Difference between revisions of "Publications"
From ACES
Line 2: | Line 2: | ||
-->{{#invoke:Publications|main}}<!-- | -->{{#invoke:Publications|main}}<!-- | ||
--></div> | --></div> | ||
{| class="bibliography-table" | |||
|} | |||
[[Category:Publication| ]] | [[Category:Publication| ]] |
Revision as of 02:14, 3 September 2021
month = {7}, url = {https://dl.acm.org/doi/pdf/10.1145/3607192}, year = {2023}, author = {Xinqiao Zhang and Mohammad Samragh and Siam Hussain and Ke Huang and Farinaz Koushanfar}, publisher = {ACM Transactions on Embedded Computing Systems}, title = {Scalable Binary Neural Network applications in Oblivious Inference}, _pageName = {Scalable23} } @article {Swnet2021, month = {12}, url = {https://ieeexplore.ieee.org/abstract/document/9600865}, year = {2021}, author = {Mojan Javaheripi and Bita Darvish Rouhani and Farinaz Koushanfar}, publisher = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems}, title = {SWANN: Small-World Architecture for Fast Convergence of Neural Networks}, pdf = {SWANN 2021.pdf}, _pageName = {Swnet2021} } @article {Autorank2021, month = {12}, url = {https://ieeexplore.ieee.org/abstract/document/9611209}, year = {2021}, author = {Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar}, publisher = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems}, title = {AutoRank: Automated Rank Selection for Effective Neural Network Customization}, pdf = {AutoRank 2021.pdf}, _pageName = {Autorank2021} } @conference {Hussain2021, month = {11}, url = {https://dl.acm.org/doi/10.1145/3460120.3484797}, year = {2021}, author = {Siam Umar Hussain and Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar}, publisher = {ACM SIGSAC Conference on Computer and Communications Security (CCS)}, title = {COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks}, pdf = {COINN cameraReady.pdf}, _pageName = {Hussain2021} } @conference {Hashtag2021, month = {11}, url = {https://ieeexplore.ieee.org/abstract/document/9643556}, year = {2021}, author = {Mojan Javaheripi and Farinaz Koushanfar}, publisher = {IEEE/ACM International Conference On Computer Aided Design (ICCAD)}, title = {HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks}, pdf = {Hashtag 2021.pdf}, _pageName = {Hashtag2021} } @conference {Chen2021DTRAP, month = {10}, year = {2021}, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, publisher = {ACM Digital Threats: Research and Practice (DTRAP)}, title = {GALU: A Genetic Algorithm Framework for Logic Unlocking. ACM Digital Threats: Research and Practice (DTRAP)}, pdf = {2021DTRAP GALU CamVer.pdf}, _pageName = {Chen2021DTRAP} } @inproceedings {Hussain2021USENIX, isbn = {978-1-939133-24-3}, booktitle = {30th {USENIX} Security Symposium ({USENIX} Security 21)}, month = {8}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/hussain}, pages = {2273--2290}, year = {2021}, author = {Shehzeen Hussain and Paarth Neekhara and Shlomo Dubnov and Julian McAuley and Farinaz Koushanfar}, journal = {USENIX Security}, publisher = {USENIX Association}, title = {WaveGuard: Understanding and Mitigating Audio Adversarial Examples}, pdf = {Usenixsec21-hussain.pdf}, _pageName = {Hussain2021USENIX} } @inproceedings {Javaheripi2021XCL, month = {6}, year = {2021}, author = {Greg Fields and Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar and Tara Javidi}, publisher = {IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)}, title = {Trojan Signatures in DNN Weights}, pdf = {Fields Trojan Signatures.pdf}, _pageName = {Javaheripi2021XCL} } @inproceedings {WACV2021, month = {1}, url = {https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html}, year = {2021}, author = {Hussain, Shehzeen and Neekhara, Paarth and Jere, Malhar and Koushanfar, Farinaz and McAuley, Julian}, publisher = {IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)}, title = {Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples}, _pageName = {WACV2021} } @proceedings {Mohammad2021CVPR, url = {https://openaccess.thecvf.com/content/CVPR2021W/BiVision/papers/Samragh_On_the_Application_of_Binary_Neural_Networks_in_Oblivious_Inference_CVPRW_2021_paper.pdf}, year = {2021}, author = {Mohammad Samragh and Siam Hussain and Xinqiao Zhang and Ke Huang and Farinaz Koushanfar}, publisher = {Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition}, title = {On the Application of Binary Neural Networks in Oblivious Inference}, pdf = {Samragh On the Application of Binary Neural Networks in Oblivious Inference CVPRW 2021 paper.pdf}, _pageName = {Mohammad2021CVPR} } @conference {Chen2021ICCV, url = {https://openaccess.thecvf.com/content/ICCV2021/html/Chen_ProFlip_Targeted_Trojan_Attack_With_Progressive_Bit_Flips_ICCV_2021_paper.html}, year = {2021}, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, publisher = {International Conference on Computer Vision (ICCV)}, title = {ProFlip: Targeted Trojan Attack with Progressive Bit Flips. International Conference on Computer Vision (ICCV)}, pdf = {2021ICCV_ProFlip_CamVer.pdf}, _pageName = {Chen2021ICCV} } @inproceedings {Hussain2020adversarial, booktitle = {IEEE Winter Conference on Applications of Computer Vision (WACV)}, month = {11}, url = {https://openaccess.thecvf.com/content/WACV2021/html/Hussain_Adversarial_Deepfakes_Evaluating_Vulnerability_of_Deepfake_Detectors_to_Adversarial_Examples_WACV_2021_paper.html}, doi = {10.1109/WACV48630.2021.00339}, year = {2020}, author = {Hussain, Shehzeen and Neekhara, Paarth and Malhar Jere and Farinaz Koushanfar and McAuley, Julian}, publisher = {IEEE Computer Society}, title = {Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples}, organization = {IEEE Computer Society}, pdf = {Hussain2020adversarial.pdf}, _pageName = {Hussain2020adversarial} } @inproceedings {Javaheripi2020cleann, booktitle = {International Conference On Computer Aided Design}, month = {11}, url = {Deep Learning, Trojan Attack, AI Robustness, Embedded Systems, Sparse Recovery}, doi = {10.1145/3400302.3415671}, year = {2020}, author = {Mojan Javaheripi and Mohammad Samragh and Gregory Fields and Javidi, Tara and Farinaz Koushanfar}, publisher = {ACM}, title = {CLEANN: Accelerated Trojan Shield for Embedded Neural Networks}, organization = {ACM}, pdf = {Javaheripi2020cleann.pdf}, _pageName = {Javaheripi2020cleann} } @article {Samragh2020, month = {10}, issn = {1539-9087}, url = {https://dl.acm.org/doi/abs/10.1145/3391901}, doi = {10.1145/3391901}, year = {2020}, volume = {19}, author = {Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar}, journal = {ACM Transactions on Embedded Computing Systems (TECS)}, title = {EncoDeep: Realizing Bit-Flexible Encoding for Deep Neural Networks}, pdf = {Samragh2020.pdf}, _pageName = {Samragh2020} } @conference {Chen2020specmark, month = {10}, year = {2020}, author = {Huili Chen and Bita Darvish Rouhani and Farinaz Koushanfar}, journal = {INTERSPEECH}, title = {SpecMark: A Spectral Watermarking Framework for IP Protection of Speech Recognition Systems}, address = {Shanghai, China}, pdf = {Chen2020specmark.pdf}, _pageName = {Chen2020specmark} } @inproceedings {Hussain2020, booktitle = {Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP{\textquoteright}20)}, month = {9}, doi = {10.1145/3411501.3419433}, year = {2020}, author = {Siam U. Hussain and Baiyu Li and F. Koushanfar and Rosario Cammarota}, publisher = {ACM}, title = {TinyGarble2: Smart, Efficient, and Scalable Yao{\textquoteright}s Garble Circuit}, address = {Virtual}, organization = {ACM}, pdf = {Hussain2020.pdf}, _pageName = {Hussain2020} } @article {Rouhani2017curtail, month = {9}, url = {https://ieeexplore.ieee.org/abstract/document/9197614}, year = {2020}, author = {Mojan Javaheripi and Mohammad Samragh and Bita Darvish Rouhani and Tara Javidi and Farinaz Koushanfar}, publisher = {IEEE Transactions on Dependable and Secure Computing}, title = {CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning}, pdf = {CuRTAIL 2020.pdf}, _pageName = {Rouhani2017curtail} } @inproceedings {Chen2020ahec, booktitle = {Design Automation Conference (DAC)}, month = {7}, year = {2020}, author = {Huili Chen and Rosario Cammarota and Felipe Valencia and Francesco Regazzoni and Farinaz Koushanfar}, title = {AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration}, address = {Virtual event}, pdf = {Chen2020ahec.pdf}, _pageName = {Chen2020ahec} } @inproceedings {Chen2020flowtrojan, booktitle = {IEEE International NEWCAS Conference}, month = {6}, year = {2020}, author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar}, title = {FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips}, pdf = {Chen2020flowtrojan.pdf}, _pageName = {Chen2020flowtrojan} } @article {Adans2020, month = {5}, url = {https://ieeexplore.ieee.org/abstract/document/9086078}, year = {2020}, author = {Mojan Javaheripi and Mohammad Samragh and Tara Javidi and Farinaz Koushanfar}, publisher = {IEEE Journal of Selected Topics in Signal Processing (JSTSP)}, title = {AdaNS: Adaptive Non-Uniform Sampling for Automated Design of Compact DNNs}, pdf = {AdaNS 2020.pdf}, _pageName = {Adans2020} } @article {Chen2020, month = {4}, url = {https://dl.acm.org/doi/10.1145/3382127}, year = {2020}, volume = {25}, author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar}, journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)}, title = {Security of Microfluidic Biochip: Practical Attacks and Countermeasures}, pdf = {Chen2020.pdf}, _pageName = {Chen2020} } @inproceedings {Javaheripi2020, booktitle = {Genetic and Evolutionary Computation Conference (GECCO)}, url = {https://doi.org/10.1145/3377930.3390226}, year = {2020}, author = {Mojan Javaheripi and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar}, title = {GeneCAI: Genetic Evolution for Acquiring Compact AI}, pdf = {Javaheripi2020.pdf}, _pageName = {Javaheripi2020} } @article {Riazi2019deep, month = {12}, year = {2019}, author = {M. Sadegh Riazi and Bita Darvish Rouhani and Farinaz Koushanfar}, journal = {IEEE Security and Privacy (S\&P) Magazine}, title = {Deep Learning on Private Data}, pdf = {Riazi2019deep.pdf}, _pageName = {Riazi2019deep} } @inproceedings {Hussain2019fastwave, booktitle = {IEEE/ACM 2019 International Conference On Computer Aided Design (ICCAD)}, month = {11}, url = {https://ieeexplore.ieee.org/document/8942122}, doi = {10.1109/ICCAD45719.2019.8942122}, year = {2019}, author = {Hussain, Shehzeen and Mojan Javaheripi and Neekhara, Paarth and Kastner, Ryan and Farinaz Koushanfar}, publisher = {ACM/SIGDA}, title = {FastWave: Accelerating Autoregressive Convolutional Neural Networks on FPGA}, address = {Colorado, USA}, organization = {ACM/SIGDA}, _pageName = {Hussain2019fastwave} } @article {Javaheripi2019peeking, month = {11}, pages = {23-28}, year = {2019}, volume = {11}, author = {Mojan Javaheripi and Mohammad Samragh and Farinaz Koushanfar}, journal = {IEEE Solid-State Circuits Magazine}, title = {Peeking Into the Black Box: A Tutorial on Automated Design Optimization and Parameter Search}, pdf = {Javaheripi2019peeking.pdf}, _pageName = {Javaheripi2019peeking} } @inproceedings {Neekhara2019, booktitle = {2019 Conference on Empirical Methods in Natural Language Processing (EMNLP) and 9th International Joint Conference on Natural Language Processing (IJCNLP)}, month = {11}, url = {https://www.aclweb.org/anthology/D19-1525/}, doi = {10.18653/v1/D19-1525}, year = {2019}, author = {Neekhara, Paarth and Hussain, Shehzeen and Dubnov, Shlomo and Farinaz Koushanfar}, publisher = {ACM}, title = {Adversarial Reprogramming of Text Classification Neural Networks}, address = {Hong Kong, China}, organization = {ACM}, pdf = {Neekhara2019.pdf}, _pageName = {Neekhara2019} } @conference {Semihd2019, month = {11}, url = {https://ieeexplore.ieee.org/xpl/conhome/8931666/proceeding}, year = {2019}, author = {Mohsen Imani and Samuel Bosch and Mojan Javaheripi and Bita Rouhani and Xinyu Wu and Farinaz Koushanfar and Tajana Rosing}, publisher = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)}, title = {SemiHD: Semi-Supervised Learning Using Hyperdimensional Computing}, pdf = {Iccad19 semi-supervised.pdf}, _pageName = {Semihd2019} } @inproceedings {Chatterjee2019, booktitle = {ACM CCS}, month = {11}, year = {2019}, author = {Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels}, publisher = {ACM}, title = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms}, organization = {ACM}, pdf = {Chatterjee2019.pdf}, _pageName = {Chatterjee2019} } @conference {Chen2019genunlock, month = {11}, year = {2019}, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, journal = {International Conference On Computer Aided Design (ICCAD)}, title = {GenUnlock: An Automated Genetic Algorithm Framework forUnlocking Logic Encryption}, address = {Westminster, CO}, pdf = {Chen2019genunlock.pdf}, _pageName = {Chen2019genunlock} } @inproceedings {Hussain2019universal, booktitle = {INTERSPEECH 2019}, month = {9}, url = {https://www.isca-speech.org/archive/Interspeech_2019/abstracts/1353.html}, doi = {10.21437/Interspeech.2019-1353}, year = {2019}, author = {Hussain, Shehzeen and Neekhara, Paarth and Pandey, Prakhar and Dubnov, Shlomo and McAuley, Julian and Farinaz Koushanfar}, publisher = {International Speech Communication Association (ISCA)}, title = {Universal Adversarial Perturbations for Speech Recognition Systems}, address = {Graz, Austria}, organization = {International Speech Communication Association (ISCA)}, pdf = {Hussain2019universal.pdf}, _pageName = {Hussain2019universal} } @inproceedings {Imani2019, booktitle = {IEEE Cloud Computing (CLOUD)}, month = {8}, year = {2019}, author = {Mohsen Imani and Yeseong Kim and M. Sadegh Riazi and John Messerly and Patric Liu and Farinaz Koushanfar and Tajana Rosing}, publisher = {IEEE}, title = {A Framework for Collaborative Learning in Secure High-Dimensional Space}, organization = {IEEE}, _pageName = {Imani2019} } @inproceedings {Chen2019deepinspect, booktitle = {International Joint Conference on Artificial Intelligence (IJCAI)}, month = {8}, year = {2019}, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, title = {DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks}, address = {Macao, China}, pdf = {Chen2019deepinspect.pdf}, _pageName = {Chen2019deepinspect} } @inproceedings {Javaheripi2019, booktitle = {6th ICML Workshop on Automated Machine Learning}, month = {6}, year = {2019}, author = {Mojan Javaheripi and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar}, title = {ASCAI: Adaptive Sampling for acquiring Compact AI}, pdf = {Javaheripi2019.pdf}, _pageName = {Javaheripi2019} } @inproceedings {Chen2019deepattest, booktitle = {International Symposium on Computer Architecture (ISCA)}, month = {6}, year = {2019}, author = {Huili Chen and Cheng Fu and Bita Darvish Rouhani and Jishen Zhao and Farinaz Koushanfar}, title = {DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks}, pdf = {Chen2019deepattest.pdf}, _pageName = {Chen2019deepattest} } @inproceedings {Riazi2019, booktitle = {USENIX Security}, month = {5}, url = {https://arxiv.org/pdf/1902.07342.pdf}, year = {2019}, author = {M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar}, publisher = {USENIX}, title = {XONN: XNOR-based Oblivious Deep Neural Network Inference}, organization = {USENIX}, pdf = {Riazi2019.pdf}, _pageName = {Riazi2019} } @inproceedings {Riazi2019mpcircuits, booktitle = {Hardware Oriented Security and Trust (HOST)}, month = {5}, url = {https://eprint.iacr.org/2019/275.pdf}, year = {2019}, author = {M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar}, publisher = {IEEE}, title = {MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation}, organization = {IEEE}, pdf = {Riazi2019mpcircuits.pdf}, _pageName = {Riazi2019mpcircuits} } @inproceedings {Rouhani2019, booktitle = {Architectural Support for Programming Languages and Operating Systems (ASPLOS)}, month = {4}, year = {2019}, author = {Bita Darvish Rouhani and Huili Chen and Farinaz Koushanfar}, title = {DeepSigns: An End-to-End Watermarking Framework for Protecting the Ownership of Deep Neural Networks}, pdf = {Rouhani2019.pdf}, _pageName = {Rouhani2019} } @inproceedings {Hussain2019fase, booktitle = {Field-Programmable Custom Computing Machines (FCCM)}, month = {4}, year = {2019}, author = {Siam U. Hussain and Farinaz Koushanfar}, title = {FASE: FPGA Acceleration of Secure Function Evaluation}, address = {San Diego}, pdf = {Hussain2019fase.pdf}, _pageName = {Hussain2019fase} } @inproceedings {Songhori2019, booktitle = {Design Automation Conference (DAC)}, month = {3}, url = {https://arxiv.org/pdf/1902.02908.pdf}, year = {2019}, author = {Songhori, Ebrahim M. and M. Sadegh Riazi and Siam U. Hussain and Ahmad-Reza Sadeghi and Farinaz Koushanfar}, title = {ARM2GC: Succinct Garbled Processor for Secure Computation}, pdf = {Songhori2019.pdf}, _pageName = {Songhori2019} } @article {Hussain2019, year = {2019}, author = {Siam U. Hussain and M. Sadegh Riazi and Farinaz Koushanfar}, journal = {Preprint}, title = {The Fusion of Secure Function Evaluation and Logic Synthesis}, pdf = {Hussain2019.pdf}, _pageName = {Hussain2019} } @conference {Chen2019, year = {2019}, author = {Huili Chen and Bita Darvish Rouhani and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, journal = {ACM International Conference on Multimedia Retrieval (ICMR)}, publisher = {ACM}, title = {DeepMarks: A Secure Fingerprinting Framework for Digital Rights Management of Deep Learning Models}, pdf = {Chen2019.pdf}, _pageName = {Chen2019} } @article {Rouhani2018redcrypt, month = {12}, url = {https://dl.acm.org/citation.cfm?id=3242899}, year = {2018}, author = {Rouhani, Bita D and Siam U. Hussain and Kristin Lauter and Farinaz Koushanfar}, journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Issue on Deep learning on FPGAs}, title = {ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs}, _pageName = {Rouhani2018redcrypt} } @article {Hussain2018p3, month = {9}, doi = {https://doi.org/10.1145/3236625}, year = {2018}, volume = {23}, author = {Siam U. Hussain and Farinaz Koushanfar}, journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)}, title = {P3: Privacy Preserving Positioning for Smart Automotive Systems}, pdf = {Hussain2018p3.pdf}, _pageName = {Hussain2018p3} } @article {Hussain2018shaip, month = {9}, doi = {10.1145/3274669}, year = {2018}, volume = {23}, author = {Siam U. Hussain and M. Sadegh Riazi and Farinaz Koushanfar}, journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)}, title = {SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs}, pdf = {Hussain2018shaip.pdf}, _pageName = {Hussain2018shaip} } @inproceedings {Hussain2018, isbn = {978-1-4503-5700-5}, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {https://dl.acm.org/citation.cfm?id=3196074}, doi = {10.1145/3195970.3196074}, year = {2018}, author = {Siam U. Hussain and Bita Darvish Rouhani and Mohammad Ghasemzadeh and Farinaz Koushanfar}, publisher = {ACM}, title = {MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers}, address = {San Fransisco}, organization = {ACM}, pdf = {Hussain2018.pdf}, _pageName = {Hussain2018} } @inproceedings {Riazi2018, booktitle = {ASIACCS}, month = {3}, year = {2018}, author = {M. Sadegh Riazi and Christian Weinert and Oleksandr Tkachenko and Songhori, Ebrahim M. and Thomas Schneider and Farinaz Koushanfar}, publisher = {ACM}, title = {Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications}, organization = {ACM}, pdf = {Riazi2018.pdf}, _pageName = {Riazi2018} } @article {Rouhani2018, year = {2018}, author = {Bita Rouhani and Mohammad Samragh and Javidi, Tara and Farinaz Koushanfar}, journal = {To appear in IEEE Security and Privacy (S\&P) Magazine}, title = {Safe Machine Learning and Defeating Adversarial Attacks}, pdf = {Rouhani2018.pdf}, _pageName = {Rouhani2018} } @inproceedings {Rouhani2018causalearn, booktitle = {International Symposium on Field-Programmable Gate Arrays (FPGA {\textquoteright}18)}, year = {2018}, author = {Rouhani, Bita D and Mohammad Ghasemzadeh and Farinaz Koushanfar}, publisher = {ACM/SIGDA}, title = {CausaLearn: Automated Framework for Scalable Streaming-based Causal Bayesian Learning using FPGAs}, organization = {ACM/SIGDA}, pdf = {Rouhani2018causalearn.pdf}, _pageName = {Rouhani2018causalearn} } @inproceedings {Rouhani2018deepfense, booktitle = {ICCAD}, url = {https://arxiv.org/abs/1709.02538}, year = {2018}, author = {Bita Rouhani and Mohammad Samragh and Mojan Javaheripi and Farinaz Koushanfar and Javidi, Tara}, title = {DeepFense: Online Accelerated Defense Against Adversarial Deep Learning}, _pageName = {Rouhani2018deepfense} } @inproceedings {Rouhani2018deepsigns, year = {2018}, author = {Bita Rouhani and Huili Chen and Farinaz Koushanfar}, title = {DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models}, _pageName = {Rouhani2018deepsigns} } @inproceedings {Chen2018, url = {https://arxiv.org/abs/1804.03648}, year = {2018}, author = {Huili Chen and Bita Darvish Rouhani and Farinaz Koushanfar}, title = {DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks}, pdf = {Chen2018.pdf}, _pageName = {Chen2018} } @inproceedings {Ghasemzadeh2018, booktitle = {The 26th IEEE International Symposium on Field-Programmable Custom Computing Machines}, year = {2018}, author = {Mohammad Ghasemzadeh and Mohammad Samragh and Farinaz Koushanfar}, title = {ReBNet: Residual Binarized Neural Network}, pdf = {Ghasemzadeh2018.pdf}, _pageName = {Ghasemzadeh2018} } @inproceedings {Chen2017, isbn = {978-1-5386-2254-4}, booktitle = {IEEE International Conference on Computer Design (ICCD)}, month = {11}, issn = {978-1-5386-2255-1}, url = {https://ieeexplore.ieee.org/abstract/document/8119184/}, doi = {10.1109/ICCD.2017.11}, year = {2017}, author = {Huili Chen and Seetal Potluri and Farinaz Koushanfar}, publisher = {IEEE}, title = {BioChipWork: Reverse Engineering of Microfluidic Biochips}, address = {Boston, MA, USA}, organization = {IEEE}, pdf = {Chen2017.pdf}, _pageName = {Chen2017} } @inproceedings {Riazi2017prisearch, booktitle = {Design Automation Conference (DAC)}, month = {5}, url = {http://sadeghr.com/wp-content/uploads/2017/06/PriSearch.pdf}, year = {2017}, author = {M. Sadegh Riazi and Songhori, Ebrahim M. and Farinaz Koushanfar}, title = {PriSearch: Efficient Search on Private Data}, address = {Austin, Texas}, _pageName = {Riazi2017prisearch} } @article {Rouhani2017deepsecure, month = {5}, url = {https://arxiv.org/pdf/1705.08963}, year = {2017}, volume = {arXiv:1705.08963}, author = {Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar}, journal = {arXiv preprint}, title = {DeepSecure: Scalable Provably-Secure Deep Learning}, _pageName = {Rouhani2017deepsecure} } @article {Riazi2017toward, chapter = {62}, month = {1}, url = {https://www.degruyter.com/downloadpdf/j/popets.2017.2017.issue-1/popets-2017-0005/popets-2017-0005.pdf}, year = {2017}, volume = {2017}, author = {M. Sadegh Riazi and Songhori, Ebrahim M. and Ahmad-Reza Sadeghi and Thomas Schneider and Farinaz Koushanfar}, journal = {Proceedings on Privacy Enhancing Technologies}, title = {Toward Practical Secure Stable Matching}, pdf = {Riazi2017toward.pdf}, _pageName = {Riazi2017toward} } @inproceedings {Mirhoseini2017, booktitle = {International Parallel \& Distributed Processing Symposium (IPDPS)}, year = {2017}, author = {Azalia Mirhoseini and Rouhani, Bita D and Songhori, Ebrahim M. and Farinaz Koushanfar}, publisher = {IEEE}, title = {ExtDict: Extensible Dictionaries for Data- and Platform-Aware Large-Scale Learning}, organization = {IEEE}, pdf = {Mirhoseini2017.pdf}, _pageName = {Mirhoseini2017} } @article {Riazi2017, year = {2017}, author = {M. Sadegh Riazi and Mohammad Samragh and Farinaz Koushanfar}, journal = {ACM Transactions on Embedded Computing Systems (TECS)}, title = {CAMsure: Secure Content-Addressable Memory for Approximate Search}, pdf = {Riazi2017.pdf}, _pageName = {Riazi2017} } @article {Rouhani2017, year = {2017}, author = {Bita Darvish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar}, journal = {ACM Transactions on Embedded Computing Systems (TECS)}, title = {RISE: An Automated Framework for Real-Time Intelligent Video Surveillance on FPGA}, pdf = {Rouhani2017.pdf}, _pageName = {Rouhani2017} } @inproceedings {Rouhani2017deep3, booktitle = {Design Automation Conference (DAC)}, year = {2017}, author = {Bita Dravish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar}, publisher = {ACM}, title = {Deep3: Leveraging Three Levels of Parallelism for Efficient Deep Learning}, organization = {ACM}, _pageName = {Rouhani2017deep3} } @inproceedings {Rouhani2017tinydl, booktitle = {International Symposium on Circuits and Systems (ISCAS)}, year = {2017}, author = {Rouhani, Bita D and Azalia Mirhoseini and Farinaz Koushanfar}, publisher = {IEEE}, title = {TinyDL: Just-In-Time Deep Learning Solution For Constrained Embedded Systems}, organization = {IEEE}, pdf = {Rouhani2017tinydl.pdf}, _pageName = {Rouhani2017tinydl} } @inproceedings {Samragh2017, booktitle = {Design Automation and Test in Europe (DATE)}, year = {2017}, author = {Mohammad Samragh and Mohsen Imani and Farinaz Koushanfar and Tajana Rosing}, title = {LookNN: Neural Network with No Multiplication}, pdf = {Samragh2017.pdf}, _pageName = {Samragh2017} } @inproceedings {Samragh2017customizing, booktitle = {IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM)}, year = {2017}, author = {Mohammad Samragh and Mohammad Ghasemzadeh and Farinaz Koushanfar}, publisher = {IEEE}, title = {Customizing Neural Networks for Efficient FPGA Implementation}, organization = {IEEE}, pdf = {Samragh2017customizing.pdf}, _pageName = {Samragh2017customizing} } @article {Riazi2016sub, month = {11}, url = {https://arxiv.org/pdf/1612.01835.pdf}, year = {2016}, author = {M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar}, journal = {arXiv}, title = {Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties}, pdf = {Riazi2016sub.pdf}, _pageName = {Riazi2016sub} } @mastersthesis {Riazi2016, month = {7}, pages = {123}, year = {2016}, volume = {Master of Science}, author = {M. Sadegh Riazi}, title = {Large-Scale Privacy-Preserving Matching and Search}, school = {Rice University}, pdf = {Riazi2016.pdf}, _pageName = {Riazi2016} } @inproceedings {Mirhoseini2016perform, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {dl.acm.org/citation.cfm?id=2898060}, year = {2016}, author = {Azalia Mirhoseini and Bita Darvish Rouhani and Songhori, Ebrahim M. and Farinaz Koushanfar}, title = {Perform-ML: Performance Optimized Machine Learning by Platform and Content Aware Customization}, pdf = {Mirhoseini2016perform.pdf}, _pageName = {Mirhoseini2016perform} } @inproceedings {Songhori2016, booktitle = {Design Automation Conference}, month = {6}, url = {dl.acm.org/citation.cfm?id=2898027}, year = {2016}, author = {Songhori, Ebrahim M. and Shaza Zeitouni and Ghada Dessouky and T. Schneider and Ahmad-Reza Sadeghi and Farinaz Koushanfar}, title = {GarbledCPU: A MIPS Processor for Secure Computation in Hardware}, pdf = {Songhori2016.pdf}, _pageName = {Songhori2016} } @inproceedings {Abera2016, booktitle = {Design Automation Conference (DAC)}, month = {6}, year = {2016}, author = {Tigist Abera and N. Asokan and Lucas Davi and Farinaz Koushanfar and Andrew Paverd and Ahmad-Reza Sadeghi and Gene Tsudik}, title = {Things, Trouble, Trust: On Building Trust in IoT Systems}, pdf = {Abera2016.pdf}, _pageName = {Abera2016} } @inproceedings {Hussain2016privacy, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://dl.acm.org/citation.cfm?id=2898071}, year = {2016}, author = {Siam U. Hussain and Farinaz Koushanfar}, title = {Privacy Preserving Localization for Smart Automotive Systems}, pdf = {Hussain2016privacy.pdf}, _pageName = {Hussain2016privacy} } @inproceedings {Mirhoseini2016cryptoml, booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)}, month = {5}, year = {2016}, author = {Azalia Mirhoseini and Ahmad-Reza Sadeghi and Farinaz Koushanfar}, title = {CryptoML: Secure Outsourcing of Big Data Machine Learning Applications}, pdf = {Mirhoseini2016cryptoml.pdf}, _pageName = {Mirhoseini2016cryptoml} } @inproceedings {Riazi2016genmatch, booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)}, month = {5}, year = {2016}, author = {M. Sadegh Riazi and Neeraj K. R. Dantu and L. N. Vinay Gattu and Farinaz Koushanfar}, title = {GenMatch: Secure DNA Compatibility Testing}, pdf = {Riazi2016genmatch.pdf}, _pageName = {Riazi2016genmatch} } @inproceedings {Zhang2016, booktitle = {IEEE International Symposium on Hardware Oriented Security and Trust(HOST)}, month = {5}, year = {2016}, author = {Ye Zhang and Farinaz Koushanfar}, title = {Robust Privacy-Preserving Fingerprint Authentication}, pdf = {Zhang2016.pdf}, _pageName = {Zhang2016} } @article {Mirhoseini2016, month = {1}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7447819}, year = {2016}, volume = {2}, author = {Azalia Mirhoseini and Bita Darvish Rouhani and Songhori, Ebrahim M. and Farinaz Koushanfar}, journal = {IEEE Transactions on Multi-Scale Computing Systems (TMSCS)}, title = {Chime: Checkpointing long computations on intermittently energized IoT devices}, pdf = {Mirhoseini2016.pdf}, _pageName = {Mirhoseini2016} } @article {Hussain2016, chapter = {1-1}, month = {1}, issn = {2332-7766}, url = {http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?tp=\&arnumber=7387751}, doi = {10.1109/TMSCS.2016.2519902}, year = {2016}, volume = {2}, author = {Siam U. Hussain and Mehrdad Majzoobi and Farinaz Koushanfar}, journal = {IEEE Transactions on Multi-Scale Computing Systems}, title = {A Built-In-Self-Test Scheme for Online Evaluation of Physical Unclonable Functions and True Random Number Generators}, pdf = {Hussain2016.pdf}, _pageName = {Hussain2016} } @inproceedings {Rouhani2016, booktitle = {Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis}, year = {2016}, author = {Rouhani, Bita D and Azalia Mirhoseini and Farinaz Koushanfar}, title = {Going deeper than deep learning for massive data analytics under physical constraints}, pdf = {Rouhani2016.pdf}, _pageName = {Rouhani2016} } @article {Rouhani2016automated, year = {2016}, author = {Rouhani, Bita D and Azalia Mirhoseini and Songhori, Ebrahim M. and Farinaz Koushanfar}, journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS)}, title = {Automated Real-Time Analysis of Streaming Big and Dense Data on Reconfigurable Platforms}, pdf = {Rouhani2016automated.pdf}, _pageName = {Rouhani2016automated} } @inproceedings {Rouhani2016delight, isbn = {978-1-4503-4185-1/16/08}, booktitle = {International Symposium on Low Power Electronics and Design (ISLPED)}, doi = {http://dx.doi.org/10.1145/2934583.2934599}, year = {2016}, author = {Bita Darvish Rouhani and Azalia Mirhoseini and Farinaz Koushanfar}, publisher = {ACM}, title = {DeLight: Adding Energy Dimension To Deep Neural Networks}, address = {San Francisco}, organization = {ACM}, pdf = {Rouhani2016delight.pdf}, _pageName = {Rouhani2016delight} } @inproceedings {Kahevo2015, booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)}, month = {11}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372577}, doi = {10.1109/ICCAD.2015.7372577}, year = {2015}, author = {A. B. Kahng and F. Koushanfar}, title = {Evolving EDA Beyond its E-Roots: An Overview}, pdf = {Kahevo2015.pdf}, _pageName = {Kahevo2015} } @inproceedings {Koudas2015, booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)}, month = {11}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7372578}, doi = {10.1109/ICCAD.2015.7372578}, year = {2015}, author = {F. Koushanfar and A. Mirhoseini and G. Qu and Z. Zhang}, title = {DA Systemization of Knowledge: A Catalog of Prior Forward-Looking Initiatives}, pdf = {Koudas2015.pdf}, _pageName = {Koudas2015} } @article {Chung2015, month = {8}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6977972}, doi = {10.1109/TC.2014.2378291}, year = {2015}, volume = {64}, author = {S. Chung and J. Kong and F. Koushanfar}, journal = {IEEE Transactions on Computers}, title = {An Energy-efficient Last-level Cache Architecture for Process Variation-tolerant 3D Microprocessors}, pdf = {Chung2015.pdf}, _pageName = {Chung2015} } @conference {Demaut2015, month = {8}, url = {http://dl.acm.org/citation.cfm?id=2813678}, doi = {10.1145/2810103.2813678}, year = {2015}, author = {Demmler, D. and G. Dessouky and F. Koushanfar and Sadeghi, A. and T. Schneider and S. Zeitouni}, journal = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, title = {Automated Synthesis of Optimized Circuits for Secure Computation}, pdf = {Demaut2015.pdf}, _pageName = {Demaut2015} } @inproceedings {Songhori2015, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7167220\&tag=1}, doi = {10.1145/2744769.2744808}, year = {2015}, author = {E. Songhori and Siam U. Hussain and Ahmad-Reza Sadeghi and F. Koushanfar}, title = {Compacting privacy-preserving k-nearest neighbor search using logic synthesis}, pdf = {Songhori2015.pdf}, _pageName = {Songhori2015} } @inproceedings {Rouhani2015, booktitle = {23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)}, month = {5}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7160069}, doi = {10.1109/FCCM.2015.56}, year = {2015}, author = {B. Rouhani and E. Songhori and A. Mirhoseini and F. Koushanfar}, title = {SSketch: An Automated Framework for Streaming Sketch-based Analysis of Big Data on FPGA}, pdf = {Rouhani2015.pdf}, _pageName = {Rouhani2015} } @inproceedings {Songhori2015tinygarble, booktitle = {IEEE Symposium on Security and Privacy (S\&P)(14\% acceptance rate)}, month = {5}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7163039}, doi = {10.1109/SP.2015.32}, year = {2015}, author = {E. Songhori and Siam U. Hussain and Ahmad-Reza Sadeghi and T. Schneider and F. Koushanfar}, title = {TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits}, pdf = {Songhori2015tinygarble.pdf}, _pageName = {Songhori2015tinygarble} } @inproceedings {Miettinen2015, booktitle = {AsiaCCS 2015 (17\% acceptance rate for full papers)}, month = {4}, url = {http://dl.acm.org/citation.cfm?id=2714634}, doi = {10.1145/2714576.2714634}, year = {2015}, author = {Markus Miettinen and Majid Sobhani and Thien Duc Nguyen and Jon Rios and Sudha Yellapantula and N. Asokan and Ahmad-Reza Sadeghi and Farinaz Koushanfar}, title = {I Know Where You are: Proofs of Presence Resilient to Malicious Provers}, pdf = {Miettinen2015.pdf}, _pageName = {Miettinen2015} } @article {Mirhoseini2015phase, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7048065}, doi = {10.1109/JETCAS.2015.2398211}, year = {2015}, volume = {5}, author = {A. Mirhoseini and M. Potkonjak and F. Koushanfar}, journal = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), Special Issue on Computing in Emerging Technologies}, title = {Phase Change Memory Write Cost Minimization by Data Encoding}, pdf = {Mirhoseini2015phase.pdf}, _pageName = {Mirhoseini2015phase} } @inproceedings {Songhori2015ahead, booktitle = {IEEE/ACM Design, Automation \& Test in Europe (DATE)}, month = {3}, url = {http://dl.acm.org/citation.cfm?id=2757032}, year = {2015}, author = {E. Songhori and A. Mirhoseini and F. Koushanfar}, title = {AHEAD: Automated Framework for Hardware Accelerated Iterative Data Analysis}, pdf = {Songhori2015ahead.pdf}, _pageName = {Songhori2015ahead} } @inproceedings {Mirhoseini2015, booktitle = {ACM SIGMETRICS Performance Evaluation Review}, year = {2015}, author = {Azalia Mirhoseini and Songhori, Ebrahim M. and Rouhani, Bita D and Farinaz Koushanfar}, title = {Flexible Transformations For Learning Big Data}, pdf = {Mirhoseini2015.pdf}, _pageName = {Mirhoseini2015} } @article {Nowroz2014, month = {12}, issn = {1937-4151}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=6951867}, pages = {1792-1805}, doi = {10.1109/TCAD.2014.2354293}, year = {2014}, volume = {33}, author = {Abdullah Nazma Nowroz and Kangqiao Hu and Farinaz Koushanfar and Sherief Reda}, journal = {IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems}, title = {Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps}, pdf = {Nowroz2014.pdf}, _pageName = {Nowroz2014} } @inproceedings {Shahrjerdi2014, booktitle = {International Conference on Computer-Aided Design}, month = {11}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7001348}, year = {2014}, author = {Davood Shahrjerdi and Jeyavijayan Rajendran and Siddharth Garg and Farinaz Koushanfar and Ramesh Karri}, title = {Shielding and Securing Integrated Circuits with Sensors}, pdf = {Shahrjerdi2014.pdf}, _pageName = {Shahrjerdi2014} } @inproceedings {Hussain2014, booktitle = {International Conference on Computer-Aided Design}, month = {11}, url = {dl.acm.org/citation.cfm?id=2691400}, year = {2014}, author = {Siam U. Hussain and Sudha Yellapantula and Mehrdad Majzoobi and Farinaz Koushanfar}, title = {BIST-PUF: Online, Hardware-based Evaluation of Physically Unclonable Circuit Identifiers}, pdf = {Hussain2014.pdf}, _pageName = {Hussain2014} } @article {Karri2014, month = {8}, issn = {1558-2256}, pages = {1123-1125}, doi = {10.1109/JPROC.2014.2334837}, year = {2014}, volume = {102}, author = {Ramesh Karri and Farinaz Koushanfar}, journal = {Proceedings of the IEEE}, title = {Trustworthy Hardware}, pdf = {Karri2014.pdf}, _pageName = {Karri2014} } @article {Rostami2014a, month = {8}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6860363}, doi = {10.1109/JPROC.2014.2335155}, year = {2014}, volume = {102}, author = {Masoud Rostami and Farinaz Koushanfar and Ramesh Karri}, journal = {Proceedings of the IEEE}, title = {A Primer on Hardware Security: Models, Methods, and Metrics}, pdf = {Rostami2014a.pdf}, _pageName = {Rostami2014a} } @article {Herder2014, month = {8}, issn = {1558-2256}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6823677}, pages = {1126 - 1141}, doi = {10.1109/JPROC.2014.2320516}, year = {2014}, volume = {102}, author = {Herder, Charles and Yu, Meng-Day and Farinaz Koushanfar and Srinivas Devadas}, journal = {Proceedings of the IEEE}, title = {Physical Unclonable Functions and Applications: A Tutorial}, pdf = {Herder2014.pdf}, _pageName = {Herder2014} } @inproceedings {Kong2014, booktitle = {Design Automation Conference (DAC), Best paper candidate}, month = {6}, url = {http://dl.acm.org/citation.cfm?id=2593192}, year = {2014}, author = {Kong, Joonho and Farinaz Koushanfar and Praveen K. Pendyala and Ahmad-Reza Sadeghi and Christian Wachsmann}, title = {PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs}, pdf = {Kong2014.pdf}, _pageName = {Kong2014} } @inproceedings {Wendt2014, isbn = {9781450327305}, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {dl.acm.org/citation.cfm?id=2593228}, pages = {1 - 6}, doi = {10.1145/2593069.2593228}, year = {2014}, author = {James B. Wendt and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Techniques for Foundry Identification}, pdf = {Wendt2014.pdf}, _pageName = {Wendt2014} } @inproceedings {Munir2014d2cyber, booktitle = {Design, Automation \& Test in Europe (DATE)}, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6800272}, year = {2014}, author = {Arslan Munir and Farinaz Koushanfar}, title = {D2Cyber: A Design Automation Tool for Dependable Cybercars}, pdf = {Munir2014d2cyber.pdf}, _pageName = {Munir2014d2cyber} } @conference {Rostami2014quo, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6800566}, year = {2014}, author = {Masoud Rostami and James B. Wendt and Potkonjak, Miodrag and Farinaz Koushanfar}, journal = {Design, automation, and test in Europe (DATE)}, title = {Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security}, address = {Dresden}, pdf = {Rostami2014quo.pdf}, _pageName = {Rostami2014quo} } @article {Munir2014, number = {1}, month = {1}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6081397}, pages = {1872-1890}, year = {2014}, volume = {74}, author = {Arslan Munir and Ann Gordon-Ross and Sanjay Ranka and Farinaz Koushanfar}, journal = {Elsevier Journal of Parallel and Distributed Computing (JPDC)}, title = {A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems}, pdf = {Munir2014.pdf}, _pageName = {Munir2014} } @article {Rostami2014, month = {1}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=\&arnumber=6714458}, year = {2014}, volume = {2}, author = {Masoud Rostami and Mehrdad Majzoobi and Farinaz Koushanfar and Dan Wallach and Srini Devadas}, journal = {IEEE Transactions on Emerging Topics in Computing}, title = {Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching}, pdf = {Rostami2014.pdf}, _pageName = {Rostami2014} } @article {Farinaz2013Power, month = {12}, url = {https://eprint.iacr.org/2013/851}, year = {2013}, author = {Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson}, publisher = {Cryptology ePrint}, title = {Power and Timing Side Channels for PUFs and their Efficient Exploitation}, _pageName = {Farinaz2013Power} } @article {Kong2013, month = {11}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6656920}, doi = {10.1109/TETC.2013.2289385}, year = {2013}, volume = {2}, author = {Kong, Joonho and Farinaz Koushanfar}, journal = {IEEE Transactions on Emerging Topics in Computing}, title = {Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning}, pdf = {Kong2013.pdf}, _pageName = {Kong2013} } @inproceedings {Munir2013cycar, booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security - CCS {\textquoteright}13}, month = {11}, url = {http://dl.acm.org/citation.cfm?doid=2508859.2509030}, pages = {1481 - 1482}, doi = {10.1145/2508859.2509030}, year = {2013}, author = {Arslan Munir and Farinaz Koushanfar and Seudi{\'e}, Herv{\'e} and Ahmad-Reza Sadeghi}, title = {CyCAR{\textquoteright}2013: First international academic workshop on security, privacy and dependability for cybervehicles}, pdf = {Munir2013cycar.pdf}, _pageName = {Munir2013cycar} } @conference {Rostami2013hardware, month = {11}, url = {http://dl.acm.org/citation.cfm?id=2561985}, year = {2013}, author = {Masoud Rostami and Farinaz Koushanfar and Jeyavijayan Rajendran and Ramesh Karri}, journal = {International Conference on Computer-Aided Deisgn}, title = {Hardware Security: Threat Models and Metrics}, pdf = {Rostami2013hardware.pdf}, _pageName = {Rostami2013hardware} } @conference {Rostami2013heart, month = {11}, url = {http://dl.acm.org/citation.cfm?id=2516658}, doi = {10.1145/2508859.2516658}, year = {2013}, author = {Masoud Rostami and Ari Juels and Farinaz Koushanfar}, journal = {ACM Conference on Computer and Communications Security}, title = {Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]}, pdf = {Rostami2013heart.pdf}, _pageName = {Rostami2013heart} } @inproceedings {Mirhoseini2013automated, booktitle = {2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED)}, month = {9}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6629262}, pages = {27 - 32}, doi = {10.1109/ISLPED.2013.6629262}, year = {2013}, author = {Azalia Mirhoseini and Songhori, Ebrahim M. and Farinaz Koushanfar}, title = {Automated checkpointing for enabling intensive applications on energy harvesting devices}, pdf = {Mirhoseini2013automated.pdf}, _pageName = {Mirhoseini2013automated} } @conference {Rostami2013, month = {6}, url = {http://dl.acm.org/citation.cfm?id=2488750}, doi = {10.1145/2463209.2488750}, year = {2013}, author = {Masoud Rostami and Wayne Burleson and Ari Juels and Farinaz Koushanfar}, journal = {Design Automation Conference}, title = {Balancing Security and Utility in Medical Devices?}, pdf = {Rostami2013.pdf}, _pageName = {Rostami2013} } @article {Munir2013, month = {4}, url = {http://link.springer.com/article/10.1007\%2Fs11227-013-0916-9}, doi = {10.1007/s11227-013-0916-9}, year = {2013}, volume = {64}, author = {Arslan Munir and Farinaz Koushanfar and Ann Gordon-Ross and Sanjay Ranka}, journal = {The Journal of Supercomputing}, title = {High-Performance Optimizations on Tiled Many-Core Embedded Systems: A Matrix Multiplication Case Study}, pdf = {Munir2013.pdf}, _pageName = {Munir2013} } @article {Kiyavash2013, month = {3}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6410028}, pages = {477 - 487}, doi = {10.1109/TIFS.2013.2238930}, year = {2013}, volume = {8}, author = {Kiyavash, Negar and Farinaz Koushanfar and Coleman, Todd P. and Rodrigues, Mavis}, journal = {IEEE Transactions on Information Forensics and Security}, title = {A Timing Channel Spyware for the CSMA/CA Protocol}, pdf = {Kiyavash2013.pdf}, _pageName = {Kiyavash2013} } @conference {Mirhoseini2013, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6526735}, doi = {10.1109/PerCom.2013.6526735}, year = {2013}, author = {A. Mirhoseini and E. M. Songhori and F. Koushanfar}, journal = {Pervasive Computing and Communication conference (PerCom)}, title = {Idetic: A High-level Synthesis Approach for Enabling Long Computations on Transiently-powered ASICs}, pdf = {Mirhoseini2013.pdf}, _pageName = {Mirhoseini2013} } @inproceedings {Yao2013, booktitle = {Design, Automation \& Test in Europe (DATE)}, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513541}, doi = {10.7873/DATE.2013.095}, year = {2013}, author = {Yida Yao and Myung-Bo Kim and Jianmin Li and Igor L. Markov and Farinaz Koushanfar}, title = {ClockPUF: Physical Unclonable Functions based on Clock Networks}, pdf = {Yao2013.pdf}, _pageName = {Yao2013} } @article {Majzoobi2013, number = {2}, month = {3}, url = {http://doi.acm.org/10.1145/2442087.2442097}, pages = {26:1{\textendash}26:22}, doi = {10.1145/2442087.2442097}, year = {2013}, volume = {18}, author = {Mehrdad Majzoobi and Kong, Joonho and Farinaz Koushanfar}, journal = {ACM Trans. Des. Autom. Electron. Syst.}, publisher = {ACM}, title = {Low-power Resource Binding by Postsilicon Customization}, address = {New York, NY, USA}, pdf = {Majzoobi2013.pdf}, _pageName = {Majzoobi2013} } @article {Majtodaes2011, number = {in press}, month = {3}, url = {http://dl.acm.org/citation.cfm?id=2442097}, year = {2013}, author = {Mehrdad Majzoobi and Farinaz Koushanfar}, journal = {ACM Transactions on Design Automation of Electronic Systems (TODAES)}, title = {Post-silicon Resource Binding Customization for Low Power}, pdf = {Majtodaes2011.pdf}, _pageName = {Maj todaes 2011} } @article {Chen2013, month = {3}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6472113}, pages = {1 - 4}, doi = {10.1109/JETCAS.2013.2244771}, year = {2013}, volume = {3}, author = {Chen, Yen-Kuang and Wu, An-Yeu and Bayoumi, Magdy A. and Farinaz Koushanfar}, journal = {IEEE Journal on Emerging and Selected Topics in Circuits and Systems}, title = {Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things}, pdf = {Chen2013.pdf}, _pageName = {Chen2013} } @conference {Hu2013, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6513709}, doi = {10.7873/DATE.2013.263}, year = {2013}, author = {Kangqiao Hu and Abdullah Nazma Nowroz and Sherief Reda and Farinaz Koushanfar}, journal = {Design, Automation \& Test in Europe (DATE)}, title = {High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization}, pdf = {Hu2013.pdf}, _pageName = {Hu2013} } @article {Mahmoud2013, url = {http://eprint.iacr.org/2013/632}, year = {2013}, author = {Mahmoud, Ahmed and R{\"u}hrmair,Ulrich and Mehrdad Majzoobi and Farinaz Koushanfar}, journal = {Cryptology ePrint Archive, Report 2013/632}, title = {Combined Modeling and Side Channel Attacks on Strong PUFs}, pdf = {Mahmoud2013.pdf}, _pageName = {Mahmoud2013} } @inproceedings {Wei2012provably, booktitle = {IEEE/ACM International Conference on Computer-Aided Design (ICCAD)}, month = {11}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6386729}, year = {2012}, author = {Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Provably Complete Hardware Trojan Detection Using Test Point Insertion}, pdf = {Wei2012provably.pdf}, _pageName = {Wei2012provably} } @inproceedings {Koushanfar2012can, booktitle = {Design Automation Conference (DAC)}, month = {6}, year = {2012}, author = {Farinaz Koushanfar and Saverio Fazzari and Carl McCants and William Bryson and Matthew Sale and Peilin Song and Potkonjak, Miodrag}, publisher = {IEEE}, title = {Can EDA Combat the Rise of Electronic Counterfeiting?}, address = {Can EDA Combat the Rise of Electronic Counterfeiting?}, organization = {IEEE}, pdf = {Koushanfar2012can.pdf}, _pageName = {Koushanfar2012can} } @inproceedings {Koushanfar2012eda, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241514}, year = {2012}, author = {Farinaz Koushanfar and Ahmad-Reza Sadeghi and Herv{\'e} Seudie}, title = {EDA for Secure and Dependable Cybercars: Challenges and Opportunities}, pdf = {Koushanfar2012eda.pdf}, _pageName = {Koushanfar2012eda} } @inproceedings {Mirhoseini2012, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {dl.acm.org/citation.cfm?id=2228374}, year = {2012}, author = {Azalia Mirhoseini and Potkonjak, Miodrag and Farinaz Koushanfar}, title = {Coding-based Energy Minimization for Phase Change Memory}, pdf = {Mirhoseini2012.pdf}, _pageName = {Mirhoseini2012} } @inproceedings {Wei2012hardware, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241495}, year = {2012}, author = {Sheng Wei and Kai Li and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Hardware Trojan Horse Benchmark via Optimal Creation and Placement of Malicious Circuitry}, pdf = {Wei2012hardware.pdf}, _pageName = {Wei2012hardware} } @inproceedings {Majzoobi2012, booktitle = {International Workshop on Trustworthy Embedded Devices}, month = {5}, doi = {10.1109/SPW.2012.30}, year = {2012}, author = {Mehrdad Majzoobi and Masoud Rostami and Farinaz Koushanfar and Dan S. Wallach and Srinivas Devadas}, title = {Slender PUF Protocol: A lightweight, robust, and secure authentication by substring matching}, pdf = {Majzoobi2012.pdf}, _pageName = {Majzoobi2012} } @article {Wei2012, month = {4}, issn = {1556-6021}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112216}, pages = {765-773}, doi = {10.1109/TIFS.2011.2181500}, year = {2012}, volume = {7}, author = {Sheng Wei and Nahapetian, Ani and Nelson, Michael and Farinaz Koushanfar and Potkonjak, Miodrag}, journal = {IEEE Transactions on Information Forensics and Security}, title = {Gate Characterization Using Singular Value Decomposition: Foundations and Applications}, pdf = {Wei2012.pdf}, _pageName = {Wei2012} } @article {Koushanfar2012, month = {2}, issn = {1556-6021}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5966342}, pages = {51-63}, doi = {10.1109/TIFS.2011.2163307}, year = {2012}, volume = {7}, author = {Farinaz Koushanfar}, journal = {IEEE Transactions on Information Forensics and Security}, title = {Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management}, pdf = {Koushanfar2012.pdf}, _pageName = {Koushanfar2012} } @conference {Majzoobi2011fpga, month = {10}, url = {http://dl.acm.org/citation.cfm?id=2044931}, year = {2011}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srini Devadas}, journal = {Workshop on Cryptographic Hardware and Embedded Systems (CHES)}, title = {FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control}, pdf = {Majzoobi2011fpga.pdf}, _pageName = {Majzoobi2011fpga} } @inproceedings {Wei2011, isbn = {9781450310055}, booktitle = {Proceedings of the 11th annual ACM workshop on Digital rights management - DRM {\textquoteright}11}, month = {10}, url = {http://dl.acm.org/citation.cfm?doid=2046631.2046635}, pages = {3}, doi = {10.1145/2046631.2046635}, year = {2011}, author = {Sheng Wei and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Integrated circuit digital rights management techniques using physical level characterization}, pdf = {Wei2011.pdf}, _pageName = {Wei2011} } @inproceedings {Mirhoseini2011learning, booktitle = {International Symposium on Low Power Electronics and Design (ISLPED)}, month = {8}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5993641}, pages = {in press}, year = {2011}, author = {Azalia Mirhoseini and Farinaz Koushanfar}, title = {Learning to Manage Combined Energy Supply Systems}, pdf = {Mirhoseini2011learning.pdf}, _pageName = {Mirhoseini2011learning} } @inproceedings {Dyer2011, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5981935}, pages = {in press}, year = {2011}, author = {Eva Dyer and Mehrdad Majzoobi and Farinaz Koushanfar}, title = {Hybrid Spatial Modeling of Non-Stationary Process Variations}, pdf = {Dyer2011.pdf}, _pageName = {Dyer2011} } @conference {Koushanfar2011Hybrid, month = {5}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5938109}, year = {2011}, author = {Farinaz Koushanfar and Azalia Mirhoseini}, journal = {IEEE International Symposium on Circuits and Systems (ISCAS)}, title = {Hybrid Heterogeneous Energy Supply Networks}, pdf = {Koushanfar2011Hybrid.pdf}, _pageName = {Koushanfar2011Hybrid} } @conference {Koushanfar2011integrated, month = {5}, url = {http://dl.acm.org/citation.cfm?id=1973110}, year = {2011}, type = {Invited Paper}, author = {Farinaz Koushanfar}, journal = {GLSVLSI}, title = {Integrated Circuits Metering for Piracy Protection and Digital Rights Management: An Overview}, pdf = {Koushanfar2011integrated.pdf}, _pageName = {Koushanfar2011integrated} } @inproceedings {Mehrdad2011, booktitle = {IEEE International Symposium on Circuits and Systems (ISCAS)}, month = {5}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5938005}, year = {2011}, author = {Mehrdad Majzoobi and Golsa Ghiaasi-Hafezi and Farinaz Koushanfar and Sani Nassif}, title = {Ultra-low Power Current-based PUF}, pdf = {Mehrdad2011.pdf}, _pageName = {Mehrdad2011} } @article {Majzoobi2011time, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5737786}, pages = {1123-1135}, year = {2011}, volume = {6}, author = {Mehrdad Majzoobi and Farinaz Koushanfar}, journal = {IEEE Transactions on Information Forensics and Security (TIFS)}, title = {Time-Bounded Authentication of FPGAs}, pdf = {Majzoobi2011time.pdf}, _pageName = {Majzoobi2011time} } @article {Koushanfar2011a, number = {1}, month = {3}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=5657256\&tag=1}, pages = {162 -174}, year = {2011}, volume = {6}, author = {Farinaz Koushanfar and Azalia Mirhoseini}, journal = {IEEE Transactions on Information Forensics and Security}, title = {A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection}, pdf = {Koushanfar2011a.pdf}, _pageName = {Koushanfar2011a} } @inproceedings {Mirhoseini2011, booktitle = {Design, Automation, and Test in Europe conference (DATE)}, month = {3}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5763298}, year = {2011}, author = {Azalia Mirhoseini and Farinaz Koushanfar}, title = {HypoEnergy: Hybrid supercapacitor-battery power-supply optimization for Energy efficiency}, pdf = {Mirhoseini2011.pdf}, _pageName = {Mirhoseini2011} } @inbook {Koushanfar2011, booktitle = {Introduction to Hardware Security and Trust}, year = {2011}, author = {Farinaz Koushanfar}, publisher = {Springer}, editor = {M. Tehranipoor and C. Wang}, title = {Hardware Metering: A Survey.}, organization = {Springer}, pdf = {Koushanfar2011.pdf}, _pageName = {Koushanfar2011} } @inbook {Majzoobi2011, booktitle = {Introduction to Hardware Security and Trust}, year = {2011}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag}, publisher = {Springer}, editor = {M. Tehranipour and M. Wang}, title = {FPGA-oriented Security}, organization = {Springer}, pdf = {Majzoobi2011.pdf}, _pageName = {Majzoobi2011} } @inbook {Ruhrmair2011, booktitle = {Introduction to Hardware Security and Trust}, year = {2011}, author = {Ulrich Ruhrmair and Srinivas Devadas and Farinaz Koushanfar}, publisher = {Springer}, editor = {M. Tehranipoor and C. Wang}, title = {Security based on Physical Unclonability and Disorder}, organization = {Springer}, pdf = {Ruhrmair2011.pdf}, _pageName = {Ruhrmair2011} } @conference {Majzoobi2010, month = {12}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5711471}, year = {2010}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srini Devadas}, journal = {IEEE Workshop on Information Forensics and Security}, title = {FPGA PUF using programmable delay lines}, pdf = {Majzoobi2010.pdf}, _pageName = {Majzoobi2010} } @inproceedings {Majzoobi2010rapid, booktitle = {International Test Conference (ITC)}, month = {11}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5699248}, year = {2010}, author = {Mehrdad Majzoobi and Eva Dyer and Ahmed Elnably and Farinaz Koushanfar}, title = {Rapid FPGA Characterization using Clock Synthesis and Signal Sparsity}, pdf = {Majzoobi2010rapid.pdf}, _pageName = {Majzoobi2010rapid} } @article {Roy2010, month = {10}, url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=\&arnumber=5604160}, pages = {30-38}, year = {2010}, volume = {43}, author = {Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov}, journal = {IEEE Computer}, title = {Ending Piracy of Integrated Circuits}, _pageName = {Roy2010} } @inproceedings {Koushanfar2010hierarchical, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523584}, year = {2010}, author = {F. Koushanfar}, title = {Hierarchical hybrid power supply networks}, pdf = {Koushanfar2010hierarchical.pdf}, _pageName = {Koushanfar2010hierarchical} } @inproceedings {Koushanfar2010provably, booktitle = {International Symposium on Hardware-Oriented Security and Trust (HOST)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5513115}, year = {2010}, author = {F. Koushanfar and Y. Alkabani}, title = {Provably secure obfuscation of diverse watermarks for sequential circuits}, pdf = {Koushanfar2010provably.pdf}, _pageName = {Koushanfar2010provably} } @inproceedings {Mirhoseini2010, booktitle = {Design Automation Conference (DAC)}, month = {6}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5523560}, year = {2010}, author = {Azalia Mirhoseini and Y. Alkabani and Farinaz Koushanfar}, title = {Real time emulations: foundation and applications}, pdf = {Mirhoseini2010.pdf}, _pageName = {Mirhoseini2010} } @inproceedings {Koushanfar2010a, booktitle = {Information Hiding Conference}, month = {5}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5657256}, year = {2010}, author = {Farinaz Koushanfar and Azalia Mirhoseini and Y. Alkabani}, title = {A unified framework for multimodal submodular IC trojan detection}, _pageName = {Koushanfar2010a} } @inproceedings {Majzoobi2010fpga, booktitle = {Information Hiding}, month = {5}, url = {http://dl.acm.org/citation.cfm?id=1929305}, year = {2010}, author = {Mehrdad Majzoobi and Ahmed Elnably and Farinaz Koushanfar}, editor = {Rainer B{\"o}hme and Philip Fong and Reihaneh {Safavi-Naini}}, title = {FPGA Time-Bounded Unclonable Authentication}, series = {Lecture Notes in Computer Science}, pdf = {Majzoobi2010fpga.pdf}, _pageName = {Majzoobi2010fpga} } @inproceedings {Tehranipoor2010a, booktitle = {IEEE Design \& Test of Computers}, month = {2}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5406669\&tag=1}, year = {2010}, author = {M. Tehranipoor and F. Koushanfar}, title = {A Survey of Hardware Trojan Taxonomy and Detection}, pdf = {Tehranipoor2010a.pdf}, _pageName = {Tehranipoor2010a} } @article {Koushanfar2010, month = {2}, url = {http://dl.acm.org/citation.cfm?id=1737518}, pages = {626 - 637}, year = {2010}, volume = {58}, author = {Farinaz Koushanfar and Mehrdad Majzoobi and Potkonjak, Miodrag}, journal = {IEEE Trans. On Signal Processing}, title = {Nonparametric Combinatorial Regression for Shape Constrained Modeling}, pdf = {Nonparametric Combinatorial Regression for Shape Constrained Modeling.pdf}, _pageName = {Koushanfar2010} } @article {Tehranipoor2010, month = {1}, issn = {0740-7475}, url = {http://www.computer.org/csdl/mags/dt/2010/01/mdt2010010008-abs.html}, pages = {8 - 9}, year = {2010}, volume = {27}, author = {Tehranipoor, Mohammad and Farinaz Koushanfar}, journal = {IEEE Design \& Test of Computers}, title = {Guest Editors{\textquoteright} Introduction: Confronting the Hardware Trustworthiness Problem}, pdf = {Tehranipoor2010.pdf}, _pageName = {Tehranipoor2010} } @article {Potkonjak2009, month = {5}, year = {2009}, author = {M. Potkonjak and F. Koushanfar}, title = {Identification Of Integrated Circuits}, pdf = {Potkonjak2009.pdf}, _pageName = {Potkonjak2009} } @article {Majzoobi2009, month = {3}, pages = {5:1{\textendash}5:33}, year = {2009}, volume = {2}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag}, journal = {ACM Transactions on Reconfigurable Technology and Systems (TRETS)}, title = {Techniques for Design and Implementation of Secure Reconfigurable PUFs}, pdf = {Majzoobi2009.pdf}, _pageName = {Majzoobi2009} } @article {Koushanfar2009, pages = {332 - 345}, year = {2009}, volume = {57}, author = {F. Koushanfar and D. Shamsi}, journal = {Institute of Mathematical Statistics (IMS) Lecture Notes-Monograph Series (LNMS)}, title = {The challenges of model objective selection and estimation for ad-hoc network data sets}, pdf = {Koushanfar2009.pdf}, _pageName = {Koushanfar2009} } @inproceedings {Nelson2009, booktitle = {Information Hiding (IH)}, pages = {221 - 234}, year = {2009}, author = {M. Nelson and A. Nahapetian and F. Koushanfar and M. Potkonjak}, title = {SVD-Based Ghost Circuitry Detection}, pdf = {Nelson2009.pdf}, _pageName = {Nelson2009} } @inproceedings {Alkabani2009, booktitle = {International Symposium on Low Power Electronics and Designs (ISLPED)}, pages = {331 - 334}, year = {2009}, author = {Y. Alkabani and F. Koushanfar and M. Potkonjak}, title = {N-version temperature-aware scheduling and binding}, pdf = {Alkabani2009.pdf}, _pageName = {Alkabani2009} } @inproceedings {Alkabani2009consistency, booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)}, url = {http://doi.acm.org/10.1145/1687399.1687426}, pages = {123-127}, year = {2009}, author = {Y. Alkabani and Farinaz Koushanfar}, title = {Consistency-based characterization for IC Trojan detection}, pdf = {Alkabani2009consistency.pdf}, _pageName = {Alkabani2009consistency} } @inproceedings {C2009, isbn = {978-1-4244-4805-0}, booktitle = {2009 IEEE International Workshop on Hardware-Oriented Security and Trust2009 IEEE International Workshop on Hardware-Oriented Security and Trust}, url = {http://www.computer.org/csdl/proceedings/hst/2009/4805/00/05224969-abs.html}, pages = {43 - 49}, doi = {10.1109/HST.2009.5224969}, year = {2009}, author = {Candore, Andrea and Kocabas, Ovunc and Farinaz Koushanfar}, publisher = {IEEE}, title = {Robust stable radiometric fingerprinting for wireless devices}, address = {San Francisco, CA, USA}, organization = {IEEE}, pdf = {C2009.pdf}, _pageName = {C2009} } @inproceedings {Koushanfar2008, booktitle = {International Conference on Computer Aided Design (ICCAD)}, pages = {185 - 189}, year = {2008}, author = {F. Koushanfar and P. Boufounos and D. Shamsi}, title = {Post-silicon timing characterization by compressed sensing}, pdf = {Koushanfar2008.pdf}, _pageName = {Koushanfar2008} } @inproceedings {Majzoobi2008, booktitle = {International Test Conference (ITC)}, pages = {1 - 10}, year = {2008}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Testing Techniques for Hardware Security}, pdf = {Majzoobi2008.pdf}, _pageName = {Majzoobi2008} } @inproceedings {Majzoobi2008lightweight, booktitle = {International Conference on Computer-Aided Design (ICCAD)}, pages = {670 - 673}, year = {2008}, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Lightweight Secure PUFs}, pdf = {Majzoobi2008lightweight.pdf}, _pageName = {Majzoobi2008lightweight} } @inproceedings {Roy2008, isbn = {978-1-4244-2401-6}, booktitle = {2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559052}, pages = {65 - 66}, doi = {10.1109/HST.2008.4559052}, year = {2008}, author = {Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov}, publisher = {IEEE}, title = {Extended abstract: Circuit CAD tools as a security threat}, address = {Anaheim, CA, USA}, organization = {IEEE}, _pageName = {Roy2008} } @inproceedings {Roy2008epic, booktitle = {Design Automation and Test in Europe (DATE)}, year = {2008}, author = {J. Roy and F. Koushanfar and I. Markov}, title = {EPIC: Ending Piracy of Integrated Circuits}, pdf = {Roy2008epic.pdf}, _pageName = {Roy2008epic} } @inproceedings {Roy2008protecting, booktitle = {Design Automation Conference (DAC)}, pages = {846 - 851}, year = {2008}, author = {J. Roy and F. Koushanfar and I. Markov}, title = {Protecting bus-based hardware IP by secret sharing}, pdf = {Roy2008protecting.pdf}, _pageName = {Roy2008protecting} } @inproceedings {Shamsi2008, isbn = {9781605580739}, booktitle = {the 9th ACM international symposiumProceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc {\textquoteright}08}, url = {http://dl.acm.org/citation.cfm?doid=1374618.1374667}, pages = {361}, doi = {10.1145/1374618.1374667}, year = {2008}, author = {Shamsi, Davood and Farinaz Koushanfar and Potkonjak, Miodrag}, publisher = {ACM Press}, title = {Challenging benchmark for location discovery in ad hoc networks}, address = {Hong Kong, Hong Kong, ChinaNew York, New York, USA}, organization = {ACM Press}, _pageName = {Shamsi2008} } @article {Shamsi2008how, url = {http://www.ruf.rice.edu/~ds2/main-LehmannFK.pdf}, year = {2008}, author = {D. Shamsi and F. Koushanfar}, title = {How challenging is modeling of a data set?}, pdf = {Shamsi2008how.pdf}, _pageName = {Shamsi2008how} } @inproceedings {Shamsi2008noninvasive, booktitle = {ISLPED: Proceeding of international symposium on Low power electronics and design}, pages = {341 - 346}, year = {2008}, author = {D. Shamsi and P. Boufounos and F. Koushanfar}, title = {Noninvasive leakage power tomography of integrated circuits by compressive sensing}, pdf = {Shamsi2008noninvasive.pdf}, _pageName = {Shamsi2008noninvasive} } @inproceedings {Potkonjak2008, booktitle = {Design Automation Conference (DAC)}, pages = {351 - 352}, year = {2008}, author = {Potkonjak, Miodrag and Farinaz Koushanfar}, title = {(Bio)-behavioral CAD}, pdf = {(Bio)-behavioral CAD.pdf}, _pageName = {Potkonjak2008} } @inproceedings {Alkabani2008, isbn = {978-1-4244-2401-6}, booktitle = {2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)2008 IEEE International Workshop on Hardware-Oriented Security and Trust}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4559059}, pages = {82 - 83}, doi = {10.1109/HST.2008.4559059}, year = {2008}, author = {Yousra Alkabani and Farinaz Koushanfar}, publisher = {IEEE}, title = {Extended abstract: Designer{\textquoteright}s hardware Trojan horse}, address = {Anaheim, CA, USA}, organization = {IEEE}, _pageName = {Alkabani2008} } @inproceedings {Alkabani2008active, booktitle = {Compilers, Architectures, and Synthesis for Embedded Systems (CASES)}, year = {2008}, author = {Y. Alkabani and F. Koushanfar}, title = {Active Control and Digital Rights Management of Integrated Circuit IP Cores}, pdf = {Alkabani2008active.pdf}, _pageName = {Alkabani2008active} } @article {Alkabani2008input, year = {2008}, author = {Y. Alkabani and T. Massey and F. Koushanfar and M. Potkonjak}, institution = {Rice University, Electrical and Computer Engineering Department}, title = {Input Vector Control for Post-Silicon Leakage Current Minimization under Manufacturing Variations}, pdf = {Alkabani2008input.pdf}, _pageName = {Alkabani2008input} } @inproceedings {Alkabani2008n, booktitle = {Design Automation Conference (DAC)}, pages = {546 - 551}, year = {2008}, author = {Y. Alkabani and F. Koushanfar}, title = {N-variant IC design: methodology and applications}, pdf = {Alkabani2008n.pdf}, _pageName = {Alkabani2008n} } @inproceedings {Alkabani2008trusted, booktitle = {Information Hiding (IH)}, pages = {102 - 117}, year = {2008}, author = {Y. Alkabani and F. Koushanfar and N. Kiyavash and M. Potkonjak}, title = {Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach}, _pageName = {Alkabani2008trusted} } @inproceedings {Kiyavash2007, booktitle = {IEEE Mobile Ad-hoc and Sensor Systems (MASS)}, year = {2007}, author = {N. Kiyavash and F. Koushanfar}, title = {Anti-Collusion Position Estimation in Wireless Sensor Networks}, pdf = {Kiyavash2007.pdf}, _pageName = {Kiyavash2007} } @article {Koushanfar2007, pages = {16 - 16}, year = {2007}, volume = {6}, author = {F. Koushanfar and A. Daware and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli}, journal = {ACM Transaction on Embedded Computing Systems}, title = {Techniques for Maintaining Connectivity Ad-hoc Networks Under Energy Constraints}, pdf = {Koushanfar2007.pdf}, _pageName = {Koushanfar2007} } @inproceedings {Koushanfar2007a, booktitle = {Design Automation Conference (DAC)}, pages = {268 - 269}, year = {2007}, author = {F. Koushanfar and M. Potkonjak}, title = {A general framework for spatial correlation modeling in VLSI design}, _pageName = {Koushanfar2007a} } @inproceedings {Koushanfar2007cad, booktitle = {Design Automation Conference (DAC)}, year = {2007}, author = {F. Koushanfar and M. Potkonjak}, title = {CAD-based Security, Cryptography, and Digital Rights Management}, pdf = {Koushanfar2007cad.pdf}, _pageName = {Koushanfar2007cad} } @inproceedings {Koushanfar2007hardware, booktitle = {IEEE International Conference on Microelectronic Systems Education}, year = {2007}, author = {F. Koushanfar and M. Potkonjak}, title = {Hardware Security: Preparing Students for the Next Design Frontiers}, pdf = {Koushanfar2007hardware.pdf}, _pageName = {Koushanfar2007hardware} } @inproceedings {So2007, booktitle = {Information Processing in Sensor Networks (IPSN)}, pages = {226 - 235}, year = {2007}, author = {S. So and F. Koushanfar and A. Kosterev and F. Tittel}, title = {LaserSPECks: Laser SPECtroscopic trace-gas sensor networks - sensor integration and applications}, pdf = {So2007.pdf}, _pageName = {So2007} } @inproceedings {Alkabani2007, booktitle = {International Conference on Computer Aided Design (ICCAD)}, pages = {674 - 677}, year = {2007}, author = {Y. Alkabani and Farinaz Koushanfar and Potkonjak, Miodrag}, title = {Remote activation of ICs for piracy prevention and digital right management}, pdf = {Alkabani2007.pdf}, _pageName = {Alkabani2007} } @inproceedings {Conf:alk07, booktitle = {USENIX Security Symposium}, pages = {291-306}, year = {2007}, author = {Y. Alkabani and Farinaz Koushanfar}, title = {Active Hardware Metering for Intellectual Property Protection and Security}, _pageName = {Conf:alk07} } @inproceedings {Koushanfar2006, booktitle = {Proceedings of IEEE Sensors}, pages = {888 - 891}, year = {2006}, author = {F. Koushanfar and N. Kiyavash and M. Potkonjak}, title = {Interacting Particle-based Model for Missing Data in Sensor Networks: Foundations and Applications}, pdf = {Koushanfar2006.pdf}, _pageName = {Koushanfar2006} } @inbook {Koushanfar2006watermarking, booktitle = {Security in Sensor Networks}, year = {2006}, author = {F. Koushanfar and M. Potkonjak}, publisher = {CRC Press}, editor = {Y. Xiao}, title = {Watermarking Technique for Sensor Networks: Foundations and Applications}, organization = {CRC Press}, _pageName = {Koushanfar2006watermarking} } @inproceedings {Sleeping, booktitle = {IEEE International Conference on Computer Communications (INFOCOM)}, pages = {1 -13}, year = {2006}, author = {F. Koushanfar and N. Taft and M. Potkonjak}, title = {Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions}, pdf = {Sleeping.pdf}, _pageName = {Sleeping} } @article {Koushanfar2005, pages = {523 - 545}, year = {2005}, volume = {10}, author = {Farinaz Koushanfar and Inki Hong and Potkonjak, Miodrag}, journal = {ACM Trans. Design Automation of Electronic Sys.}, title = {Behavioral synthesis techniques for intellectual property protection}, pdf = {Koushanfar2005.pdf}, _pageName = {Koushanfar2005} } @mastersthesis {Koushanfar2005ensuring, year = {2005}, author = {F. Koushanfar}, title = {Ensuring Data Integrity in Sensor-Based Networked Systems}, school = {Dept. of Electrical Engineering and Computer Science, UC Berkeley}, _pageName = {Koushanfar2005ensuring} } @inproceedings {Koushanfar2005markov, booktitle = {IEEE Sensors}, pages = {1430 - 1434}, year = {2005}, author = {F. Koushanfar and M. Potkonjak}, title = {Markov chain-based models for missing and faulty data in MICA2 sensor motes}, pdf = {Koushanfar2005markov.pdf}, _pageName = {Koushanfar2005markov} } @inbook {Koushanfar2005sensor, booktitle = {Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems}, year = {2005}, author = {F. Koushanfar and M. Potkonjak and J. Feng,}, publisher = {CRC Press}, title = {Sensor Network Architecture}, organization = {CRC Press}, pdf = {Koushanfar2005sensor.pdf}, _pageName = {Koushanfar2005sensor} } @mastersthesis {Koushanfar2005statistical, year = {2005}, author = {F. Koushanfar}, title = {Statistical modeling and recovery of intermittent sensor data streams}, school = {Dept. of Statistics, UC Berkeley}, _pageName = {Koushanfar2005statistical} } @article {Megerian2005, pages = {84 - 92}, year = {2005}, volume = {4}, author = {S. Megerian and F. Koushanfar and M. Potkonjak and M. Srivastava}, journal = {IEEE Transactions on Mobile Computing}, title = {Worst- and Best-Case Coverage in Sensor Networks}, pdf = {Megerian2005.pdf}, _pageName = {Megerian2005} } @inproceedings {Wong2005, booktitle = {ACM/IEEE-CAS/EDAC Design Automation Conference (DAC)}, pages = {909 - 914}, year = {2005}, author = {J. Wong and F. Koushanfar and M. Potkonjak}, title = {Flexible ASICs: Shared Masking for Multiple Media Processors}, pdf = {Wong2005.pdf}, _pageName = {Wong2005} } @inproceedings {Koushanfar2004, booktitle = {IEEE Sensors}, pages = {1472 - 1475}, year = {2004}, volume = {2}, author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {Error models for light sensors by statistical analysis of raw sensor measurements}, pdf = {Koushanfar2004.pdf}, _pageName = {Koushanfar2004} } @article {Wong2004, pages = {859 - 868}, year = {2004}, volume = {23}, author = {J. Wong and F. Koushanfar and S. Megerian and M. Potkonjak}, journal = {IEEE Transactions of Computer Aided Designs (CAD)}, title = {Probabilistic Constructive Optimization Techniques}, pdf = {Wong2004.pdf}, _pageName = {Wong2004} } @inproceedings {Koushanfar2003, booktitle = {ACM International Symposium on Low Power Electronics and Design (ISLPED)}, pages = {475 - 480}, year = {2003}, author = {F. Koushanfar and A. Davare and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions}, pdf = {Koushanfar2003.pdf}, _pageName = {Koushanfar2003} } @inbook {Koushanfar2003location, booktitle = {Ad Hoc Wireless Networking}, year = {2003}, author = {F. Koushanfar and S. Slijepcevic and M. Potkonjak and A. Sangiovanni-Vincentelli}, publisher = {Kluwer}, editor = {X. Cheng and X. Huang and Du,D.Z.}, title = {Location Discovery in Ad-hoc Wireless Sensor Networks}, organization = {Kluwer}, _pageName = {Koushanfar2003location} } @inproceedings {Koushanfar2003low, booktitle = {ACM International Symposium on Low Power Electronics and Design (ISLPED)}, pages = {475 - 480}, year = {2003}, author = {F. Koushanfar and A. Davare and D. Nguyen and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {Low Power Coordination in Wireless Ad-hoc Networks}, pdf = {Koushanfar2003low.pdf}, _pageName = {Koushanfar2003low} } @inproceedings {Koushanfar2003on, booktitle = {IEEE Sensors}, pages = {974 - 979}, year = {2003}, volume = {2}, author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {On-line fault detection of sensor measurements}, pdf = {Koushanfar2003on.pdf}, _pageName = {Koushanfar2003on} } @inproceedings {Koushanfar2002, isbn = {0-7803-7402-9}, booktitle = {Proceedings of ICASSP {\textquoteright}02IEEE International Conference on Acoustics Speech and Signal Processing}, url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5745660}, pages = {IV-4186 - IV-4186}, doi = {10.1109/ICASSP.2002.5745660}, year = {2002}, author = {Farinaz Koushanfar and Slijepcevic, Sascha and Wong, Jennifer and M. Potkonjak}, publisher = {IEEE}, title = {Global error-tolerant algorithms for location discovery in ad-hoc wireless Netoworks}, address = {Orlando, FL, USA}, organization = {IEEE}, _pageName = {Koushanfar2002} } @inproceedings {Koushanfar2002error, booktitle = {IEEE CAS Workshop on Wireless Communications and Networking}, year = {2002}, author = {F. Koushanfar and S. Slijepcevic and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {Error-Tolerant Multi-Modal Sensor Fusion}, pdf = {Koushanfar2002error.pdf}, _pageName = {Koushanfar2002error} } @inproceedings {Koushanfar2002fault, booktitle = {IEEE Sensors}, pages = {1491 - 1496}, year = {2002}, volume = {2}, author = {F. Koushanfar and M. Potkonjak and A. Sangiovanni-Vincentelli}, title = {Fault tolerance techniques for wireless ad hoc sensor networks}, pdf = {Koushanfar2002fault.pdf}, _pageName = {Koushanfar2002fault} } @inproceedings {Koushanfar2002ilp, booktitle = {ACM/IEEE-CAS/EDAC Design Automation Conference (DAC)}, pages = {910 - 915}, year = {2002}, author = {F. Koushanfar and J. Wong and J. Feng and M. Potkonjak}, title = {ILP-based Engineering Change}, pdf = {Koushanfar2002ilp.pdf}, _pageName = {Koushanfar2002ilp} } @article {Megerian2002, pages = {443 - 454}, year = {2002}, volume = {8}, author = {S. Megerian and F. Koushanfar and G. Qu and G. Veltri and M. Potkonjak}, journal = {ACM Journal of Wireless Networks}, title = {Exposure In Wireless Sensor Networks: Theory And Practical Solutions}, pdf = {Megerian2002.pdf}, _pageName = {Megerian2002} } @inproceedings {Feng2002, booktitle = {International Conference of Computer Design}, pages = {226 - 231}, year = {2002}, author = {J. Feng and F. Koushanfar and M. Potkonjak}, title = {System-Architectures for Sensor Networks Issues, Alternatives, and Directions}, pdf = {Feng2002.pdf}, _pageName = {Feng2002} } @article {Koushanfar2001, pages = {392 - 401}, year = {2001}, volume = {20}, author = {F. Koushanfar and D. Kirovski and I. Hong and M. Potkonjak and M.C. Papaefthymiou}, journal = {IEEE Transactions on Computer-Aided Design (DAC)}, title = {Symbolic debugging of embedded hardware and software}, pdf = {Koushanfar2001.pdf}, _pageName = {Koushanfar2001} } @inproceedings {Koushanfar2001hardware, booktitle = {Design Automation Conference (DAC)}, pages = {490 - 493}, year = {2001}, author = {F. Koushanfar and G. Qu}, title = {Hardware Metering}, pdf = {Koushanfar2001hardware.pdf}, _pageName = {Koushanfar2001hardware} } @inproceedings {Koushanfar2001intellectual, booktitle = {Information Hiding Workshop (IHW)}, pages = {81 - 95}, year = {2001}, author = {F. Koushanfar and G. Qu and M. Potkonjak}, title = {Intellectual Property Metering}, pdf = {Koushanfar2001intellectual.pdf}, _pageName = {Koushanfar2001intellectual} } @mastersthesis {Koushanfar2001iterative, year = {2001}, author = {F. Koushanfar}, title = {Iterative error-tolerant location discovery in ad-hoc wireless sensor networks}, school = {Dept. of Electrical Engineering, University of California, Los Angeles}, _pageName = {Koushanfar2001iterative} } @inproceedings {Meguerdichian2001, isbn = {1581132972}, booktitle = {the 38th conferenceProceedings of the 38th conference on Design automation - DAC {\textquoteright}01}, url = {http://dl.acm.org/citation.cfm?doid=378239.379028}, pages = {585 - 590}, doi = {10.1145/378239.379028}, year = {2001}, author = {Seapahn Meguerdichian and Farinaz Koushanfar and Morge, Advait and Petranovic, Dusan and Potkonjak, Miodrag}, publisher = {ACM Press}, title = {MetaCores: Design and Optimization Techniques}, address = {Las Vegas, Nevada, United StatesNew York, New York, USA}, organization = {ACM Press}, _pageName = {Meguerdichian2001} } @inproceedings {Meguerdichian2001coverage, booktitle = {Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)}, pages = {1380 - 1387}, year = {2001}, volume = {3}, author = {S. Meguerdichian and F. Koushanfar and M. Potkonjak and M. Srivastava}, title = {Coverage Problems in Wireless Ad-Hoc Sensor Networks}, pdf = {Meguerdichian2001coverage.pdf}, _pageName = {Meguerdichian2001coverage} } @inproceedings {Meguerdichian2001exposure, booktitle = {International conference on Mobile computing and networking (MobiCom)}, pages = {139 - 150}, year = {2001}, author = {S. Meguerdichian and F. Koushanfar and G. Qu and M. Potkonjak}, title = {Exposure in wireless Ad-Hoc sensor networks}, pdf = {Meguerdichian2001exposure.pdf}, _pageName = {Meguerdichian2001exposure} } @inproceedings {Wong2001, booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)}, pages = {453 - 456}, year = {2001}, author = {J. Wong and F. Koushanfar and S. Meguerdichian and M. Potkonjak}, title = {A Probabilistic Constructive Approach to Optimization Problems}, pdf = {Wong2001.pdf}, _pageName = {Wong2001} } @inproceedings {Koushanfar2000, booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)}, pages = {40 - 43}, year = {2000}, author = {F. Koushanfar and D. Kirovski and M. Potkonjak}, title = {Symbolic Debugging Scheme for Optimized Hardware and Software}, pdf = {Koushanfar2000.pdf}, _pageName = {Koushanfar2000} } @inproceedings {Koushanfar2000processors, booktitle = {International Conference on Computer Designs (ICCD)}, pages = {603 - 608}, year = {2000}, author = {F. Koushanfar and V. Prabhu and M. Potkonjak and J.M. Rabaey}, title = {Processors for Mobile Applications}, pdf = {Koushanfar2000processors.pdf}, _pageName = {Koushanfar2000processors} } @inproceedings {Rabaey2000, booktitle = {IEEE/ACM International Conference on Computer Aided Design (ICCAD)}, pages = {76 - 82}, year = {2000}, author = {J.M. Rabaey and M. Potkonjak and F. Koushanfar and S. Li and T. Tuan}, title = {Challenges and Opportunities in Broadband and Wireless Communication Designs}, pdf = {Rabaey2000.pdf}, _pageName = {Rabaey2000} } @inproceedings {Caldwell2000, isbn = {1581131879}, booktitle = {the 37th conferenceProceedings of the 37th conference on Design automation - DAC {\textquoteright}00}, url = {http://dl.acm.org/citation.cfm?doid=337292.337617}, pages = {693 - 698}, doi = {10.1145/337292.337617}, year = {2000}, author = {Caldwell, Andrew E. and Yu Cao and Kahng, Andrew B. and Farinaz Koushanfar and Lu, Hua and Igor L. Markov and Oliver, Michael and Stroobandt, Dirk and Sylvester, Dennis}, publisher = {ACM Press}, title = {GTX: The MARCO GSRC Technology Extrapolation System}, address = {Los Angeles, California, United StatesNew York, New York, USA}, organization = {ACM Press}, _pageName = {Caldwell2000} }