsos, M Maniatakos
IEEE Computer Architecture Letters, vol. 17, issue 2, pp. 122-125; Mar. 2018

E3: A Framework for Compiling C++ Programs with Encrypted Operands.
E Chielle, O Mazonka, NG Tsoutsos, M Maniatakos
IACR Cryptol. ePrint Arch., vol. 2018, pp. 1013; 2018

DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
European Symposium on Research in Computer Security, pp. 512-530; Sep. 2018

Crowd-gps-sec: Leveraging crowdsourcing to detect and localize gps spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), pp. 1018-1031; May. 2018

User Perception and Expectations on Deleting Instant Messages—or—“What Happens If I Press This Button?”
T Schnitzler, C Utz, FM Farke, C Pöpper, M Dürmuth
EuroUSEC 2018 – European Workshop on Usable Security, pages 13; Apr. 2018

On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials, vol. 20, issue 3, pp. 2518-2542; Apr. 2018

Forgetting with puzzles: using cryptographic puzzles to support digital forgetting
G Amjad, MS Mirza, C Pöpper
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 342-353; Mar. 2018

Black-hat high-level synthesis: Myth or reality?
C Pilato, K Basu, F Regazzoni, R Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 27, issue 4, pp. 913-926; Dec. 2018

Systems, processes and computer-accessible medium for providing logic encryption utilizing fault analysis
O Sinanoglu, Y Pino, J Rajendran, R Karri
US Patent 10,153,769; Dec. 2018

Synthesis of tamper-resistant pin-constrained digital microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, issue 1, pp. 171-184; Nov. 2018

IC/IP piracy assessment of reversible logic
SM Saeed, X Cui, A Zulehner, R Wille, R Drechsler, K Wu, R Karri
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018

Shadow attacks on MEDA biochips
M Shayan, S Bhattacharjee, TC Liang, J Tang, K Chakrabarty, R Karri
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1-8; Nov. 2018

Hardware Trojan detection using the order of path delay
X Cui, E Koopahi, K Wu, R Karri
ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 14, issue 3, pp. 1-23; Oct. 2018

Abetting planned obsolescence by aging 3D networks-on-chip
S Das, K Basu, JR Doppa, PP Pande, R Karri, K Chakrabarty
2018 Twelfth IEEE/ACM International Symposium on Networks-on-Chip (NOCS), pp. 1-8; Oct. 2018

System, method and computer-accessible medium for security verification of third party intellectual property cores
V Vedula, J Rajendran, A Dhandayuthapany, R Karri
US Patent 10,083,303, Sep. 2018

Security assessment of micro-electrode-dot-array biochips
M Shayan, J Tang, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 10, pp. 1831-1843; Aug. 2018

Toward secure and trustworthy cyberphysical microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 4, pp. 589-603; Jul. 2018

Process-aware side channel shaping and watermarking for cyber-physical systems
P Krishnamurthy, F Khorrami, R Karri, H Salehghaffari
2018 Annual American Control Conference (ACC), pp. 386-391; Jun. 2018

TAO: Techniques for algorithm-level obfuscation during high-level synthesis
C Pilato, F Regazzoni, R Karri, S Garg
Proceedings of the 55th Annual Design Automation Conference, pp. 1-6; Jun. 2018

Tamper-resistant pin-constrained digital microfluidic biochips
J Tang, M Ibrahim, K Chakrabarty, R Karri
2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2018

Locking of biochemical assays for digital microfluidic biochips
S Bhattacharjee, J Tang, M Ibrahim, K Chakrabarty, R Karri
2018 IEEE 23rd European Test Symposium (ETS), pp. 1-6, May. 2018

Hardware Trojan detection using path delay order encoding with process variation tolerance
X Cui, K Wu, R Karri
2018 IEEE 23rd European Test Symposium (ETS), pp. 1-2; May. 2018

Tainthls: High-level synthesis for dynamic information flow tracking
C Pilato, K Wu, S Garg, R Karri, F Regazzoni
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 38, issue 5, pp. 798-808; May. 2018

Process-aware covert channels using physical instrumentation in cyber-physical systems
P Krishnamurthy, F Khorrami, R Karri, D Paul-Pena, H Salehghaffari
IEEE Transactions on Information Forensics and Security, vol. 13, issue 11, pp. 2761-2771; May. 2018

Securing IJTAG against data-integrity attacks
R Elnaggar, R Karri, K Chakrabarty
2018 IEEE 36th VLSI Test Symposium (VTS), pp. 1-6; Apr. 2018

On the difficulty of inserting trojans in reversible computing architectures
X Cui, SM Saeed, A Zulehner, R Wille, K Wu, R Drechsler, R Karri
IEEE Transactions on Emerging Topics in Computing, vol. 8, issue 4, pp. 960-972; Apr. 2018

IEEE COUNCIL ON ELECTRONIC DESIGN AUTOMATION
S Parameswaran, T Mitra, Y Chen, R Karri, …
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication; 2018

Distinctiveness, complexity, and repeatability of online signature templates
N Sae-Bae, N Memon, P Sooraksa
Pattern Recognition, vol. 84, pp. 332-344; Dec. 2018

Encrypted domain skin tone detection for pornographic image filtering
W Yaqub, M Mohanty, N Memon
2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1-5; Nov. 2018

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*              
P Bontrager, A Roy, J Togelius, N Memon, A Ross
2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)
pp. 1-9; Oct. 2018

Peeling the Onion’s User Experience Layer: Examining Naturalistic Use of the Tor Browser
K Gallagher, S Patil, B Dolan-Gavitt, D McCoy, N Memon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1290-1305;
Oct. 2018

Towards camera identification from cropped query images
W Yaqub, M Mohanty, N Memon
2018 25th IEEE International Conference on Image Processing (ICIP), pp. 3798-3802; Oct. 2018

Introduction to the special issue on integrating biometrics and forensics
M Nappi, N Memon, D Riccio, A Uhl
Pattern Recognition Letters, vol. 113, pp. 1-2; Oct. 2018

Tap-based user authentication for smartwatches
T Nguyen, N Memon
Computers & Security, vol. 78, pp. 174-186; Sep. 2018

EFFECT OF PROCESSING TREATMENTS ON THE NUTRITIVE COMPOSITION AND CONSUMER ACCEPTANCE OF RED AND WHITE TURNIP VEGETABLES WITH GREEN TOPS: Institute of Food Sciences and …
SA Sheikh, AS Shar, AA Panhwar, SM Nizamani, NS Memon
Pakistan Journal of Agriculture, Agricultural Engineering and Veterinary Sciences
vol. 34, issue 1, pp. 31-39; Jun. 2018

Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition
A Roy, N Memon, J Togelius, A Ross
2018 International Conference on Biometrics (ICB), pp. 39-46; Feb. 2018

Emerging NUI-based methods for user authentication
N Memon
2018 IEEE International Conference on Consumer Electronics (ICCE), pp. 1-1; Jan. 2018

2017

Efficient Gray-level Image Sharing Algorithm using Non- Recursive Hash Value based Stream Cipher
K.K Soundra Pandian and Hoda A. Alkhzaimi
IET Information Security; Under review 2017

FPGA Prototype of non-recursive hash key based stream cipher using sequence folding technique
K.K Soundra Pandian and Hoda A. Alkhzaimi
IACR Transactions on Symmetric Cryptology; Under review 2017

Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
Kai Jan­sen, Christina Pöpper
Proceedings of the ACM Con­fe­rence on Se­cu­ri­ty and Pri­va­cy in Wire­less and Mo­bi­le Networks (WiSec); Jul. 2017

Memory-bounded Randomness for Hardware constrained Encrypted Computation
N.G. Tsoutsos, O. Mazonka, and M. Maniatakos
IEEE International Conference on Computer Design, pp.673-680; Nov. 2017

Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests
N.G. Tsoutsos and M. Maniatakos
IEEE Asian Hardware Oriented Security and Trust Symposium, pp.1-6; Oct. 2017

GE Multilin SR Protective Relays Passcode Vulnerability
Keliris, C. Konstantinou, and M. Maniatakos
BlackHat USA; Apr. 2017

Obligations for Social Media Companies
Otto Kakhidze and Adam Ramey
International Association for Computing and Philosophy; accepted for publication 2017

TERMinator Suite: Benchmarking Privacy-Preserving Architectures
Dimitris Mouris, Nektarios Georgios Tsoutsos, and Michail Maniatakos
Cryptology ePrint Archive, report 2017/1218; Dec. 2017

Image Carving with Missing Headers and Missing Fragments
Emre Durmus, Manoranjan Mohanty, Samet Taspinar, Erkam Uzun and Nasir Memon
Information Forensics and Security (WIFS), IEEE Workshop; Dec. 2017

PRNU-Based Camera Attribution from Multiple Seam-Carved Images
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol 12, issue 12, pp. 3065 – 3080; Dec. 2017

Provably-Secure Logic Locking: From Theory To Practice
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan (JV) Rajendran and Ozgur Sinanoglu
ACM SIGSAC Conference; Nov. 2017

Detecting Structurally Anomalous Logins Within Enterprise Networks
Hossein Siadati and Nasir Memon
ACM SIGSAC Conference on Computer and Communications Security, pp. 1273-1284; Nov. 2017

Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization
Giovanni Di Crescenzo, Jeyavijayan Rajendran, Ramesh Karri and Nasir Memon
ASHES ’17 Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, pp. 7-16; Nov. 2017

Securing Hardware Accelerators: a New Challenge for High-Level Synthesis (Perspective Paper)
Christian Pilato, Siddharth Garg, Kaijie Wu, Ramesh Karri and Francesco Regazzoni
IEEE Embedded Systems Letters, vol pp, issue 99, pp. 1-1; Nov. 2017

Optimal Checkpointing for Secure Intermittently-Powered IoT Devices
Zahra Ghodsi, Siddharth Garg and Ramesh Karri
IEEE/ACM International Conference on Computer-Aided Design (ICCAD); Nov. 2017

Identifying Synthesis Approaches for IP Piracy of Reversible Circuits
Samah Mohamed Saeed, Nithin Mahendran, Alwin Zulehner, Robert Wille and Ramesh Karri
Computer Design (ICCD); Nov. 2017

Special session: emerging (Un-)reliability based security threats and mitigations for embedded systems
Hussam Amrouch, Prashanth Krishnamurthy, Naman Patel, Jörg Henkel, Ramesh Karri and Farshad Khorrami
Compilers, Architectures and Synthesis For Embedded Systems (CASES); Nov. 2017

Evolution of Logic Locking
Muhammad Yasin and Ozgur Sinanoglu
Conference Paper; VLSI SOC Abu Dhabi; Nov. 2017

Cryptanalysis of 1-Round KECCAK
Rajendra Kumar, Mahesh Sreekumar Rajasree, and Hoda AlKhzaimi
Cryptology ePrint Archive; Nov. 2017

Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging
Muhammad Yasin, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 11, pp. 2668-2682; Nov. 2017

Obfuscating the Interconnects: Low-Cost and Resilient Full-Chip Layout Camouflaging
Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, and Ozgur Sinanoglu
CoRR; Nov. 2017

Preserving privacy in pre-classification volume ray-casting of 3D images
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
IET Book Data Security in Cloud Computing (Book Chapter), pp. 45-64; Oct. 2017

Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques
Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg, and Ozgur Sinanoglu
CoRR; Oct. 2017

DPFEE: A High Performance Scalable Pre-processor for Network Security Systems
Vinayaka Jyothi, Sateesh K. Addepalli and Ramesh Karri
IEEE Transactions on Multi-Scale Computing Systems, vol. 4, issue 1, pp. 55-68; Oct. 2017

Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular Diseases
Muhammad Yasin, Temesghen Tekeste, Hani Saleh, Baker Mohammad, Ozgur Sinanoglu, and Mohammed Ismail
IEEE Transactions on Circuits and Systems I (TCSI): Regular Papers, vol. 64, issue 9, pp. 2624-2637; Sep. 2017

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
Aditi Roy, Nasir Memon, and Arun Ross
IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 9, pp. 2013-2025; Sep. 2017

A novel framework for software defined based secure storage systems
Ala’ Darabseh, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelif, Mladen Vouk, and Andy Rindos
Simulation Modelling Practice and Theory, vol. 77, pp. 407-423; Sep. 2017

Privacy-Preserving Disease Susceptibility Test with Shamir’s Secret Sharing
Guyu Fan and Manoranjan Mohanty
14th International Joint Conference on e-Business and Telecommunications (ICETE), vol. 6, pp. 525-533; Aug. 2017

Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE Transactions on Emerging Topics in Computing (TETC), vol. PP, issue 99, pp. 1-1; Aug. 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
Jairo Giraldo, Esha Sarkar, Alvaro A. Cardenas, Michail Maniatakos, and Murat Kantarcioglu
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 7-17; Aug. 2017

Large-Scale 3D Chips: Challenges and Solution for Design Automation, Testing, and Trustworthy Integration
Johann Knechtel, Ozgur Sinanoglu, Ibrahim M. Elfadel, Jens Lienig, and Cliff C. N. Sze
IPSJ Transactions System LSI Design Methodology (TSLDM), vol. 10, pp. 45-62; Aug. 2017

GPS Spoofing Effect on Phase Angle Monitoring and Control in an RTDS-based Hardware-In-The-Loop Environment
Charalambos Konstantinou, Marios Sazos, Ahmed S. Musleh, Anastasis Keliris, Ahmed Al-Durra, Michail Maniatakos
IET Cyber-Physical Systems: Theory and Applications, pp. 1-7; Aug. 2017

Secure Randomized Checkpointing for Digital Microfluidic Biochips
Jack Tang, Mohamed Ibrahim,Krishnendu Chakrabarty and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1-1; Aug. 2017

Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach
Saffet Vatansever, Ahmet Emer Dirik and Nasir Memon
IEEE Signal Processing Letters, vol. 24, issue 10; Aug. 2017

Cyber-Physical Systems Security and Privacy
Michail Maniatakos, Alvaro A. Cardenas, and Ramesh Karri
IEEE Design and Test (MDAT), vol. 34, issue 4, pp. 5-6; Aug. 2017

Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities
Swarup Bhunia, An Chen, Ozgur Sinanoglu, and Jason M. Fung
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 302-303; Jul. 2017

IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images
Athanasios Papadopoulos, Toan Nguyen, Emre Durmus and Nasir Memon
IEEE Transactions on Information Forensics and Security, vol. 12, issue 12, pp. 2875-2889; Jul. 2017

Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
Bodhisatwa Mazumdar, Samah M. Saeed, Sk Subidh Ali and Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2017

How Biometric Authentication Poses New Challenges to Our Security and Privacy
Nasir Memon
IEEE Signal Processing Magazine, vol. 34, issue 4, pp. 194-196; Jul. 2017

New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network
Kevin Gallagher, Sameer Patil, Nasir Memon
SOUPS; Jul. 2017

Smartwatches Locking Methods: A Comparative Study
Toan Nguyen and Nasir Memon
SOUPS; Jul. 2017

Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE Transactions on Computers (TC), vol. 67, issue 1, pp. 16-31; Jul. 2017

Cyber– Physical Systems Security and Privacy
Guest Editors: Michail Maniatakos, Ramesh Karri and Alvaro A. Cardenas
IEEE Design & Test, vol. 34, issue 4, pp. 5-6; Jun. 2017

Adaptive Reduction of the Frequency Search for Multi-Vdd Digital Circuits Using Variation Sensitive Ring Oscillators
Chandra K. H. Suresh, Sule Ozev, and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 36, issue 6, pp. 1043-1053; Jun. 2017

ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited
Nikhil Gupta, Fei Chen, Nektarios G. Tsoutsos, and Michail Maniatakos
ACM/EDAC/IEEE 54th Annual Design Automation Conference (DAC), pp. 82:1-82:6; Jun. 2017

Software-defined systems support for secure cloud computing based on data classification
Yaser Jararweh, Mahmoud Al- Ayyoub, Lo’ai Tawalbeh, Ala Darabseh, and Houbing Song
Annales des Telecommunications, vol. 72, issue 5-6, pp. 335-345; Jun. 2017

On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity
Johann Knechtel and Ozgur Sinanoglu
IEEE/ACM 54th Annual Design Automation Conference (DAC), pp. 12:1-12:6; Jun. 2017

Malicious firmware detection with hardware performance counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou, and Steve Kim
IEEE Transactions on Multi-Scale Computing Systems, vol. 2, issue 3, pp. 160-173; May 2017

DeepMasterPrint: Generating Fingerprints for Presentation Attacks
Philip Bontrager, Julian Togelius, and Nasir Memon
CoRR; May 2017

Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
Masooda Bashir, Colin Wee, Nasir Memon, and Boyi Guo
Computers & Security, vol. 65, pp. 153-165; May 2017

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
Toan Van Nguyen, Napa Sae-Bae, and Nasir Memon
Computers & Security, vol. 66, pp. 115-128; May 2017

On the Difficulty of Inserting Trojans in Reversible Computing Architectures
Xiaotong Cui, Samah M. Saeed, Alwin Zulehner, Robert Wille, Rolf Drechsler, Kaijie Wu, and Ramesh Karri
CoRR; May 2017

A Software Defined Architecture for Cyberphysical Systems
Ala’ Darabseh and Nikolaos M. Freris
4th International Conference on Software Defined Systems (SDS), pp. 54-60; May 2017

TTLock: Tenacious and traceless logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 166-166; May 2017

What to Lock? Functional and Parametric Locking
Muhammad Yasin, Abhrajit Sengupta, Benjamin Carrion Schafer, Yiorgos Makris, Ozgur Sinanoglu, and Jeyavijayan Rajendran
ACM Great Lakes Symposium on VLSI (GLSVLSI), pp. 351-356; May 2017

X-Platform Phishing: Abusing Trust for Targeted Attacks
Hossein Siadati, Toan Nguyen, and Nasir Memon
Targeted Attacks Conference; Apr. 2017

Towards Reverse Engineering Reversible Logic
Samah M. Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri
CoRR; Apr. 2017

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering
Nektarios G. Tsoutsos, Homer Gamil, and Michail Maniatakos
3rd ACM Workshop on Cyber-Physical System Security (CPSS), pp. 15- 20; Apr. 2017

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis
Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, and Mustaque Ahamad
Network and Distributed System Security (NDSS) Symposium, vol. 17; Mar. 2017

Demystifying Advanced Persistent Threats for Industrial Control Systems
Anastasis Keliris and Michail Maniatakos
American Society of Mechanical Engineers (ASME) Dynamic Systems and Control Magazine, vol. 139, issue 3, pp. S13-S17; Mar. 2017

Mind your SMSes: Mitigating social engineering in second factor authentication
Hossein Siadati, Toan Nguyen, Payas Gupta, Markus Jakobsson, and Nasir Memon
Computers and Security, vol. 65, pp. 14-28; Mar. 2017

Secure and Flexible Trace-Based Debugging of Systems-on-Chip
Jerry Backer, David Hely and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES) – Special Section of IDEA: Integrating Dataflow, Embedded Computing, and Architecture, vol. 22, issue 2; Mar. 2017

Automotive Electrical/Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring
Peter Waszecki, Philipp Mundhenk, Sebastian Steinhorst, Martin Lukasiewycz, Ramesh Karri, and Samarjit Chakraborty
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. PP, issue 99, pp. 1-1; Feb. 2017

A Comprehensive Design-for-Test Infrastructure In the Context Of Security-Critical Applications
Samah M. Saeed and Ozgur Sinanoglu
IEEE Design and Test (MDAT), vol. 34, issue 1, pp. 57-64; Feb. 2017

Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing
Yaser Jararweh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala’ Darabseh, Brij Gupta, and Ahmad Doulat
The Computer Journal; Feb. 2017

SGXCrypter: IP Protection for Portable Executables using Intel’s SGX Technology
Tychalas, N.G. Tsoutsos, and M. Maniatakos
Asia and South Pacific Design Automation Conference, pp. 354-359; Jan. 2017

Scan Design: Basics, Advancements, and Vulnerabilities
Samah M. Saeed, Sk Subidh Ali, and Ozgur Sinanoglu
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, pp. 107-126; Jan. 2017

Security Analysis of Anti-SAT
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
22nd Asia South Pacific Design Automation Conference (ASP-DAC), pp. 342-347 ; Jan. 2017

Physical Unclonable Functions and Intellectual Property Protection Techniques
Ramesh Karri, Ozgur Sinanoglu, and Jeyavijayan Rajendran
Fundamentals of IP and SoC Security: Design, Verification, and Debug, pp. 199-222; Jan. 2017

2016

Source camera attribution using stabilized video
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6; Dec. 2016

Secure and Flexible Trace-Based Debugging of Systems-on-Chip
Jerry Backer, David Hely, and Ramesh Karri
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 2, pp. 31:1-31:25; Dec. 2016

Machine Learning-based Defense Against Process-Aware Attacks on Industrial Control Systems
Anastasis Keliris, Hossein Salehghaffari, Brian Cairl, Prashanth Krishnamurthy, Michail Maniatakos, and Farshad Khorrami
IEEE International Test Conference (ITC), pp. 1-10; Nov. 2016

A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities
Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, issue 1, pp. 11:1-11:26; Nov. 2016

2DCrypt: Image Scaling and Cropping in Encrypted Domains
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 11, pp. 2542-2555; Nov. 2016

CamoPerturb: Secure IC camouflaging for minterm protection
Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, and Jeyavijayan Rajendran
IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 1-8; Nov. 2016

Microfluidic Encryption of on-Chip Biochemical Assays
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE Biomedical Circuits and Systems Conference (BioCAS), pp. 152-155; Oct. 2016

Remote field device fingerprinting using device-specific modbus information
Anastasis Keliris and Michail Maniatakos
IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1-4; Oct. 2016

Secure clock synchronization under collusion attacks
Xiaoming Duan, Nikolaos M. Freris, and Peng Cheng
54th Annual Allerton Conference on Communication, Control, and Computing, pp. 1142-1148; Sep. 2016

Towards a Secure Cloud: Distributed computing over encrypted data
Nikolaos M. Freris and Panagiotis Patrinos
Invited paper accepted at the 54th Annual Allerton Conference on Communication, Control, and Computing pp. 1116-1122; Sep. 2016

Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka, Nektarios G. Tsoutsos, and Michail Maniatakos
IEEE Transactions on Information Forensics and Security (TIFS), vol. 11, issue 9, pp. 2123-2138; Sep. 2016

Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 24, issue 9, pp. 2946-2959; Sep. 2016

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
Bharat Srinivasan, Payas Gupta, Manos Antonakakis, and Mustaque Ahamad
21st European Symposium on Research in Computer Security (ESORICS), pp.3-26; Sep. 2016

A Comparative Security Analysis of Current and Emerging Technologies
Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE Micro, vol. 36, issue 5, pp. 50-61; Sep. 2016

PRNU based source attribution with a collection of seam-carved images
Samet Taspinar, Manoranjan Mohanty, and Nasir Memon
IEEE International Conference on Image Processing (ICIP), pp. 156-160; Sep. 2016

On Improving the Security of Logic Locking
Muhammad Yasin, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 35, issue 9, pp. 1411-1424; Sep. 2016

Supply-Chain Security of Digital Microfluidic Biochips
Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty
IEEE Computer Magazine, vol. 49, issue 8, pp. 36-43; Aug. 2016

SDCache: Software Defined Data Caching Control for Cloud Services
Ala’ Darabseh, Nikolaos M. Freris, Yaser Jararweh and Mahmoud Al-Ayyoub
IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 164-169; Aug. 2016

Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords
Adam Aviv, Markus Dürmuth, and Payas Gupta
12th Symposium on Usable Privacy and Security (SOUPS); Aug. 2016

Malicious firmware detection with hardware performance counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou and Steve Kim
IEEE Transactions on Multi- Scale Computing Systems (TMSCS), vol. 2, issue 3, pp. 160-173; Jul. 2016

Taxonomy of firmware Trojans in smart grid devices
Charalambos Konstantinou, Anastasis Keliris, and Michail Maniatakos
Power and Energy Society General Meeting, (PES-GM), pp. 1-5; Jul. 2016

Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
Bodhisatwa Mazumdar, Samah M. Saeed, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 5, issue 3, pp. 317-328; Jul. 2016

3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud
Manoranjan Mohanty, Muhammad R. Asghar, and Giovanni Russello
13th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 283-291; Jul. 2016

Power-side-channel analysis of carbon nanotube FET based design
Chandra K. H. Suresh, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 215-218; Jul. 2016

Manufacturing and Security Challenges in 3D Printing
Steven Eric Zeltmann, Nikhil Gupta, N. Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri
The Journal of The Minerals, Metals & Materials Society (TMS), vol. 68, issue 7, pp. 1872–1881; Jul. 2016

Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hély, and Ramesh Karri
IEEE Transactions on Emerging Topics in Computing (TETC), vol. 4, issue 3, pp. 363-373; Jul. 2016

Don’t See Me, Just Edit Me: Towards Secure Cloud-based Video Editing
Odd-Arild Kristensen, Manoranjan Mohanty, and Pradeep Atrey
11th Annual Symposium on Information Assurance (ASIA); Jun. 2016

Adaptive Generation of Unique IDs for Digital Chips through Analog Excitation
Chandra K. H. Suresh, Sule Ozev, and Ozgur Sinanoglu
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 20, issue 3, pp. 46:1-46:18; Jun. 2016

System, Method and Computer-Accessible Medium for IC Camouflaging for Minterm Protection
Ozgur Sinanoglu, Muhammed Yasin, and Jeyavijayan Rajendran
U.S. Patent pending, filed Jun. 2016

Security Assessment of Cyberphysical Digital Microfluidic Biochips
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), vol. 13, issue 3, pp. 445-458; May 2016

MobiPot: Understanding Mobile Telephony Threats with Honeycards
Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, and Mustaque Ahamad
11th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 723-734; May 2016

The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, and Ramesh Karri
Proceedings of the IEEE, vol. 104, issue 5, pp. 1039-1057; May 2016

SARLock: SAT attack resistant logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 236-241; May 2016

Distortion-free fragile watermark for relational databases
Ibrahim Kamel, Maha AlaaEddin, Waheeb Yaqub, and Kareem Kamel
International Journal of Big Data Intelligence (IJBDI), vol. 3, issue 3, pp. 190-201; May 2016

Attacking the smart grid using public information
Charalambos Konstantinou, Marios Sazos, and Michail Maniatakos
17th Latin-American Test Symposium (LATS), pp.105-110; Apr. 2016

Thwarting timing attacks on NEMS relay based designs
Bodhisatwa Mazumdar, Samah M. Saeed, , Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 34th VLSI Test Symposium (VTS), pp. 1-4; Apr. 2016

Do you trust your chip?
Ozgur Sinanoglu
International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1-1; Apr. 2016

SDMEC: Software Defined System for Mobile Edge Computing
Yaser Jararweh, Ahmad Doulat, Ala’ Darabseh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa
IEEE International Conference on Cloud Engineering Workshop (IC2EW), pp. 88-93; Apr. 2016

System, Method and Computer-Accessible Medium for Satisfiability Attack Resistant Logic Locking
Ozgur Sinanoglu, Muhammed Yasin, and Jeyavijayan Rajendran
U.S. Patent pending, filed Mar. 2016

Activation of logic encrypted chips: Pre-test or post-test?
Muhammad Yasin, Samah M. Saeed, Jeyavijayan Rajendran, and Ozgur Sinanoglu
IEEE/ACM Design Automation Test in Europe Conference (DATE), pp. 139-144; Mar. 2016

Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds
Anastasis Keliris, Charalambos Konstantinou, Nektarios G. Tsoutsos, Raghad Baiad, and Michail Maniatakos
21st Asia and South Pacific Design Automation Conference (ASPDAC), pp. 511-518; Jan. 2016

Adapting to Varying Distribution of Unknown Response Bits
Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev
ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 21, issue 2, pp. 33:1-33:22; Jan. 2016

Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage
Jeyavijayan Rajendran, Arunshankar M. Dhandayuthapany, Vivekananda Vedula, and Ramesh Karri
29th International Conference on VLSI Design (VLSID) and 15th International Conference on Embedded Systems, pp. 547-552; Jan. 2016

Fault Attacks on AES and Their Countermeasures
Sk Subidh Ali, Xiaofei Guo, Ramesh Karri, and Debdeep Mukhopadhyay
Secure System Design and Trustable Computing, pp. 163-208; 2016

2015
Obfuscated arbitrary computation using cryptographic primitives
Nektarios G. Tsoutsos and Michail Maniatakos
10th International Design and Test (IDT) Symposium, pp. 5-8; Dec. 2015

Transforming between logic locking and IC camouflaging
Muhammad Yasin and Ozgur Sinanoglu
10th International Design and Test Symposium (IDT), pp. 1-4; Dec. 2015

Codo: Fundraising with Conditional Donations
Juan Felipe-Beltran, Aysha Siddique, Azza Abouzied, and Jay Chen
28th Annual ACM Symposium on User Interface Software & Technology (UIST), pp. 213-222; Nov. 2015

Impact of firmware modification attacks on power systems field devices
Charalambos Konstantinou and Michail Maniatakos
IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 283-288; Nov. 2015

Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving
Michail Maniatakos, Maria Michael, and Yiorgos Makris
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, issue 11, pp. 2447-2460; Nov. 2015

Belling the CAD: Toward Security-Centric Electronic System Design
Jeyavijayan Rajendran, Aman Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 11, pp. 1756-1769; Nov. 2015

ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters
Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, and Ramesh Karri
IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 544-551; Nov. 2015

On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks
Jerry Backer, David Hély, and Ramesh Karri
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 29-34; Oct. 2015

Secure design-for-debug for Systems-on-Chip
Jerry Backer, David Hély, and Ramesh Karri
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2015

Can assay outcomes of digital microfluidic biochips be manipulated?
Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri
IEEE International Conference on Computer Design (ICCD); Oct. 2015

Scan attack on Elliptic Curve Cryptosystem
Sk Subidh Ali and Ozgur Sinanoglu
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 115-118; Oct. 2015

Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems
Vinayaka Jyothi, Sateesh K. Addepalli, and Ramesh Karri
33rd IEEE International Conference on Computer Design (ICCD), pp. 266-272; Oct. 2015

Timing attack on NEMS relay based design of AES
Samah M. Saeed, Bodhisatwa Mazumdar, Sk Subidh Ali and Ozgur Sinanoglu
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 264-269; Oct. 2015

Extending residue-based fault tolerance to encrypted computation
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2015

Security analysis of logic encryption against the most effective side-channel attack: DPA
Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 97-102; Oct. 2015

Adaptive Congestion Control for Unpredictable Cellular Networks
Yasir Zaki, Thomas Potsch, Jay Chen, Lakshminarayanan Subramanian, and Carmelita Görg
ACM Special Interest Group on Data Communication (SIGCOMM), pp. 509-522; Aug. 2015

Security analysis of concurrent error detection against differential fault analysis
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri
Journal of Cryptographic Engineering, vol. 5, issue 3, pp. 153-169; Sep. 2015

Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations
Anastasis Keliris, Vasilis Dimitsas, Olympia Kremmyda, Dimitris Gizopoulos, and Michail Maniatakos
25th International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 25-32; Sep. 2015

Revisiting Vulnerability Analysis in Modern Microprocessors
Michail Maniatakos, Maria Michael, Chandra Tirumurti, and Yiorgos Makris
IEEE Transactions on Computers (TC), vol. 64, issue 9, pp. 2664-2674; Sep. 2015

WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad
24th USENIX Security Symposium, pp. 1025-1040; Aug. 2015

Harnessing data loss with forgetful data structures
Azza Abouzied and Jay Chen
6th ACM Symposium on Cloud Computing (SOCC), pp. 168-173; Aug. 2015

Computing within Limits and ICTD
Jay Chen
1st Workshop on Computing within Limits (LIMITS); Jul. 2015

Reliable Integrity Checking in Multicore Processors
Arun Kanuparthi and Ramesh Karri
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 2, pp. 10:1-10:23; Jul. 2015

Power analysis attacks on ARX: An application to Salsa20
Bodhisatwa Mazumdar, Sk Subidh Ali, and Ozgur Sinanoglu
IEEE 21st International On-Line Testing Symposium (IOLTS), pp. 40-43; Jul. 2015

Fortifying Android Patterns using Persuasive Security Framework
Hossein Siadati, Payas Gupta, Sarah Smith, Nasir Memon, and Mustaque Ahamad
9th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies of UBICOMM; Jul. 2015

Randomized gossip algorithms for solving Laplacian systems
Anastasios Zouzias and Nikolaos M. Freris
IEEE European Control Conference (ECC), pp. 1920-1925; Jul. 2015

Exploiting small leakages in masks to turn a second-order attack into a first-order attack
Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, and Ramesh Karri
4th Workshop on Hardware and Architectural Support for Security and Privacy (HASP), pp. 7:1-7:5; Jun. 2015

Detecting malicious modifications of data in third-party intellectual property cores
Jeyavijayan Rajendran, Vivekananda Vedula, and Ramesh Karri
52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2015

The HEROIC Framework: Encrypted Computation Without Shared Keys
Nektarios G. Tsoutsos and Michail Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 6, pp. 875-888; Jun. 2015

A secure design-for-test infrastructure for lifetime security of SoCs
Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hély, Ozgur Sinanoglu, and Ramesh Karri
IEEE International Symposium on Circuits and Systems (ISCAS), pp. 37-40; May 2015

The persistence of paper: a case study in microfinance from Ghana
Ishita Ghosh, Jay Chen, Joy Ming, and Azza Abouzied
7th International Conference on Information and Communication Technology for Development (ICTD), pp. 13:1-13:10; May 2015

Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures
Sk Subidh Ali, Samah M. Saeed, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 808-821; May 2015

Modeling, Detection, and Diagnosis of Faults in Multilevel Memristor Memories
Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri, and Ozgur Sinanoglu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 5, pp. 822-834; May 2015

Cyber-physical systems: A security perspective
Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Yier Jin
20th IEEE European Test Symposium (ETS), pp. 1-8; May 2015

Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
Proceedings of the IEEE, vol. 103, issue 5, pp. 829-849; May 2015

Simulation and analysis of negative-bias temperature instability aging on power analysis attacks
Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni, Chenglu Jin, and Ramesh Karri
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 124-129; May. 2015

Edited proceedings: Media Watermarking, Security, and Forensics
Adnan M. Alattar, Nasir Memon, and Chad D. Heitzenrater
CD Heitzenrater Proc. of SPIE-IS, vol. 9409, 940901-1; Apr. 2015

TMO: A new class of attack on cipher misusing test infrastructure
Sk Subidh Ali and Ozgur Sinanoglu
IEEE 33rd VLSI Test Symposium (VTS), pp. 1-4; Apr. 2015

MAGIC: Malicious Aging in Circuits/Cores
Naghmeh Karimi, Arun Kanuparthi, Xueyang Wang, Ramesh Karri, and Ozgur Sinanoglu
ACM Transactions on Architecture and Code Optimization (TACO), vol. 12, issue 1, pp. 5:1-5:25; Apr. 2015

Phoneypot: Data-driven Understanding of Telephony Threats
Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, and Mustaque Ahamad
20th Annual Network and Distributed System Security Symposium (NDSS); Feb. 2015

Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks
Tzipora Halevi, Nasir Memon, and Oded Nov
Social Science Research Network (SSRN); Jan. 2015

Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures
Sachhidh Kannan, Naghmeh Karimi, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 34, issue 1, pp. 2-15; Jan. 2015

Recent advances in counter PRNU based source attribution and beyond
Ahmet Karaküҫük, Ahmet E. Dirik, Hüsrev T. Sencar, and Nasir Memon
SPIE 9409, Media Watermarking, Security, and Forensics, vol. 9409, pp. 9409-9409-11; Mar. 2015

Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Charalambos Konstantinou, Anastasis Keliris, and Michail Maniatakos
Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 333-338; Mar. 2015

Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors
Jeyavijayan Rajendran, Ramesh Karri, and Garrett S. Rose
IEEE Transactions on Computers (TC), vol. 64, issue 3, pp. 733-746; Mar. 2015

Security verification of 3rd party intellectual property cores for information leakage
Vivekananda Vedula, Jeyavijayan Rajendran, Arunshankar M. Dhandayuthapany, and Ramesh Karri
Proceedings of the GOMACTECH; Mar. 2015

Compressive mining: fast and optimal data mining in the compressed domain
Michail Vlachos, Nikolaos M. Freris, and Anastasios Kyrillidis
Very Large Data Bases (VLDB) Journal, vol. 24, issue 1, pp. 1-24; Feb. 2015

Fault Analysis-Based Logic Encryption
Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S. Rose, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
IEEE Transactions on Computers (TC), vol. 64, issue 2, pp. 410-424; Feb. 2015

2014

FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions
Henry Corrigan-Gibbs, Jay Chen
5th ACM Symposium on Computing for Development (DEV), pp. 1-10; Dec. 2014

Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution
Ahmet E. Dirik, Hüsrev T. Sencar, Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, issue 12, p. 2277-2290; Dec. 2014

AES design space exploration new line for scan attack resiliency
Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE 22nd International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 1-6; Oct. 2014

Towards automatic detection of child pornography
Napa Sae-Bae, Xiaoxi Sun, Hüsrev T. Sencar, and Nasir Memon
IEEE International Conference on Image Processing (ICIP), pp. 5332-5336; Oct. 2014

DfST: Design for secure testability
Samah M. Saeed
IEEE International Test Conference (ITC), pp. 1-10; Oct. 2014

Test-mode-only scan attack and countermeasure for contemporary scan architectures
Samah M. Saeed, Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
IEEE International Test Conference (ITC), pp. 1-8; Oct. 2014

A semi-automatic deshredding method based on curve matching
Shize Shang, Hüsrev T. Sencar, Nasir Memon, and Xiangwei Kong
IEEE International Conference on Image Processing (ICIP), pp. 5537-5541; Oct. 2014

M3AAWG Telephony Honeypots: Benefits and Deployment Options
Payas Gupta, Mustaque Ahamad, Jonathan Curtis, Vijay Balasubramaniyan, and Alex Bobotek
Messaging, Malware and Mobile Anti-Abuse Working Group (MAAWG); Aug. 2014

Regaining Trust in VLSI Design: Design-for-Trust Techniques
Jeyavijayan Rajendran, Ozgur Sinanoglu and Ramesh Karri
Proceedings of the IEEE, vol. 102, issue 8, pp. 1266-1282; Aug. 2014

Exploring Internet Security Perceptions and Practices in Urban Ghana
Jay Chen, Michael Paik, and Kelly McCabe
Symposium On Usable Privacy and Security (SOUPS), pp. 129-142; Jul. 2014

Secure memristor-based main memory
Sachhidh Kannan, Naghmeh Karimi, and Ozgur Sinanoglu
51st ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6; Jun. 2014

A preliminary examination technique for audio evidence to distinguish speech from non-speech using objective speech quality measures
Erkam Uzun and Hüsrev T. Sencar
Speech Communication, vol. 61, issue 6, pp. 1-16; Jun. 2014

New Scan Attacks Against State-of-the-art Countermeasures and DFT
Sk Subidh Ali,Ozgur Sinanoglu, Samah M. Saeed, and Ramesh Karri
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 142-147; May 2014

Test-mode-only scan attack using the boundary scan chain
Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri
19th IEEE European Test Symposium (ETS), pp. 1-6; May 2014

Detection, diagnosis, and repair of faults in memristor-based memories
Sachhidh Kannan, Naghmeh Karimi, Ramesh Karri, and Ozgur Sinanoglu
IEEE 32nd VLSI Test Symposium (VTS), pp. 1-6; Apr. 2014

Design for Testability Support for Launch and Capture Power Reduction in Launch-Off-Shift and Launch-Off-Capture Testing
Samah M. Saeed and Ozgur Sinanoglu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22, issue 3, pp. 516-521; Mar. 2014

Keystroke Biometrics: the user perspective
Chee M. Tey, Payas Gupta, Kartik Muralidharan, and Debin Gao
4th ACM conference on Data and Application Security and Privacy (CODASPY), pp. 289-296; Mar. 2014

2013

New Scan-Based Attack Using Only the Test Mode and an Input Corruption Countermeasure
Sk Subidh Ali, Samah M. Saeed, Ozgur Sinanoglu, and Ramesh Karri
IFIP/IEEE International Conference on Very Large Scale Integration-System on a Chip (VLSI-SoC), pp. 48-68; Oct. 2013

Audio codec identification from coded and transcoded audios
Samet Hicsonmez, Hüsrev T. Sencar and Ismail Avcibas
Elsevier Digital Signal Processing, vol. 23, issue 5, pp. 1720-1730; Sep. 2013

Seam-carving based anonymization against image & video source attribution
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), pp. 272-277; Sep. 2013

ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates
Terry Nelms, Roberto Perdisci, and Mustaque Ahamad
22nd USENIX Security Symposium, pp. 589-604; Aug. 2013

Selective Robust Image Encryption for Social Networks
Ahmet E. Dirik and Nasir Memon
Multimedia Communications, Services and Security (MCSS), pp. 71-81; Jun. 2013

Reconciling the IC test and security dichotomy
Ozgur Sinanoglu, Naghmeh Karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Ke Huang, and Yiorgos Makris
18th IEEE European Test Symposium (ETS), pp. 1-6, May 2013

Embedded tutorial: Regaining hardware security and trust
Ozgur Sinanoglu
14th Latin American Test Workshop (LATW), pp. 1-1; Apr. 2013

Is Split Manufacturing Secure?
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1259-1264; Mar. 2013

Sensor fingerprint matching in large image and video databases
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
U.S. Patent No. US 8374386 B2; Feb. 2013

Methods for identifying traces of compression in audio
Samet Hicsonmez, Erkam Uzun, and Hüsrev T. Sencar
1st International Conference on Communications, Signal Processing, and their Applications (ICCSPA’13), pp. 1-6; Feb. 2013

2012

Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, issue 4, pp. 1404-1413; Aug. 2012

Security analysis of logic obfuscation
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
49th ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 83-89; Jun. 2012

Applying IC testing concepts to secure ICs
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
Government MicroCircuit Applications and Critical Technology Conference; Mar. 2012

Logic encryption: A fault analysis perspective
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri
IEEE/ACM Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 953-958; Mar. 2012

2011
Jeyavijayan Rajendran, Vinayaka Jyothi, Ozgur Sinanoglu, and Ramesh Karri
IEEE 29th VLSI Test Symposium, pp. 105-110; May 2011
2010

Efficient techniques for sensor fingerprint matching in large image and video databases
Sevinç Bayram, Hüsrev T. Sencar, and Nasir Memon
Proceedings of SPIE, Media Forensics and Security II, vol. 7541, pp. 7541-7541-8; Jan. 2010