default search action
Yier Jin
Person information
- affiliation: University of Florida, Gainesville, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Huifeng Zhu, Xiaolong Guo, Yier Jin, Xuan Zhang:
PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis. IEEE Trans. Emerg. Top. Comput. 12(2): 532-545 (2024) - [j51]Ya Gao, Haocheng Ma, Qizhi Zhang, Xintong Song, Yier Jin, Jiaji He, Yiqiang Zhao:
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 9881-9893 (2024) - [j50]Md. Moshiur Rahman, Jim Geist, Daniel Xing, Yuntao Liu, Ankur Srivastava, Travis Meade, Yier Jin, Swarup Bhunia:
Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice. ACM Trans. Design Autom. Electr. Syst. 29(3): 50:1-50:18 (2024) - [c145]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. ASPDAC 2024: 349-354 - [c144]Zhaoxiang Liu, Kejun Chen, Dean Sullivan, Orlando Arias, Raj Dutta, Yier Jin, Xiaolong Guo:
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective. ASPDAC 2024: 933-938 - [c143]Yuntao Wei, Xueyan Wang, Song Bian, Yicheng Huang, Weisheng Zhao, Yier Jin:
PPGNN: Fast and Accurate Privacy-Preserving Graph Neural Network Inference via Parallel and Pipelined Arithmetic-and-Logic FHE Accelerator. DAC 2024: 273:1-273:6 - [c142]Haoqi Shan, Sravani Nissankararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin, Dean Sullivan:
LightEMU: Hardware Assisted Fuzzing of Trusted Applications. HOST 2024: 1-11 - [c141]Xiaolong Cheng, Aijiao Cui, Yier Jin:
A Hardware Security Evaluation Platform on RISC-V SoC. ITC-Asia 2024: 1-6 - [c140]Shangtong Zhang, Xueyan Wang, Weisheng Zhao, Yier Jin:
CRISP: Triangle Counting Acceleration via Content Addressable Memory-Integrated 3D-Stacked Memory. ITC-Asia 2024: 1-6 - [c139]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. NDSS 2024 - [c138]Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang:
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger. USENIX Security Symposium 2024 - [i23]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. CoRR abs/2402.01728 (2024) - [i22]Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin:
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. CoRR abs/2402.02227 (2024) - [i21]Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin:
A Review and Comparison of AI Enhanced Side Channel Analysis. CoRR abs/2402.02299 (2024) - [i20]Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, Shuo Wang:
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger. CoRR abs/2402.11423 (2024) - [i19]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - [i18]Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 1064 (2024) - 2023
- [j49]Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking. ACM Comput. Surv. 55(2): 17:1-17:33 (2023) - [j48]Yaodan Hu, Xiaochen Xian, Yier Jin, Shuo Wang:
Fairness-Guaranteed DER Coordination Under False Data Injection Attacks. IEEE Internet Things J. 10(21): 19043-19053 (2023) - [j47]Haoqi Shan, Moyao Huang, Yujia Liu, Sravani Nissankararao, Yier Jin, Shuo Wang, Dean Sullivan:
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight. J. Hardw. Syst. Secur. 7(2): 44-54 (2023) - [j46]Xiaochen Xian, Alexander Semenov, Yaodan Hu, Andi Wang, Yier Jin:
Adaptive Sampling and Quick Anomaly Detection in Large Networks. IEEE Trans Autom. Sci. Eng. 20(4): 2253-2267 (2023) - [j45]Kejun Chen, Orlando Arias, Xiaolong Guo, Qingxu Deng, Yier Jin:
IP-Tag: Tag-Based Runtime 3PIP Hardware Trojan Detection in SoC Platforms. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(1): 68-81 (2023) - [j44]Yiqiang Zhao, Shijian Pan, Haocheng Ma, Ya Gao, Xintong Song, Jiaji He, Yier Jin:
Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5025-5035 (2023) - [j43]Haocheng Ma, Max Panoff, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. IEEE Trans. Inf. Forensics Secur. 18: 1365-1379 (2023) - [j42]Huifeng Zhu, Haoqi Shan, Dean Sullivan, Xiaolong Guo, Yier Jin, Xuan Zhang:
PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network. IEEE Trans. Inf. Forensics Secur. 18: 3590-3605 (2023) - [c137]Ya Gao, Haocheng Ma, Mingkai Yan, Jiaji He, Yiqiang Zhao, Yier Jin:
NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis. AsianHOST 2023: 1-6 - [c136]Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. CCS 2023: 2930-2944 - [c135]Yichen Jiang, Shuo Wang, Renato Figueiredo, Yier Jin:
Warm-Boot Attack on Modern DRAMs. DATE 2023: 1-2 - [c134]Honggang Yu, Shuo Wang, Haoqi Shan, Maximillian Panoff, Michael Lee, Kaichen Yang, Yier Jin:
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis. HOST 2023: 144-154 - [c133]Ya Gao, Haocheng Ma, Jindi Kong, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim+: Accelerating Electromagnetic Security Evaluation with Generative Adversarial Network. ICCAD 2023: 1-8 - [c132]Yuntao Wei, Xueyan Wang, Song Bian, Weisheng Zhao, Yier Jin:
THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution. ICCAD 2023: 1-9 - [c131]Wenwen Xu, Zheyu Zhang, Yuankai Xu, Jing Li, Yehan Ma, Yier Jin, Christopher D. Gill, Xuan Zhang, An Zou:
Energy Efficient Real-Time Scheduling on Heterogeneous Architectures with Self-Suspension. ISLPED 2023: 1-6 - [c130]James Geist, Travis Meade, Shaojie Zhang, Yier Jin:
NetViz: A Tool for Netlist Security Visualization. ISQED 2023: 1-8 - [i17]Xiangyi Xu, Wenhao Wang, Yongzheng Wu, Zhennan Min, Zixuan Pang, Yier Jin:
virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone. CoRR abs/2306.11011 (2023) - [i16]Haoqi Shan, Sravani Nissankararao, Yujia Liu, Moyao Huang, Shuo Wang, Yier Jin, Dean Sullivan:
LightEMU: Hardware Assisted Fuzzing of Trusted Applications. CoRR abs/2311.09532 (2023) - [i15]Jim Geist, Travis Meade, Shaojie Zhang, Yier Jin:
Improving FSM State Enumeration Performance for Hardware Security with RECUT and REFSM-SAT. CoRR abs/2311.10273 (2023) - [i14]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. IACR Cryptol. ePrint Arch. 2023: 1445 (2023) - [i13]Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1446 (2023) - 2022
- [j41]Jiaji He, Xiaolong Guo, Mark M. Tehranipoor, Apostol Vassilev, Yier Jin:
EM Side Channels in Hardware Security: Attacks and Defenses. IEEE Des. Test 39(2): 100-111 (2022) - [j40]Yier Jin, Tsung-Yi Ho, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - [j39]Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin:
A Review and Comparison of AI-enhanced Side Channel Analysis. ACM J. Emerg. Technol. Comput. Syst. 18(3): 62:1-62:20 (2022) - [j38]Yen-Cheng Chiu, Tung-Cheng Chang, Chun-Ying Lee, Je-Min Hung, Kuang-Tang Chang, Cheng-Xin Xue, Ssu-Yen Wu, Hui-Yao Kao, Peng Chen, Hsiao-Yu Huang, Shih-Hsih Teng, Chieh-Pu Lo, Yi-Chun Shih, Yu-Der Chih, Tsung-Yung Jonathan Chang, Yier Jin, Meng-Fan Chang:
A 22-nm 1-Mb 1024-b Read Data-Protected STT-MRAM Macro With Near-Memory Shift-and-Rotate Functionality and 42.6-GB/s Read Bandwidth for Security-Aware Mobile Device. IEEE J. Solid State Circuits 57(6): 1936-1949 (2022) - [j37]Jiaji He, Haocheng Ma, Max Panoff, Hanning Wang, Yiqiang Zhao, Leibo Liu, Xiaolong Guo, Yier Jin:
Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2421-2434 (2022) - [j36]Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, Yier Jin:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. IEEE Trans. Inf. Forensics Secur. 17: 559-573 (2022) - [j35]Raj Gautam Dutta, Yaodan Hu, Feng Yu, Teng Zhang, Yier Jin:
Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment. IEEE Trans. Intell. Transp. Syst. 23(4): 3418-3429 (2022) - [c129]James Geist, Shaojie Zhang, Yier Jin, Travis Meade:
A Structural and SAT Analysis of SANSCrypt. AsianHOST 2022: 1-6 - [c128]Haocheng Ma, Shijian Pan, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
Vulnerable PQC against Side Channel Analysis - A Case Study on Kyber. AsianHOST 2022: 1-6 - [c127]Haocheng Ma, Qizhi Zhang, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
PathFinder: side channel protection through automatic leaky paths identification and obfuscation. DAC 2022: 79-84 - [c126]Orlando Arias, Zhaoxiang Liu, Xiaolong Guo, Yier Jin, Shuo Wang:
RTSEC: Automated RTL Code Augmentation for Hardware Security Enhancement. DATE 2022: 596-599 - [c125]Zhaoxiang Liu, Orlando Arias, Weimin Fu, Yier Jin, Xiaolong Guo:
Inter-IP Malicious Modification Detection through Static Information Flow Tracking. DATE 2022: 600-603 - [c124]Weimin Fu, Honggang Yu, Orlando Arias, Kaichen Yang, Yier Jin, Tuba Yavuz, Xiaolong Guo:
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms. ACM Great Lakes Symposium on VLSI 2022: 481-486 - [c123]Yuankai Xu, Tiancheng He, Ruiqi Sun, Yehan Ma, Yier Jin, An Zou:
SHAPE: Scheduling of Fixed-Priority Tasks on Heterogeneous Architectures with Multiple CPUs and Many PEs. ICCAD 2022: 110:1-110:9 - [c122]Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin:
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. SP 2022: 1246-1262 - [i12]Huifeng Zhu, Haoqi Shan, Dean Sullivan, Xiaolong Guo, Yier Jin, Xuan Zhang:
PDNPulse: Sensing PCB Anomaly with the Intrinsic Power Delivery Network. CoRR abs/2204.02482 (2022) - 2021
- [j34]Haocheng Ma, Jiaji He, Max Panoff, Yier Jin, Yiqiang Zhao:
Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 371-382 (2021) - [j33]Max Panoff, Raj Gautam Dutta, Yaodan Hu, Kaichen Yang, Yier Jin:
On Sensor Security in the Era of IoT and CPS. SN Comput. Sci. 2(1): 51 (2021) - [j32]Haocheng Ma, Jiaji He, Yanjiang Liu, Leibo Liu, Yiqiang Zhao, Yier Jin:
Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1077-1089 (2021) - [j31]Kaveh Shamsi, Yier Jin:
In Praise of Exact-Functional-Secrecy in Circuit Locking. IEEE Trans. Inf. Forensics Secur. 16: 5225-5238 (2021) - [c121]Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin:
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. AsiaCCS 2021: 349-362 - [c120]Huifeng Zhu, Xiaolong Guo, Yier Jin, Xuan Zhang:
PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans. ASP-DAC 2021: 396-401 - [c119]Yichen Jiang, Huifeng Zhu, Dean Sullivan, Xiaolong Guo, Xuan Zhang, Yier Jin:
Quantifying Rowhammer Vulnerability for DRAM Security. DAC 2021: 73-78 - [c118]Kaichen Yang, Xuan-Yi Lin, Yixin Sun, Tsung-Yi Ho, Yier Jin:
3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors. DAC 2021: 547-552 - [c117]Honggang Yu, Haoqi Shan, Maximillian Panoff, Yier Jin:
Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning. DAC 2021: 703-708 - [c116]Xiaolong Guo, Song Han, X. Sharon Hu, Xun Jiao, Yier Jin, Fanxin Kong, Michael Lemmon:
Towards scalable, secure, and smart mission-critical IoT systems: review and vision. EMSOFT 2021: 1-10 - [c115]Yichen Jiang, Huifeng Zhu, Haoqi Shan, Xiaolong Guo, Xuan Zhang, Yier Jin:
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection. HOST 2021: 239-247 - [c114]Kaveh Shamsi, Yier Jin:
Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT. ICCAD 2021: 1-9 - [c113]Yaodan Hu, Xiaochen Xian, Yier Jin:
RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation. ICCPS 2021: 77-86 - [c112]Weimin Fu, Orlando Arias, Yier Jin, Xiaolong Guo:
Fuzzing Hardware: Faith or Reality? : Invited Paper. NANOARCH 2021: 1-6 - [c111]Xiaorui Liu, Yaodan Hu, Charalambos Konstantinou, Yier Jin:
CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks. SmartGridComm 2021: 95-101 - [i11]Xiaorui Liu, Yaodan Hu, Charalambos Konstantinou, Yier Jin:
CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks. CoRR abs/2103.13568 (2021) - [i10]Honggang Yu, Shihfeng Zeng, Teng Zhang, Ing-Chao Lin, Yier Jin:
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers. CoRR abs/2109.10770 (2021) - 2020
- [j30]Feng Yu, Raj Gautam Dutta, Teng Zhang, Yaodan Hu, Yier Jin:
Fast Attack-Resilient Distributed State Estimator for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3555-3565 (2020) - [j29]Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin:
SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 4078-4089 (2020) - [j28]Yajun Yang, Zhang Chen, Yuan Liu, Tsung-Yi Ho, Yier Jin, Pingqiang Zhou:
How Secure Is Split Manufacturing in Preventing Hardware Trojan? ACM Trans. Design Autom. Electr. Syst. 25(2): 20:1-20:23 (2020) - [c110]Tzungyu Tsai, Kaichen Yang, Tsung-Yi Ho, Yier Jin:
Robust Adversarial Objects against Deep Learning Models. AAAI 2020: 954-962 - [c109]Kaichen Yang, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho, Yier Jin:
Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World. AAAI 2020: 1088-1095 - [c108]Yaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin:
Protecting Platoons from Stealthy Jamming Attack. AsianHOST 2020: 1-6 - [c107]Jun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. AsianHOST 2020: 1-6 - [c106]Huifeng Zhu, Xiaolong Guo, Yier Jin, Xuan Zhang:
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis. AsianHOST 2020: 1-6 - [c105]Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, Yier Jin:
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations. ASP-DAC 2020: 62-67 - [c104]Kuei-Huan Chang, Po-Hao Huang, Honggang Yu, Yier Jin, Ting-Chi Wang:
Audio Adversarial Examples Generation with Recurrent Neural Networks*. ASP-DAC 2020: 488-493 - [c103]James Geist, Travis Meade, Shaojie Zhang, Yier Jin:
RELIC-FUN: Logic Identification through Functional Signal Comparisons. DAC 2020: 1-6 - [c102]Jiaji He, Xiaolong Guo, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors. DAC 2020: 1-6 - [c101]Mohammad Mehdi Sharifi, Ramin Rajaei, Patsy Cadareanu, Pierre-Emmanuel Gaillardon, Yier Jin, Michael T. Niemier, Xiaobo Sharon Hu:
A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks. DATE 2020: 1253-1258 - [c100]Rachel Selina Rajarathnam, Yibo Lin, Yier Jin, David Z. Pan:
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. HOST 2020: 154-163 - [c99]Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin:
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. HOST 2020: 209-218 - [c98]Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin:
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. HOST 2020: 305-315 - [c97]Feng Yu, Yaodan Hu, Teng Zhang, Yier Jin:
Special Issue: Resilient Distributed Estimator with Information Consensus for CPS Security. ICCD 2020: 41-44 - [c96]Nikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira:
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems. ICDCS 2020: 1090-1100 - [c95]Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, Yier Jin:
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. NDSS 2020 - [c94]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c93]Yier Jin:
CAD for Security: A Full Reverse Engineering Toolchain from Layout to RTL. VLSI-DAT 2020: 1 - [i9]Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, Xiaorui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou:
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems. CoRR abs/2008.06926 (2020)
2010 – 2019
- 2019
- [j27]Jiaji He, Xiaolong Guo, Travis Meade, Raj Gautam Dutta, Yiqiang Zhao, Yier Jin:
SoC interconnection protection through formal verification. Integr. 64: 143-151 (2019) - [j26]Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, David Z. Pan:
Provably Secure Camouflaging Strategy for IC Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(8): 1399-1412 (2019) - [j25]Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu:
On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(10): 1820-1830 (2019) - [j24]Kaveh Shamsi, Travis Meade, Meng Li, David Z. Pan, Yier Jin:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. IEEE Trans. Inf. Forensics Secur. 14(2): 347-359 (2019) - [j23]Kaveh Shamsi, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, Yier Jin:
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview. ACM Trans. Design Autom. Electr. Syst. 24(6): 65:1-65:36 (2019) - [c92]Raj Gautam Dutta, Teng Zhang, Yier Jin:
Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack. ACC 2019: 5141-5147 - [c91]Haocheng Ma, Jiaji He, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection. AsianHOST 2019: 1-6 - [c90]Jason Portillo, Travis Meade, John Hacker, Shaojie Zhang, Yier Jin:
RERTL: Finite State Transducer Logic Recovery at Register Transfer Level. AsianHOST 2019: 1-6 - [c89]Travis Meade, Jason Portillo, Shaojie Zhang, Yier Jin:
NETA: when IP fails, secrets leak. ASP-DAC 2019: 90-95 - [c88]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin:
KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. DATE 2019: 534-539 - [c87]Xiaolong Guo, Huifeng Zhu, Yier Jin, Xuan Zhang:
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans. DATE 2019: 1727-1732 - [c86]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin:
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. HOST 2019: 91-100 - [c85]Kaveh Shamsi, David Z. Pan, Yier Jin:
On the Impossibility of Approximation-Resilient Circuit Locking. HOST 2019: 161-170 - [c84]Kaveh Shamsi, David Z. Pan, Yier Jin:
IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits. ICCAD 2019: 1-7 - [c83]Bryan Pearson, Lan Luo, Cliff C. Zou, Jacob Crain, Yier Jin, Xinwen Fu:
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory. IFIPIoT 2019: 289-306 - [c82]Yier Jin:
Towards Hardware-Assisted Security for IoT Systems. ISVLSI 2019: 632-637 - [c81]Kejun Chen, Qingxu Deng, Yumin Hou, Yier Jin, Xiaolong Guo:
Hardware and Software Co-Verification from Security Perspective. MTV 2019: 50-55 - [c80]Miao Tony He, Jungmin Park, Adib Nahiyan, Apostol Vassilev, Yier Jin, Mark M. Tehranipoor:
RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level. VTS 2019: 1-6 - [i8]Miao Tony He, Jungmin Park, Adib Nahiyan, Apostol Vassilev, Yier Jin, Mark M. Tehranipoor:
RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level. CoRR abs/1901.05909 (2019) - [i7]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - 2018
- [j22]Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2(2): 97-110 (2018) - [j21]Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2(2): 142-161 (2018) - [j20]Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin:
The Old Frontier of Reverse Engineering: Netlist Partitioning. J. Hardw. Syst. Secur. 2(3): 201-213 (2018) - [j19]Juan Wang, Zhi Hong, Yuhan Zhang, Yier Jin:
Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 88-96 (2018) - [c79]Tao Liu, Lei Jiang, Yier Jin, Gang Quan, Wujie Wen:
PT-spike: A precise-time-dependent single spike neuromorphic architecture with efficient supervised learning. ASP-DAC 2018: 568-573 - [c78]Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen:
Security analysis and enhancement of model compressed deep learning systems under adversarial attacks. ASP-DAC 2018: 721-726 - [c77]Jungmin Park, Xiaolin Xu, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
Power-based side-channel instruction-level disassembler. DAC 2018: 119:1-119:6 - [c76]Orlando Arias, Fahim Rahman, Mark M. Tehranipoor, Yier Jin:
Device attestation: Past, present, and future. DATE 2018: 473-478 - [c75]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin:
Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures. ACM Great Lakes Symposium on VLSI 2018: 147-152 - [c74]Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu:
R2D2: Runtime reassurance and detection of A2 Trojan. HOST 2018: 195-200 - [c73]Tao Liu, Wujie Wen, Yier Jin:
SIN2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology. HOST 2018: 227-230 - [c72]Raj Gautam Dutta, Feng Yu, Teng Zhang, Yaodan Hu, Yier Jin:
Security for safety: a path toward building trusted autonomous vehicles. ICCAD 2018: 92 - [c71]Meng Li, Kaveh Shamsi, Yier Jin, David Z. Pan:
TimingSAT: Decamouflaging Timing-based Logic Obfuscation. ITC 2018: 1-10 - [c70]Thao Le, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin:
Hardware Trojan Detection and Functionality Determination for Soft IPs. IVSW 2018: 56-61 - [c69]Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin:
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds. NDSS 2018 - [p1]Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi:
Hardware control flow integrity. The Continuing Arms Race 2018: 181-210 - [i6]Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen:
Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks. CoRR abs/1802.05193 (2018) - [i5]Tao Liu, Lei Jiang, Yier Jin, Gang Quan, Wujie Wen:
PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning. CoRR abs/1803.05109 (2018) - [i4]Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, Wujie Wen:
MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation. CoRR abs/1803.05117 (2018) - [i3]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j18]Travis Meade, Shaojie Zhang, Yier Jin:
IP protection through gate-level netlist security enhancement. Integr. 58: 563-570 (2017) - [j17]Sandip Ray, Yier Jin:
Guest Editorial: Security Challenges in the IoT Regime. J. Hardw. Syst. Secur. 1(4): 297 (2017) - [j16]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael T. Niemier, Xiaobo Sharon Hu:
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs. IEEE Trans. Emerg. Top. Comput. 5(3): 340-352 (2017) - [j15]Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. IEEE Trans. Inf. Forensics Secur. 12(2): 405-417 (2017) - [j14]Yier Jin, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. IEEE Trans. Inf. Forensics Secur. 12(10): 2416-2429 (2017) - [j13]Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. IEEE Trans. Inf. Forensics Secur. 12(10): 2430-2443 (2017) - [j12]Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark M. Tehranipoor:
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective. IEEE Trans. Multi Scale Comput. Syst. 3(3): 215-227 (2017) - [j11]Yu Liu, Yier Jin, Aria Nosratinia, Yiorgos Makris:
Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs. IEEE Trans. Very Large Scale Integr. Syst. 25(4): 1506-1519 (2017) - [j10]Jiaji He, Yiqiang Zhao, Xiaolong Guo, Yier Jin:
Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis. IEEE Trans. Very Large Scale Integr. Syst. 25(10): 2939-2948 (2017) - [j9]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3390-3400 (2017) - [c68]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin:
PCH framework for IP runtime security verification. AsianHOST 2017: 79-84 - [c67]Zihao Liu, Wujie Wen, Lei Jiang, Yier Jin, Gang Quan:
A statistical STT-RAM retention model for fast memory subsystem designs. ASP-DAC 2017: 720-725 - [c66]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c65]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c64]Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, Xinwen Fu:
An End-to-End View of IoT Security and Privacy. GLOBECOM 2017: 1-7 - [c63]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
Cyclic Obfuscation for Creating SAT-Unresolvable Circuits. ACM Great Lakes Symposium on VLSI 2017: 173-178 - [c62]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail? ACM Great Lakes Symposium on VLSI 2017: 357-362 - [c61]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin:
AppSAT: Approximately deobfuscating integrated circuits. HOST 2017: 95-100 - [c60]Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, Ahmad-Reza Sadeghi:
ATRIUM: Runtime attestation resilient under memory attacks. ICCAD 2017: 384-391 - [c59]Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, Wujie Wen:
MT-spike: A multilayer time-based spiking neuromorphic architecture with temporal error backpropagation. ICCAD 2017: 450-457 - [c58]Nathalie Domingo, Bryan Pearson, Yier Jin:
Exploitations of wireless interfaces via network scanning. ICNC 2017: 937-941 - [c57]Orlando Arias, Dean Sullivan, Yier Jin:
HA2lloc: Hardware-Assisted Secure Allocator. HASP@ISCA 2017: 8:1-8:7 - [c56]Travis Meade, Zheng Zhao, Shaojie Zhang, David Z. Pan, Yier Jin:
Revisit sequential logic obfuscation: Attacks and defenses. ISCAS 2017: 1-4 - [c55]Fahim Rahman, Mohammad Farmani, Mark M. Tehranipoor, Yier Jin:
Hardware-Assisted Cybersecurity for IoT Devices. MTV 2017: 51-56 - [c54]David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. RAID 2017: 238-258 - [i2]Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin:
Execution Integrity with In-Place Encryption. CoRR abs/1703.02698 (2017) - [i1]Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin:
Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications. CoRR abs/1712.07805 (2017) - 2016
- [j8]Sandip Ray, Yier Jin, Arijit Raychowdhury:
The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction. IEEE Des. Test 33(2): 76-96 (2016) - [j7]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, Xiaobo Sharon Hu, Michael T. Niemier, Yier Jin:
Emerging Technology-Based Design of Primitives for Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 13(1): 3:1-3:19 (2016) - [j6]Shiyan Hu, Yier Jin, Kenneth Heffner, Mark M. Tehranipoor:
Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing. IEEE Trans. Multi Scale Comput. Syst. 2(3): 144-145 (2016) - [j5]Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, Mark M. Tehranipoor:
Hardware Trojans: Lessons Learned after One Decade of Research. ACM Trans. Design Autom. Electr. Syst. 22(1): 6:1-6:23 (2016) - [c53]Jacob Wurm, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, Yier Jin:
Security analysis on consumer and industrial IoT devices. ASP-DAC 2016: 519-524 - [c52]Travis Meade, Shaojie Zhang, Yier Jin:
Netlist reverse engineering for high-level functionality reconstruction. ASP-DAC 2016: 655-660 - [c51]Adib Nahiyan, Kan Xiao, Kun Yang, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs. DAC 2016: 89:1-89:6 - [c50]Nancy Cam-Winget, Ahmad-Reza Sadeghi, Yier Jin:
Invited - Can IoT be secured: emerging challenges in connecting the unconnected. DAC 2016: 122:1-122:6 - [c49]Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin:
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity. DAC 2016: 163:1-163:6 - [c48]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, François-Xavier Standaert, Yier Jin:
Leverage Emerging Technologies For DPA-Resilient Block Cipher Design. DATE 2016: 1538-1543 - [c47]An Chen, Xiaobo Sharon Hu, Yier Jin, Michael T. Niemier, Xunzhao Yin:
Using emerging technologies for hardware security beyond PUFs. DATE 2016: 1544-1549 - [c46]Yu Bi, Xiaobo Sharon Hu, Yier Jin, Michael T. Niemier, Kaveh Shamsi, Xunzhao Yin:
Enhancing Hardware Security with Emerging Transistor Technologies. ACM Great Lakes Symposium on VLSI 2016: 305-310 - [c45]Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin:
How secure is split manufacturing in preventing hardware trojan? AsianHOST 2016: 1-6 - [c44]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Scalable SoC trust verification using integrated theorem proving and model checking. HOST 2016: 124-129 - [c43]Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, David Z. Pan:
Provably secure camouflaging strategy for IC protection. ICCAD 2016: 28 - [c42]Kelvin Ly, Orlando Arias, Jacob Wurm, Khoa Hoang, Kaveh Shamsi, Yier Jin:
Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform. ICCD 2016: 149-152 - [c41]Kelvin Ly, Wei Sun, Yier Jin:
Emerging challenges in cyber-physical systems: A balance of performance, correctness, and security. INFOCOM Workshops 2016: 498-502 - [c40]Travis Meade, Yier Jin, Mark M. Tehranipoor, Shaojie Zhang:
Gate-level netlist reverse engineering for hardware security: Control logic register identification. ISCAS 2016: 1334-1337 - [c39]Kelvin Ly, Yier Jin:
Security Challenges in CPS and IoT: From End-Node to the System. ISVLSI 2016: 63-68 - [c38]Kaveh Shamsi, Wujie Wen, Yier Jin:
Hardware Security Challenges Beyond CMOS: Attacks and Remedies. ISVLSI 2016: 200-205 - [c37]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Automatic RTL-to-Formal Code Converter for IP Security Formal Verification. MTV 2016: 35-38 - [c36]Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang:
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. SACMAT 2016: 49-50 - [c35]Raj Gautam Dutta, Xiaolong Guo, Yier Jin:
Quantifying trust in autonomous system under uncertainties. SoCC 2016: 362-367 - [c34]Sandip Ray, Swarup Bhunia, Yier Jin, Mark M. Tehranipoor:
Security validation in IoT space. VTS 2016: 1 - [c33]Kaveh Shamsi, Yier Jin:
Security of emerging non-volatile memories: Attacks and defenses. VTS 2016: 1-4 - 2015
- [j4]Orlando Arias, Jacob Wurm, Khoa Hoang, Yier Jin:
Privacy and Security in Internet of Things and Wearable Devices. IEEE Trans. Multi Scale Comput. Syst. 1(2): 99-109 (2015) - [c32]Bao Liu, Yier Jin, Gang Qu:
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation. CAD/Graphics 2015: 238-239 - [c31]Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, Yier Jin:
HAFIX: hardware-assisted flow integrity extension. DAC 2015: 74:1-74:6 - [c30]Yang Liu, Shiyan Hu, Jie Wu, Yiyu Shi, Yier Jin, Yu Hu, Xiaowei Li:
Impact assessment of net metering on smart home cyberattack detection. DAC 2015: 97:1-97:6 - [c29]Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, Prabhat Mishra:
Pre-silicon security verification and validation: a formal perspective. DAC 2015: 145:1-145:6 - [c28]Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, Yier Jin:
Cyber-physical systems: A security perspective. ETS 2015: 1-8 - [c27]Sandip Ray, Yier Jin:
Security Policy Enforcement in Modern SoC Designs. ICCAD 2015: 345-350 - [c26]Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael T. Niemier, Xiaobo Sharon Hu:
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices. ICCD 2015: 343-350 - [c25]Omar Nakhila, Afraa Attiah, Yier Jin, Cliff C. Zou:
Parallel active dictionary attack on WPA2-PSK Wi-Fi networks. MILCOM 2015: 665-670 - [c24]Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Hierarchy-Preserving Formal Verification Methods for Pre-silicon Security Assurance. MTV 2015: 48-53 - 2014
- [c23]Yu Bi, Pierre-Emmanuel Gaillardon, Xiaobo Sharon Hu, Michael T. Niemier, Jiann-Shiun Yuan, Yier Jin:
Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs. ATS 2014: 342-347 - [c22]Yier Jin:
Embedded System Security in Smart Consumer Electronics. TrustED@CCS 2014: 59 - [c21]Dean Sullivan, Jeff Biggers, Guidong Zhu, Shaojie Zhang, Yier Jin:
FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness. DAC 2014: 173:1-173:4 - [c20]Yier Jin:
EDA tools trust evaluation through security property proofs. DATE 2014: 1-4 - [c19]Yier Jin, Dean Sullivan:
Real-time trust evaluation in integrated circuits. DATE 2014: 1-6 - [c18]Yier Jin:
Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits. ISVLSI 2014: 19-24 - 2013
- [c17]Ozgur Sinanoglu, Naghmeh Karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Ke Huang, Yiorgos Makris:
Reconciling the IC test and security dichotomy. ETS 2013: 1-6 - [c16]Yier Jin, Bo Yang, Yiorgos Makris:
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing. HOST 2013: 99-106 - [c15]Yu Liu, Yier Jin, Yiorgos Makris:
Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation. ICCAD 2013: 399-404 - [c14]Yier Jin, Yiorgos Makris:
A proof-carrying based framework for trusted microprocessor IP. ICCAD 2013: 824-829 - [c13]Yier Jin, Dzmitry Maliuk, Yiorgos Makris:
A post-deployment IC trust evaluation architecture. IOLTS 2013: 224-225 - 2012
- [j3]Eric Love, Yier Jin, Yiorgos Makris:
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition. IEEE Trans. Inf. Forensics Secur. 7(1): 25-40 (2012) - [c12]Yier Jin, Dzmitry Maliuk, Yiorgos Makris:
Post-deployment trust evaluation in wireless cryptographic ICs. DATE 2012: 965-970 - [c11]Yier Jin, Michail Maniatakos, Yiorgos Makris:
Exposing vulnerabilities of untrusted computing platforms. ICCD 2012: 131-134 - [c10]Yier Jin, Yiorgos Makris:
Proof carrying-based information flow tracking for data secrecy protection and hardware trust. VTS 2012: 252-257 - 2011
- [c9]Eric Love, Yier Jin, Yiorgos Makris:
Enhancing security via provably trustworthy hardware intellectual property. HOST 2011: 12-17 - [c8]Yier Jin, Yiorgos Makris:
Is single-scheme Trojan prevention sufficient? ICCD 2011: 305-308 - [c7]Yier Jin, Yiorgos Makris:
PSCML: Pseudo-Static Current Mode Logic. ICECS 2011: 41-44 - 2010
- [j2]Yier Jin, Yiorgos Makris:
Hardware Trojans in Wireless Cryptographic ICs. IEEE Des. Test Comput. 27(1): 26-35 (2010) - [c6]Yier Jin, Nathan Kupp, Yiorgos Makris:
DFTT: Design for Trojan Test. ICECS 2010: 1168-1171
2000 – 2009
- 2009
- [c5]Yier Jin, Nathan Kupp, Yiorgos Makris:
Experiences in Hardware Trojan Design and Implementation. HOST 2009: 50-57 - 2008
- [j1]Haibin Shen, Yier Jin:
Low complexity bit parallel multiplier for GF(2m) generated by equally-spaced trinomials. Inf. Process. Lett. 107(6): 211-215 (2008) - [c4]Yier Jin, Yiorgos Makris:
Hardware Trojan Detection Using Path Delay Fingerprint. HOST 2008: 51-57 - 2007
- [c3]Anding Wang, Yier Jin, Shiju Li:
Dual-Residue Montgomery Multiplication. NPC 2007: 267-276 - 2006
- [c2]Haibin Shen, Rongquan You, Yier Jin, Aiming Ji:
Interconnect Estimation for Mesh-Based Reconfigurable Computing. EUC 2006: 766-775 - [c1]Haibin Shen, Yier Jin, Rongquan You:
Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation. ICICIC (1) 2006: 190-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint