Center for Cyber Security

Filter
Conference contribution

Search results

  • 2013

    Adaptive reduction of the frequency search space for multi-vdd digital circuits

    Suresh, C. K. H., Yilmaz, E., Ozev, S. & Sinanoglu, O., 2013, Proceedings - Design, Automation and Test in Europe, DATE 2013. Institute of Electrical and Electronics Engineers Inc., p. 292-295 4 p. 6513518. (Proceedings -Design, Automation and Test in Europe, DATE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A lightweight combinatorial approach for inferring the ground truth from multiple annotators

    Liu, X., Li, L. & Memon, N., 2013, Machine Learning and Data Mining in Pattern Recognition - 9th International Conference, MLDM 2013, Proceedings. p. 616-628 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7988 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A pilot study of cyber security and privacy related behavior and personality traits

    Halevi, T., Lewis, J. & Memon, N., 2013, WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. Association for Computing Machinery, p. 737-744 8 p. (WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Simple and Effective Method for Online Signature Verification

    Sae-Bae, N. & Memon, N., Jan 27 2013, BIOSIG 2013 - Proceedings of the 12th International Conference of the Biometrics Special Interest Group. Bromme, A. & Busch, C. (eds.). Institute of Electrical and Electronics Engineers Inc., 6617153. (BIOSIG 2013 - Proceedings of the 12th International Conference of the Biometrics Special Interest Group).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A study on the effectiveness of Trojan detection techniques using a red team blue team approach

    Zhang, X., Xiao, K., Tehranipoor, M., Rajendran, J. & Karri, R., 2013, Proceedings - 2013 IEEE 31st VLSI Test Symposium, VTS 2013. 6548922. (Proceedings of the IEEE VLSI Test Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Embedded tutorial: Regaining hardware security and trust

    Sinanoglu, O., 2013, LATW 2013 - 14th IEEE Latin-American Test Workshop. 6562679. (LATW 2013 - 14th IEEE Latin-American Test Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hardware and embedded security in the context of internet of things

    Kanuparthi, A., Karri, R. & Addepalli, S., 2013, CyCAR 2013 - Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for CyberVehicles, Co-located with CCS 2013. p. 61-65 5 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hardware security: Threat models and metrics

    Rostami, M., Koushanfar, F., Rajendran, J. & Karri, R., 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2013 - Digest of Technical Papers. p. 819-823 5 p. 6691207. (IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hardware security strategies exploiting nanoelectronic circuits

    Rose, G. S., Rajendran, J., McDonald, N., Karri, R., Potkonjak, M. & Wysocki, B., 2013, 2013 18th Asia and South Pacific Design Automation Conference, ASP-DAC 2013. p. 368-372 5 p. 6509623. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • High-level synthesis for security and trust

    Rajendran, J. J. V., Zhang, H., Sinanoglu, O. & Karri, R., 2013, Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013. p. 232-233 2 p. 6604087. (Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Is split manufacturing secure?

    Rajendran, J., Sinanoglu, O. & Karri, R., 2013, Proceedings - Design, Automation and Test in Europe, DATE 2013. Institute of Electrical and Electronics Engineers Inc., p. 1259-1264 6 p. 6513707. (Proceedings -Design, Automation and Test in Europe, DATE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mining groups of common interest: Discovering topical communities with network flows

    Li, L. & Memon, N., 2013, Machine Learning and Data Mining in Pattern Recognition - 9th International Conference, MLDM 2013, Proceedings. p. 405-420 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7988 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • New scan-based attack using only the test mode

    Ali, S. S., Sinanoglu, O., Saeed, S. M. & Karri, R., 2013, 2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration, VLSI-SoC 2013 - Proceedings. IEEE Computer Society, p. 234-239 6 p. 6673281. (IEEE/IFIP International Conference on VLSI and System-on-Chip, VLSI-SoC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • NumChecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters

    Wang, X. & Karri, R., 2013, Proceedings of the 50th Annual Design Automation Conference, DAC 2013. 79. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On design vulnerability analysis and trust benchmarks development

    Salmani, H., Tehranipoor, M. & Karri, R., 2013, 2013 IEEE 31st International Conference on Computer Design, ICCD 2013. IEEE Computer Society, p. 471-474 4 p. 6657085. (2013 IEEE 31st International Conference on Computer Design, ICCD 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reconciling the IC test and security dichotomy

    Sinanoglu, O., Karimi, N., Rajendran, J., Karri, R., Jin, Y., Huang, K. & Makris, Y., 2013, Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013. 6569368. (Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Run-time detection of hardware Trojans: The processor protection unit

    Dubeuf, J., Hely, D. & Karri, R., 2013, Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013. 6569378. (Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Scan attack in presence of mode-reset countermeasure

    Ali, S. S., Saeed, S. M., Sinanoglu, O. & Karri, R., 2013, Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013. p. 230-231 2 p. 6604086. (Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium, IOLTS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Seam-carving based anonymization against image & video source attribution

    Bayram, S., Sencar, H. T. & Memon, N. D., 2013, 2013 IEEE International Workshop on Multimedia Signal Processing, MMSP 2013. p. 272-277 6 p. 6659300. (2013 IEEE International Workshop on Multimedia Signal Processing, MMSP 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of integrated circuit camouflaging

    Rajendran, J., Sam, M., Sinanoglu, O. & Karri, R., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 709-720 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Selective Robust Image Encryption for Social Networks

    Emir Dirik, A. & Memon, N., 2013, Multimedia Communications, Services and Security - 6th International Conference, MCSS 2013, Proceedings. Springer Verlag, p. 71-81 11 p. (Communications in Computer and Information Science; vol. 368 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling

    Liu, C., Rajendran, J., Yang, C. & Karri, R., 2013, Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2013. p. 101-106 6 p. 6653590. (Proceedings - IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sneak path testing and fault modeling for multilevel memristor-based memories

    Kannan, S., Karri, R. & Sinanoglu, O., 2013, 2013 IEEE 31st International Conference on Computer Design, ICCD 2013. IEEE Computer Society, p. 215-220 6 p. 6657045. (2013 IEEE 31st International Conference on Computer Design, ICCD 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sneak-path testing of memristor-based memories

    Kannan, S., Rajendran, J., Karri, R. & Sinanoglu, O., 2013, Proceedings - 26th International Conference on VLSI Design, VLSID 2013 - Concurrently with 12th International Conference on Embedded Systems Design, ES 2013. p. 386-391 6 p. 6472671. (Proceedings of the IEEE International Conference on VLSI Design).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • VLSI testing based security metric for IC camouflaging

    Rajendran, J., Sinanoglu, O. & Karri, R., 2013, Proceedings - 2013 IEEE International Test Conference, ITC 2013. Institute of Electrical and Electronics Engineers Inc., 6651879. (Proceedings - International Test Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • What is biometric information and how to measure it?

    Sutcu, Y., Tabassi, E., Sencar, H. T. & Memon, N., 2013, 2013 IEEE International Conference on Technologies for Homeland Security, HST 2013. p. 67-72 6 p. 6698978. (2013 IEEE International Conference on Technologies for Homeland Security, HST 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Adaptive testing: Conquering process variations

    Yilmaz, E., Ozev, S., Sinanoglu, O. & Maxwell, P., 2012, Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012. 6233045. (Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adaptive testing of chips with varying distributions of unknown response bits

    Suresh, C. K. H., Sinanoglu, O. & Ozev, S., 2012, Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012. 6233023. (Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A high-performance, low-overhead microarchitecture for secure program execution

    Kanuparthi, A. K., Karri, R., Ormazabal, G. & Addepalli, S. K., 2012, 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. p. 102-107 6 p. 6378624. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Applying IC testing concepts to secure ICs

    Rajendran, J., Pino, Y., Sinanoglu, O. & Karri, R., Mar 2012, Proceedings of the Government Microcircuit Applications and Critical Technology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Are hardware performance counters a cost effective way for integrity checking of programs?

    Malone, C., Zahran, M. & Karri, R., Oct 2012, Proceedings of ACM Workshop on Scalable Computing, Chicago. p. 71-76

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A survey of microarchitecture support for embedded processor security

    Kanuparthi, A. K., Karri, R., Ormazabal, G. & Addepalli, S. K., 2012, Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012. p. 368-373 6 p. 6296501. (Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Balancing performance and fault detection for GPGPU workloads

    Backer, J. B. & Karri, R., 2012, 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. p. 518-519 2 p. 6378702. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric-rich gestures: A novel approach to authentication on multi-touch devices

    Sae-Bae, N., Ahmed, K., Isbister, K. & Memon, N., 2012, Conference Proceedings - The 30th ACM Conference on Human Factors in Computing Systems, CHI 2012. p. 977-986 10 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DfT support for launch and capture power reduction in launch-off-capture testing

    Saeed, S. M. & Sinanoglu, O., 2012, Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012. 6233001. (Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Eliminating performance penalty of scan

    Sinanoglu, O., 2012, Proceedings - 25th International Conference on VLSI Design, VLSI Design 2012 - Held Jointly with 11th International Conference on Embedded Systems. IEEE Computer Society, p. 346-351 6 p. 6167776. (Proceedings of the IEEE International Conference on VLSI Design).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Engineering crossbar based emerging memory technologies

    Kannan, S., Rajendran, J., Karri, R. & Sinanoglu, O., 2012, 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. p. 478-479 2 p. 6378682. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Invariance-based concurrent error detection for advanced encryption standard

    Guo, X. & Karri, R., 2012, Proceedings of the 49th Annual Design Automation Conference, DAC '12. p. 573-578 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Investigating multi-touch gestures as a novel biometric modality

    Sae-Bae, N., Memon, N. & Isbister, K., 2012, 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012. p. 156-161 6 p. 6374571. (2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Logic encryption: A fault analysis perspective

    Rajendran, J., Pino, Y., Sinanoglu, O. & Karri, R., 2012, Proceedings - Design, Automation and Test in Europe Conference and Exhibition, DATE 2012. Institute of Electrical and Electronics Engineers Inc., p. 953-958 6 p. 6176634. (Proceedings -Design, Automation and Test in Europe, DATE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Nano-PPUF: A memristor-based security primitive

    Rajendran, J., Rose, G. S., Karri, R. & Potkonjak, M., 2012, Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012. p. 84-87 4 p. 6296453. (Proceedings - 2012 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Retiming scan circuit to eliminate timing penalty

    Sinanoglu, O. & Agrawal, V. D., 2012, LATW 2012 - 13th IEEE Latin American Test Workshop. 6261252. (LATW 2012 - 13th IEEE Latin American Test Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Security analysis of logic obfuscation

    Rajendran, J., Pino, Y., Sinanoglu, O. & Karri, R., 2012, Proceedings of the 49th Annual Design Automation Conference, DAC '12. Institute of Electrical and Electronics Engineers Inc., p. 83-89 7 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Test access mechanism for chips with spare identical cores

    Sinanoglu, O., 2012, Proceedings of the 2012 IEEE 18th International On-Line Testing Symposium, IOLTS 2012. p. 97-102 6 p. 6313848. (Proceedings of the 2012 IEEE 18th International On-Line Testing Symposium, IOLTS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Toggle-masking scheme for x-filtering

    Ramdas, A. & Sinanoglu, O., 2012, Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012. 6233024. (Proceedings - 2012 17th IEEE European Test Symposium, ETS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    ACE-Cost: Acquisition cost efficient classifier by hybrid decision tree with local SVM leaves

    Li, L., Topkara, U. & Memon, N., 2011, Machine Learning and Data Mining in Pattern Recognition - 7th International Conference, MLDM 2011, Proceedings. p. 60-74 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6871 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A cryptanalysis of PRINTcipher: The invariant subspace attack

    Leander, G., Abdelraheem, M. A., Alkhzaimi, H. & Zenner, E., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 206-221 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • An approach to tolerate process related variations in memristor-based applications

    Rajendran, J., Maenm, H., Karri, R. & Rose, G. S., 2011, Proceedings - 24th International Conference on VLSI Design, VLSI Design 2011, Held Jointly with 10th International Conference on Embedded Systems. p. 18-23 6 p. 5718771. (Proceedings of the IEEE International Conference on VLSI Design).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Are hardware performance counters a cost effective way for integrity checking of programs

    Malone, C., Zahran, M. & Karri, R., 2011, STC'11 - Proceedings of the 6th ACM Workshop: Scalable Trusted Computing. p. 71-76 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Blue team red team approach to hardware trust assessment

    Rajendran, J., Jyothi, V. & Karri, R., 2011, 2011 IEEE 29th International Conference on Computer Design, ICCD 2011. p. 285-288 4 p. 6081410. (Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution