Biblio

Export 127 results:
Sort by: Author Title Type [ Year  (Desc)]
2014
Munir, A., and F. Koushanfar, "D2Cyber: A Design Automation Tool for Dependable Cybercars", IEEE/ACM Design, Automation & Test in Europe (DATE), Dresden, Germany, March 2014.  Download: Munir_D2Cyber_DATE_2014.pdf (120.8 KB)
Munir, A., A. Gordon-Ross, S. Ranka, and F. Koushanfar, "A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems", Elsevier Journal of Parallel and Distributed Computing (JPDC), vol. 74, issue 1, pp. 1872-1890, January 2014.  Download: Munir_MulticoreQN_JPDC_Published_2014.pdf (911.71 KB)
Karri, R., and F. Koushanfar, "Trustworthy Hardware [Scanning the Issue]", Proceedings of the IEEE, vol. 102, issue 8, pp. 1123 - 1125, 8/2014.  Download: Trustworthy_Hardware.pdf (119.81 KB)
Rostami, M., F. Koushanfar, and R. Karri, "A Primer on Hardware Security: Models, Methods, and Metrics", Proceedings of the IEEE, vol. 102, issue 8, 08/2014.  Download: ProceedingsPrimer.pdf (1.31 MB)
Kong, J., F. Koushanfar, P. K. Pendyala, A. - R. Sadeghi, and C. Wachsmann, "PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs", Design Automation Conference (DAC) 2014, Best paper candidate, San Francisco, ACM, 06/2014.  Download: PUFatt_Embedded_Platform_Attestation.pdf (1.4 MB)
Rostami, M., M. Majzoobi, F. Koushanfar, D. Wallach, and S. Devadas, "Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching", IEEE Transactions on Emerging Topics in Computing , issue SI:Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability, 2014.  Download: PUF_authentication.pdf (1.1 MB)
Wendt, J. B., F. Koushanfar, and M. Potkonjak, "Techniques for Foundry Identification", the The 51st Annual Design Automation ConferenceProceedings of the The 51st Annual Design Automation Conference on Design Automation Conference - DAC '14, San Francisco, CA, USANew York, New York, USA, ACM Press, pp. 1 - 6, 2014.  Download: Foundry.pdf (183.18 KB)
2013
Munir, A., F. Koushanfar, H. Seudié, and A. - R. Sadeghi, "CyCAR'2013: First international academic workshop on security, privacy and dependability for cybervehicles", the 2013 ACM SIGSAC conferenceProceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, Berlin, GermanyNew York, New York, USA, ACM Press, pp. 1481 - 1482, 2013.  Download: CyCAR2013_ Security_Privacy_CyberVehicles.pdf (343.49 KB)
Rostami, M., F. Koushanfar, J. Rajendran, and R. Karri, "Hardware Security: Threat Models and Metrics", International Conference on Computer-Aided Deisgn, San Jose, 11/2013.  Download: Hardware Security (607.13 KB)
Rostami, M., A. Juels, and F. Koushanfar, "Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]", ACM Conference on Computer and Communications Security, Berlin, ACM, 11/2013.  Download: presentation.pptx (1.96 MB); paper (updated).pdf (611.27 KB); erratum.txt (167 bytes)
Yao, Y., M. - B. Kim, J. Li, I. L. Markov, and F. Koushanfar, "ClockPUF: Physical Unclonable Functions based on Clock Networks", Design, Automation & Test in Europe (DATE), Grenoble, France, 03/2013.  Download: date13-cpuf.pdf (208.32 KB)
Hu, K., A. N. Nowroz, S. Reda, and F. Koushanfar, "High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization", Design, Automation & Test in Europe (DATE), Grenoble, France, 03/2013.  Download: TrojanDetection.pdf (649.5 KB)
Mirhoseini, A., E. M. Songhori, and F. Koushanfar, "Idetic: A High-level Synthesis Approach for Enabling Long Computations on Transiently-powered ASICs", Pervasive Computing and Communication conference (PerCom), San Diego, California, 03/2013.  Download: Idetic.pdf (390.55 KB)
Kiyavash, N., F. Koushanfar, T. P. Coleman, and M. Rodrigues, "A Timing Channel Spyware for the CSMA/CA Protocol", IEEE Transactions on Information Forensics and Security, vol. 8, issue 3, pp. 477 - 487, 03/2013.  Download: Timing_Channel_Spyware.pdf (1.25 MB)
Mirhoseini, A., E. M. Songhori, and F. Koushanfar, "Automated checkpointing for enabling intensive applications on energy harvesting devices", 2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED), Beijing, China, IEEE, pp. 27 - 32, 2013.  Download: Automated_Checkpointing.pdf (286.84 KB)
Rostami, M., W. Burleson, A. Juels, and F. Koushanfar, "Balancing Security and Utility in Medical Devices?", Design Automation Conference, Austin, TX, IEEE, 2013.  Download: DAC 2013 (225.02 KB)
Mahmoud, A., U. Rührmair, M. Majzoobi, and F. Koushanfar, "Combined Modeling and Side Channel Attacks on Strong PUFs", Cryptology ePrint Archive, Report 2013/632, 2013.  Download: 632.pdf (183.28 KB)
Majzoobi, M., J. Kong, and F. Koushanfar, "Low-power Resource Binding by Postsilicon Customization", ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 2, New York, NY, USA, ACM, pp. 26:1–26:22, 2013.  Download: a26-majzoobi.pdf (787.34 KB)
2012
Wei, S., K. Li, F. Koushanfar, and M. Potkonjak, "Provably Complete Hardware Trojan Detection Using Test Point Insertion", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, California, 11/2012.  Download: hwtrojandetection.pdf (866.05 KB)
Koushanfar, F., S. Fazzari, C. McCants, W. Bryson, M. Sale, P. Song, and M. Potkonjak, "Can EDA Combat the Rise of Electronic Counterfeiting?", Design Automation Conference (DAC), Can EDA Combat the Rise of Electronic Counterfeiting?, IEEE, 06/2012.  Download: PDF (133.16 KB)
Mirhoseini, A., M. Potkonjak, and F. Koushanfar, "Coding-based Energy Minimization for Phase Change Memory", Design Automation Conference (DAC), Can EDA Combat the Rise of Electronic Counterfeiting?, IEEE, 06/2012.  Download: PDF (215.57 KB)
Koushanfar, F., A. - R. Sadeghi, and H. Seudie, "EDA for Secure and Dependable Cybercars: Challenges and Opportunities", Design Automation Conference (DAC): IEEE, 06/2012.  Download: PDF (636.5 KB)
Majzoobi, M., M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, "Slender PUF Protocol: A lightweight, robust, and secure authentication by substring matching", International Workshop on Trustworthy Embedded Devices: IEEE, 05/2012.  Download: PDF (627.29 KB); PPT (1.58 MB)
Wei, S., A. Nahapetian, M. Nelson, F. Koushanfar, and M. Potkonjak, "Gate Characterization Using Singular Value Decomposition: Foundations and Applications", IEEE Transactions on Information Forensics and Security, vol. 7, issue 2, pp. 765 - 773, 04/2012.  Download: Gate_Characterization.pdf (846.21 KB)
Koushanfar, F., "Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management", IEEE Transactions on Information Forensics and Security, vol. 7, issue 1, pp. 51 - 63, 02/2012.  Download: Provably Secure Active IC Metering.pdf (1.22 MB)
2011
Koushanfar, F., and A. Mirhoseini, "A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection", IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162 -174, March, 2011. Abstract  Download: PDF (929.9 KB)
Majzoobi, M., and F. Koushanfar, "Time-Bounded Authentication of FPGAs", IEEE Transactions on Information Forensics and Security (TIFS), vol. 6, issue 3, pp. 1123-1135, 2011. Abstract  Download: PDF (981.6 KB)
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control", Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2011.  Download: PDF (427.84 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "FPGA-oriented Security", Book Chapter in Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: PDF (1011.56 KB)
Koushanfar, F., "Hardware Metering: A Survey.", Book Chapter in Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: PDF (1.16 MB)
Koushanfar, F., and A. Mirhoseini, "Hybrid Heterogeneous Energy Supply Networks", IEEE International Symposium on Circuits and Systems (ISCAS), pp. Invited Paper, 2011. Abstract  Download: PDF (458.01 KB)
Dyer, E., M. Majzoobi, and F. Koushanfar, "Hybrid Spatial Modeling of Non-Stationary Process Variations", Design Automation Conference (DAC), pp. in press, 2011. Abstract  Download: PDF (604.3 KB)
Mirhoseini, A., and F. Koushanfar, "HypoEnergy: Hybrid supercapacitor-battery power-supply optimization for Energy efficiency", Design, Automation, and Test in Europe conference (DATE), 2011. Abstract  Download: PDF (110.67 KB)
Wei, S., F. Koushanfar, and M. Potkonjak, "Integrated circuit digital rights management techniques using physical level characterization", the 11th annual ACM workshopProceedings of the 11th annual ACM workshop on Digital rights management - DRM '11, Chicago, Illinois, USANew York, New York, USA, ACM Press, pp. 3, 2011.  Download: Integrated Circuit Digital Rights Management Techniques.pdf (1.14 MB)
Mirhoseini, A., and F. Koushanfar, "Learning to Manage Combined Energy Supply Systems", International Symposium on Low Power Electronics and Design (ISLPED), pp. in press, 2011. Abstract  Download: PDF (172.7 KB)
Majzoobi, M., and F. Koushanfar, "Post-silicon Resource Binding Customization for Low Power", ACM Transactions on Design Automation of Electronic Systems (TODAES), no. in press, 2011. Abstract  Download: PDF (519.22 KB)
Ruhrmair, U., S. Devadas, and F. Koushanfar, "Security based on Physical Unclonability and Disorder", Book Chapter in Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: PDF (3.53 MB)
Majzoobi, M., G. Ghiaasi-Hafezi, F. Koushanfar, and S. Nassif, "Ultra-low Power Current-based PUF", IEEE International Symposium on Circuits and Systems (ISCAS), 2011. Abstract  Download: PDF (159.04 KB)
2010
Roy, J. A., F. Koushanfar, and I. L. Markov, "Ending Piracy of Integrated Circuits", IEEE Computer, vol. 43, pp. 30 - 38, 2010. Abstract  Download: PDF (250.95 KB)
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA PUF using programmable delay lines", IEEE Workshop on Information Forensics and Security, pp. 1 - 6, 2010. Abstract  Download: PDF (211.47 KB)
Majzoobi, M., A. Elnably, and F. Koushanfar, "FPGA Time-Bounded Unclonable Authentication", Information Hiding, vol. 6387: Springer Berlin / Heidelberg, pp. 1 - 16, 2010. Abstract  Download: PDF (489.99 KB)
Koushanfar, F., "Hierarchical hybrid power supply networks", Design Automation Conference (DAC), pp. 629 - 630, 2010. Abstract  Download: PDF (189.33 KB)
Koushanfar, F., M. Majzoobi, and M. Potkonjak, "Nonparametric Combinatorial Regression for Shape Constrained Modeling", IEEE Trans. On Signal Processing, vol. 58, issue 2, pp. 626 - 637, 2010. Abstract  Download: PDF (1.15 MB)
Koushanfar, F., and Y. Alkabani, "Provably secure obfuscation of diverse watermarks for sequential circuits", International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 42 - 47, 2010. Abstract  Download: PDF (242.28 KB)
Tehranipour, M., and F. Koushanfar, "A Survey of Trojan Taxonomy and Detection", IEEE Design & Test of Computers, vol. 27, issue 1, pp. 10 - 25, 2010. Abstract  Download: PDF (1.05 MB)
Mirhoseini, A., Y. Alkabani, and F. Koushanfar, "Real time emulations: foundation and applications", Design Automation Conference (DAC), pp. 623–624, 2010.  Download: Real Time Emulations.pdf (101.93 KB)
2009
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Techniques for Design and Implementation of Secure Reconfigurable PUFs", ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 2, pp. 5:1–5:33, March, 2009. Abstract  Download: PDF (1.4 MB)
Nelson, M., A. Nahapetian, F. Koushanfar, and M. Potkonjak, "SVD-Based Ghost Circuitry Detection", Information Hiding (IH), pp. 221 - 234, 2009///. Abstract  Download: PDF (145.55 KB)
Alkabani, Y., and F. Koushanfar, "Consistency-based characterization for IC Trojan detection", IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 123-127, 2009. Abstract  Download: PDF (148.79 KB)
Koushanfar, F., and D. Shamsi, "The challenges of model objective selection and estimation for ad-hoc network data sets", Institute of Mathematical Statistics (IMS) Lecture Notes-Monograph Series (LNMS), vol. 57, pp. 332 - 345, 2009. Abstract  Download: PDF (1.74 MB)
Alkabani, Y., F. Koushanfar, and M. Potkonjak, "N-version temperature-aware scheduling and binding", International Symposium on Low Power Electronics and Designs (ISLPED), pp. 331 - 334, 2009. Abstract  Download: PDF (436.02 KB)
Candore, A., O. Kocabas, and F. Koushanfar, "Robust stable radiometric fingerprinting for wireless devices", 2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, IEEE, pp. 43 - 49, 2009.  Download: Robust stable radiometric fingerprinting for wireless devices.pdf (569.82 KB)
2008
Potkonjak, M., and F. Koushanfar, "(Bio)-behavioral CAD", Design Automation Conference (DAC), pp. 351 - 352, 2008. Abstract  Download: PDF (233.53 KB)
Roy, J., F. Koushanfar, and I. Markov, "EPIC: Ending Piracy of Integrated Circuits", Design Automation and Test in Europe (DATE), 2008. Abstract  Download: PDF (2.85 MB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Lightweight Secure PUFs", International Conference on Computer-Aided Design (ICCAD), pp. 670 - 673, 2008. Abstract  Download: PDF (200.16 KB)
Alkabani, Y., and F. Koushanfar, "N-variant IC design: methodology and applications", Design Automation Conference (DAC), pp. 546 - 551, 2008. Abstract  Download: PDF (320.5 KB)
Shamsi, D., P. Boufounos, and F. Koushanfar, "Noninvasive leakage power tomography of integrated circuits by compressive sensing", ISLPED: Proceeding of international symposium on Low power electronics and design, pp. 341 - 346, 2008. Abstract  Download: PDF (284.68 KB)
Koushanfar, F., P. Boufounos, and D. Shamsi, "Post-silicon timing characterization by compressed sensing", International Conference on Computer Aided Design (ICCAD), pp. 185 - 189, 2008. Abstract  Download: PDF (257.17 KB)
Roy, J., F. Koushanfar, and I. Markov, "Protecting bus-based hardware IP by secret sharing", Design Automation Conference (DAC), pp. 846 - 851, 2008. Abstract  Download: PDF (483.13 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Testing Techniques for Hardware Security", International Test Conference (ITC), pp. 1 - 10, 2008. Abstract  Download: PDF (290.22 KB)
Shamsi, D., F. Koushanfar, and M. Potkonjak, "Challenging benchmark for location discovery in ad hoc networks", the 9th ACM international symposiumProceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '08, Hong Kong, Hong Kong, ChinaNew York, New York, USA, ACM Press, pp. 361, 2008.
Roy, J. A., F. Koushanfar, and I. L. Markov, "Extended abstract: Circuit CAD tools as a security threat", 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, IEEE, pp. 65 - 66, 2008.
Alkabani, Y., and F. Koushanfar, "Extended abstract: Designer’s hardware Trojan horse", 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, IEEE, pp. 82 - 83, 2008.
2007
Alkabani, Y., F. Koushanfar, and M. Potkonjak, "Remote activation of ICs for piracy prevention and digital right management", International Conference on Computer Aided Design (ICCAD), pp. 674 - 677, 2007///. Abstract  Download: PDF (122.82 KB)
2006
2005
Koushanfar, F., Ensuring Data Integrity in Sensor-Based Networked Systems, : Dept. of Electrical Engineering and Computer Science, UC Berkeley, 2005///.
Wong, J., F. Koushanfar, and M. Potkonjak, "Flexible ASICs: Shared Masking for Multiple Media Processors", ACM/IEEE-CAS/EDAC Design Automation Conference (DAC), pp. 909 - 914, 2005///. Abstract  Download: PDF (172.45 KB)
Koushanfar, F., M. Potkonjak, and J. Feng, "Sensor Network Architecture", Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems: CRC Press, 2005///. Abstract  Download: PDF (62.69 KB)

Navigation

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer