Biblio

Export 98 results:
Sort by: [ Author  (Asc)] Title Type Year
Filters: Author is Farinaz Koushanfar  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Alkabani, Y., F. Koushanfar, and M. Potkonjak, "Remote activation of ICs for piracy prevention and digital right management", International Conference on Computer Aided Design (ICCAD), pp. 674 - 677, 2007///. Abstract  Download: PDF (122.82 KB)
Alkabani, Y., and F. Koushanfar, "Consistency-based characterization for IC Trojan detection", IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 123-127, 2009. Abstract  Download: PDF (148.79 KB)
Alkabani, Y., and F. Koushanfar, "Extended abstract: Designer’s hardware Trojan horse", 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, IEEE, pp. 82 - 83, 2008.
C
Caldwell, A. E., Y. Cao, A. B. Kahng, F. Koushanfar, H. Lu, I. L. Markov, M. Oliver, D. Stroobandt, and D. Sylvester, "GTX: The MARCO GSRC Technology Extrapolation System", the 37th conferenceProceedings of the 37th conference on Design automation - DAC '00, Los Angeles, California, United StatesNew York, New York, USA, ACM Press, pp. 693 - 698, 2000.
Candore, A., O. Kocabas, and F. Koushanfar, "Robust stable radiometric fingerprinting for wireless devices", 2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust, San Francisco, CA, USA, IEEE, pp. 43 - 49, 2009.  Download: Robust stable radiometric fingerprinting for wireless devices.pdf (569.82 KB)
D
Dyer, E., M. Majzoobi, and F. Koushanfar, "Hybrid Spatial Modeling of Non-Stationary Process Variations", Design Automation Conference (DAC), pp. in press, June, 2011. Abstract  Download: Hybrid_DAC (604.3 KB)
H
K
Karri, R., and F. Koushanfar, "Trustworthy Hardware", Proceedings of the IEEE, vol. 102, issue 8, pp. 1123-1125, 8/2014.  Download: Trustworthy_Hardware.pdf (119.81 KB)
Kiyavash, N., F. Koushanfar, T. P. Coleman, and M. Rodrigues, "A Timing Channel Spyware for the CSMA/CA Protocol", IEEE Transactions on Information Forensics and Security, vol. 8, issue 3, pp. 477 - 487, 3/2013. Abstract  Download: Timing_Channel_Spyware.pdf (1.25 MB)
Koushanfar, F., "Hardware Metering: A Survey.", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: Metering (1.16 MB)
Koushanfar, F., S. Fazzari, C. McCants, W. Bryson, M. Sale, P. Song, and M. Potkonjak, "Can EDA Combat the Rise of Electronic Counterfeiting?", Design Automation Conference (DAC), Can EDA Combat the Rise of Electronic Counterfeiting?, IEEE, June, 2012. Abstract  Download: PDF (133.16 KB)
Koushanfar, F., S. Slijepcevic, J. Wong, and M. Potkonjak, "Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks", Proceedings of ICASSP '02IEEE International Conference on Acoustics Speech and Signal Processing, Orlando, FL, USA, IEEE, pp. IV-4186 - IV-4186, 2002.
Koushanfar, F., M. Majzoobi, and M. Potkonjak, "Nonparametric Combinatorial Regression for Shape Constrained Modeling", IEEE Trans. On Signal Processing, vol. 58, issue 2, pp. 626 - 637, 2/2010. Abstract  Download: PDF (1.15 MB)
Koushanfar, F., and A. Mirhoseini, "A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection", IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162 -174, 3/2011. Abstract  Download: Framework (929.9 KB)
Koushanfar, F., I. Hong, and M. Potkonjak, "Behavioral synthesis techniques for intellectual property protection", ACM Trans. Design Automation of Electronic Sys., vol. 10, issue 3, pp. 523 - 545, 2005. Abstract  Download: PDF (429.5 KB)
Koushanfar, F., and A. Mirhoseini, "Hybrid Heterogeneous Energy Supply Networks", IEEE International Symposium on Circuits and Systems (ISCAS), May, 2011. Abstract  Download: Hybrid Heterogeneous Energy Supply Networks (458.01 KB)
Koushanfar, F., "Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management", IEEE Transactions on Information Forensics and Security, vol. 7, issue 1, pp. 51-63, 2/2012. Abstract  Download: Provably Secure Active IC Metering.pdf (1.22 MB)
M
Majzoobi, M., and F. Koushanfar, "Post-silicon Resource Binding Customization for Low Power", ACM Transactions on Design Automation of Electronic Systems (TODAES), no. in press, 3/2013. Abstract  Download: Post-silicon Resource Binding Customization for Low Power (519.22 KB)
Majzoobi, M., J. Kong, and F. Koushanfar, "Low-power Resource Binding by Postsilicon Customization", ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 2, New York, NY, USA, ACM, pp. 26:1–26:22, 3/2013. Abstract  Download: a26-majzoobi.pdf (787.34 KB)
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control", Workshop on Cryptographic Hardware and Embedded Systems (CHES), October, 2011. Abstract  Download: FPGA-Random (427.84 KB)
Majzoobi, M., and F. Koushanfar, "Time-Bounded Authentication of FPGAs", IEEE Transactions on Information Forensics and Security (TIFS), vol. 6, issue 3, pp. 1123-1135, 3/2011. Abstract  Download: Time-Bounded Authentication of FPGAs (981.6 KB)
Majzoobi, M., G. Ghiaasi-Hafezi, F. Koushanfar, and S. Nassif, "Ultra-low Power Current-based PUF", IEEE International Symposium on Circuits and Systems (ISCAS), May, 2011. Abstract  Download: Ultra-low Power Current-based PUF (159.04 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Lightweight Secure PUFs", International Conference on Computer-Aided Design (ICCAD), pp. 670 - 673, 2008. Abstract  Download: PDF (200.16 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "FPGA-oriented Security", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: Fpga-security (1011.56 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Techniques for Design and Implementation of Secure Reconfigurable PUFs", ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 2, pp. 5:1–5:33, March, 2009. Abstract  Download: PDF (1.4 MB)
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA PUF using programmable delay lines", IEEE Workshop on Information Forensics and Security, December, 2010. Abstract  Download: PDF (211.47 KB)
Meguerdichian, S., F. Koushanfar, A. Morge, D. Petranovic, and M. Potkonjak, "MetaCores: Design and Optimization Techniques", the 38th conferenceProceedings of the 38th conference on Design automation - DAC '01, Las Vegas, Nevada, United StatesNew York, New York, USA, ACM Press, pp. 585 - 590, 2001.
Mirhoseini, A., and F. Koushanfar, "Learning to Manage Combined Energy Supply Systems", International Symposium on Low Power Electronics and Design (ISLPED), pp. in press, August, 2011. Abstract  Download: Learn (172.7 KB)
Mirhoseini, A., and F. Koushanfar, "HypoEnergy: Hybrid supercapacitor-battery power-supply optimization for Energy efficiency", Design, Automation, and Test in Europe conference (DATE), March, 2011. Abstract  Download: HypoEnergy (110.67 KB)
Mirhoseini, A., A. - R. Sadeghi, and F. Koushanfar, "CryptoML: Secure Outsourcing of Big Data Machine Learning Applications", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: CryptoML.pdf (430.37 KB)
Mirhoseini, A., B. D. Rouhani, E. M. Songhori, and F. Koushanfar, "ExtDict: Extensible Dictionaries for Data- and Platform-Aware Large-Scale Learning", International Parallel & Distributed Processing Symposium (IPDPS): IEEE, 2017.  Download: ExtDict.pdf (636.32 KB)
Mirhoseini, A., B. D. Rouhani, E. M. Songhori, and F. Koushanfar, "Chime: Checkpointing long computations on intermittently energized IoT devices", IEEE Transactions on Multi-Scale Computing Systems (TMSCS), vol. 2, issue 99, 1/2016. Abstract  Download: chime.pdf (2.34 MB)
Mirhoseini, A., M. Potkonjak, and F. Koushanfar, "Coding-based Energy Minimization for Phase Change Memory", Design Automation Conference (DAC), June, 2012. Abstract  Download: PDF (215.57 KB)
Mirhoseini, A., Y. Alkabani, and F. Koushanfar, "Real time emulations: foundation and applications", Design Automation Conference (DAC), June, 2010 . Abstract  Download: PDF (101.93 KB)
Mirhoseini, A., E. M. Songhori, and F. Koushanfar, "Automated checkpointing for enabling intensive applications on energy harvesting devices", 2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED), pp. 27 - 32, September, 2013. Abstract  Download: Automated_Checkpointing.pdf (286.84 KB)
Munir, A., and F. Koushanfar, "D2Cyber: A Design Automation Tool for Dependable Cybercars", Design, Automation & Test in Europe (DATE), March, 2014. Abstract  Download: D2Cyber.pdf (120.8 KB)
Munir, A., F. Koushanfar, H. Seudié, and A. - R. Sadeghi, "CyCAR'2013: First international academic workshop on security, privacy and dependability for cybervehicles", Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, pp. 1481 - 1482, November, 2013. Abstract  Download: CyCAR2013_ Security_Privacy_CyberVehicles.pdf (343.49 KB)
Munir, A., A. Gordon-Ross, S. Ranka, and F. Koushanfar, "A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems", Elsevier Journal of Parallel and Distributed Computing (JPDC), vol. 74, issue 1, no. 1, pp. 1872-1890, 1/2014. Abstract  Download: MulticoreQN_JPDC.pdf (911.71 KB)
N
Nowroz, A. N., K. Hu, F. Koushanfar, and S. Reda, "Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, issue 12, pp. 1792-1805, 12/2014. Abstract  Download: TrojanDetection.pdf (2.14 MB)
P
Potkonjak, M., and F. Koushanfar, "(Bio)-behavioral CAD", Design Automation Conference (DAC), pp. 351 - 352, 2008. Abstract  Download: PDF (233.53 KB)
R
Riazi, S. M., N. K. R. Dantu, V. L. N. Gattu, and F. Koushanfar, "GenMatch: Secure DNA Compatibility Testing", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: GenMatch.pdf (294.6 KB)
Riazi, S. M., M. Samragh, and F. Koushanfar, "CAMsure: Secure Content-Addressable Memory for Approximate Search", ACM Transactions on Embedded Computing Systems (TECS), 2017.  Download: main_journal.pdf (1.11 MB)
Riazi, S. M., E. M. Songhori, and F. Koushanfar, "PriSearch: Efficient Search on Private Data", Design Automation Conference (DAC), Austin, Texas, 05/2017.
Rostami, M., F. Koushanfar, J. Rajendran, and R. Karri, "Hardware Security: Threat Models and Metrics", International Conference on Computer-Aided Deisgn, November, 2013. Abstract  Download: Hardware Security (607.13 KB)
Rostami, M., A. Juels, and F. Koushanfar, "Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]", ACM Conference on Computer and Communications Security, November, 2013. Abstract  Download: presentation.pptx (1.96 MB); paper (updated).pdf (611.27 KB); erratum.txt (167 bytes)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "Going deeper than deep learning for massive data analytics under physical constraints", Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2016.  Download: Deep.pdf (304.41 KB)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "TinyDL: Just-In-Time Deep Learning Solution For Constrained Embedded Systems", International Symposium on Circuits and Systems (ISCAS): IEEE, 2017.  Download: TinyDL.pdf (1011.05 KB)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "DeLight: Adding Energy Dimension To Deep Neural Networks", International Symposium on Low Power Electronics and Design (ISLPED), San Francisco, ACM, 2016.  Download: DeLight.pdf (852.29 KB)
Roy, J. A., F. Koushanfar, and I. L. Markov, "Ending Piracy of Integrated Circuits", IEEE Computer, vol. 43, pp. 30-38, 10/2010. Abstract  Download: PDF (250.95 KB)
Roy, J. A., F. Koushanfar, and I. L. Markov, "Extended abstract: Circuit CAD tools as a security threat", 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, USA, IEEE, pp. 65 - 66, 2008.
Rührmair, U., X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, and W. Burleson, "Efficient Power and Timing Side Channels for Physical Unclonable Functions", Lecture Notes in Computer ScienceCryptographic Hardware and Embedded Systems – CHES 2014, vol. 8731, Berlin, Heidelberg, Springer Berlin Heidelberg, pp. 476 - 492, 2014.  Download: Efficient Power and Timing Side Channels bookchap.pdf (983.83 KB)
Ruhrmair, U., S. Devadas, and F. Koushanfar, "Security based on Physical Unclonability and Disorder", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: PUF_Chapter (3.53 MB)
S
Samragh, M., M. Imani, F. Koushanfar, and T. Rosing, "LookNN: Neural Network with No Multiplication", Design Automation and Test in Europe (DATE), 2017. Abstract  Download: LookNN.pdf (419 KB)
Samragh, M., M. Ghasemzadeh, and F. Koushanfar, "Customizing Neural Networks for Efficient FPGA Implementation", IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM): IEEE, 2017. Abstract  Download: SamraghCustomizing.pdf (3.65 MB)
Shahrjerdi, D., J. Rajendran, S. Garg, F. Koushanfar, and R. Karri, "Shielding and Securing Integrated Circuits with Sensors", International Conference on Computer-Aided Design, November, 2014. Abstract  Download: Shielding_Securing_IC.pdf (390.61 KB)
Shamsi, D., F. Koushanfar, and M. Potkonjak, "Challenging benchmark for location discovery in ad hoc networks", the 9th ACM international symposiumProceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '08, Hong Kong, Hong Kong, ChinaNew York, New York, USA, ACM Press, pp. 361, 2008.
T
Tehranipoor, M., and F. Koushanfar, "Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem", IEEE Design & Test of Computers, vol. 27, issue 1, pp. 8 - 9, 1/2010.  Download: PDF (69.7 KB)
W
Wei, S., A. Nahapetian, M. Nelson, F. Koushanfar, and M. Potkonjak, "Gate Characterization Using Singular Value Decomposition: Foundations and Applications", IEEE Transactions on Information Forensics and Security, vol. 7, issue 2, pp. 765-773, 4/2012. Abstract  Download: Gate_Characterization.pdf (846.21 KB)
Wei, S., K. Li, F. Koushanfar, and M. Potkonjak, "Provably Complete Hardware Trojan Detection Using Test Point Insertion", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November, 2012. Abstract  Download: hwtrojandetection.pdf (866.05 KB)
Wei, S., F. Koushanfar, and M. Potkonjak, "Integrated circuit digital rights management techniques using physical level characterization", Proceedings of the 11th annual ACM workshop on Digital rights management - DRM '11, pp. 3, October, 2011. Abstract  Download: Integrated Circuit Digital Rights Management Techniques.pdf (1.14 MB)
Wendt, J. B., F. Koushanfar, and M. Potkonjak, "Techniques for Foundry Identification", Design Automation Conference (DAC), pp. 1 - 6, June, 2014. Abstract  Download: Foundry.pdf (183.18 KB)
Y
Z
Zhang, Y., and F. Koushanfar, "Robust Privacy-Preserving Fingerprint Authentication", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: fingerprint.pdf (96.55 KB)

Navigation

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer