default search action
Michail Maniatakos
Person information
- affiliation: New York University Abu Dhabi, UAE
- affiliation (PhD 2012): Yale University, New Haven, CT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari:
A Subspace Projective Clustering Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks. IEEE Trans. Artif. Intell. 5(7): 3497-3509 (2024) - [j33]Mohammed Nabeel, Homer Gamil, Deepraj Soni, Mohammed Ashraf, Mizan Abraha Gebremichael, Eduardo Chielle, Ramesh Karri, Mihai Sanduleanu, Michail Maniatakos:
Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(6): 1924-1928 (2024) - [j32]Eduardo Chielle, Oleg Mazonka, Homer Gamil, Michail Maniatakos:
Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption. ACM Trans. Embed. Comput. Syst. 23(4): 57:1-57:28 (2024) - [c85]Yue Wang, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari:
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems. ANZCC 2024: 115-120 - [c84]Michail Maniatakos:
Keynote: Dissecting the software supply chain of modern industrial control systems. CPSS@AsiaCCS 2024: 2 - [c83]Manaar Alam, Michail Maniatakos:
AdvHunter: Detecting Adversarial Perturbations in Black-Box Neural Networks through Hardware Performance Counters. DAC 2024: 184:1-184:6 - [c82]Manaar Alam, Yue Wang, Michail Maniatakos:
Detecting Backdoor Attacks in Black-Box Neural Networks through Hardware Performance Counters. DATE 2024: 1-6 - [c81]Eduardo Chielle, Oleg Mazonka, Michail Maniatakos:
Optimizing Ciphertext Management for Faster Fully Homomorphic Encryption Computation. DATE 2024: 1-6 - [c80]Oleg Mazonka, Mohammed Nabeel Thari Moopan, Michail Maniatakos:
Exploring Generalization of Shoup Modular Multiplier. ACM Great Lakes Symposium on VLSI 2024: 222-227 - [i27]Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos:
LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots. CoRR abs/2405.05999 (2024) - 2023
- [j31]Constantine Doumanidis, Yongyu Xie, Prashant Hari Narayan Rajput, Ryan Pickren, Burak Sahin, Saman A. Zonouz, Michail Maniatakos:
Dissecting the Industrial Control Systems Software Supply Chain. IEEE Secur. Priv. 21(4): 39-50 (2023) - [c79]Manaar Alam, Esha Sarkar, Michail Maniatakos:
PerDoor: Persistent Backdoors in Federated Learning using Adversarial Perturbations. COINS 2023: 1-6 - [c78]Hadjer Benkraouda, Anand Agrawal, Dimitrios Tychalas, Marios Sazos, Michail Maniatakos:
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications. CPSIOTSEC@CCS 2023: 83-89 - [c77]Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos:
ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code. CPSS@AsiaCCS 2023: 60-71 - [c76]Mohammed Nabeel, Deepraj Soni, Mohammed Ashraf, Mizan Abraha Gebremichael, Homer Gamil, Eduardo Chielle, Ramesh Karri, Mihai Sanduleanu, Michail Maniatakos:
CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution. DATE 2023: 1-2 - [c75]Deepraj Soni, Mohammed Nabeel, Negar Neda, Ramesh Karri, Michail Maniatakos, Brandon Reagen:
Quantifying the Overheads of Modular Multiplication. ISLPED 2023: 1-6 - [c74]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. ISPASS 2023: 272-282 - [c73]Deepraj Soni, Mohammed Nabeel, Homer Gamil, Oleg Mazonka, Brandon Reagen, Ramesh Karri, Michail Maniatakos:
Design Space Exploration of Modular Multipliers for ASIC FHE accelerators. ISQED 2023: 1-8 - [c72]Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer:
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. RAID 2023: 499-512 - [c71]Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout:
Privacy-Preserving Machine Learning for Healthcare: Open Challenges and Future Perspectives. TML4H 2023: 25-40 - [c70]Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos:
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs. USENIX Security Symposium 2023: 6861-6876 - [c69]Esha Sarkar, Constantine Doumanidis, Michail Maniatakos:
TRAPDOOR: Repurposing neural network backdoors to detect dataset bias in machine learning-based genomic analysis. VLSI-SoC 2023: 1-6 - [c68]Deepraj Soni, Mohammed Nabeel, Ramesh Karri, Michail Maniatakos:
Optimizing Constrained-Modulus Barrett Multiplier for Power and Flexibility. VLSI-SoC 2023: 1-6 - [e7]Alessandro Savino, Michail Maniatakos, Stefano Di Carlo, Dimitris Gizopoulos:
29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, Crete, Greece, July 3-5, 2023. IEEE 2023, ISBN 979-8-3503-4135-5 [contents] - [i26]Yue Wang, Wending Li, Michail Maniatakos, Saif Eddin Jabari:
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems. CoRR abs/2303.14197 (2023) - [i25]Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout:
Privacy-preserving machine learning for healthcare: open challenges and future perspectives. CoRR abs/2303.15563 (2023) - [i24]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. CoRR abs/2303.17118 (2023) - [i23]David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. CoRR abs/2304.05237 (2023) - [i22]Manaar Alam, Hithem Lamri, Michail Maniatakos:
Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning. CoRR abs/2304.10638 (2023) - [i21]Hazem Ibrahim, Fengyuan Liu, Rohail Asim, Balaraju Battu, Sidahmed Benabderrahmane, Bashar Alhafni, Wifag Adnan, Tuka Alhanai, Bedoor K. AlShebli, Riyadh Baghdadi, Jocelyn J. Bélanger, Elena Beretta, Kemal Celik, Moumena Chaqfeh, Mohammed F. Daqaq, Zaynab El Bernoussi, Daryl Fougnie, Borja Garcia de Soto, Alberto Gandolfi, András György, Nizar Habash, J. Andrew Harris, Aaron Kaufman, Lefteris Kirousis, Korhan Kocak, Kangsan Lee, Seungah S. Lee, Samreen Malik, Michail Maniatakos, David Melcher, Azzam Mourad, Minsu Park, Mahmoud Rasras, Alicja Reuben, Dania Zantout, Nancy W. Gleason, Kinga Makovi, Talal Rahwan, Yasir Zaki:
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses. CoRR abs/2305.13934 (2023) - [i20]Christoforos Vasilatos, Manaar Alam, Talal Rahwan, Yasir Zaki, Michail Maniatakos:
HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis. CoRR abs/2305.18226 (2023) - [i19]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. IACR Cryptol. ePrint Arch. 2023: 465 (2023) - [i18]David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. IACR Cryptol. ePrint Arch. 2023: 521 (2023) - 2022
- [j30]Charalambos Konstantinou, Xueyang Wang, Prashanth Krishnamurthy, Farshad Khorrami, Michail Maniatakos, Ramesh Karri:
HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research. IEEE Des. Test 39(4): 23-32 (2022) - [j29]Esha Sarkar, Hadjer Benkraouda, Gopika Krishnan, Homer Gamil, Michail Maniatakos:
FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics. IEEE Trans. Biom. Behav. Identity Sci. 4(3): 361-372 (2022) - [j28]Eduardo Chielle, Nektarios Georgios Tsoutsos, Oleg Mazonka, Michail Maniatakos:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. IEEE Trans. Dependable Secur. Comput. 19(2): 848-861 (2022) - [c67]Oleg Mazonka, Eduardo Chielle, Deepraj Soni, Michail Maniatakos:
Fast and Compact Interleaved Modular Multiplication Based on Carry Save Addition. ICCAD 2022: 99:1-99:9 - [c66]Eduardo Chielle, Oleg Mazonka, Homer Gamil, Michail Maniatakos:
Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic. ICCAD 2022: 100:1-100:9 - [i17]Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos:
ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages. CoRR abs/2202.10075 (2022) - [i16]Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari:
PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks. CoRR abs/2203.09289 (2022) - [i15]Esha Sarkar, Eduardo Chielle, Gamze Gürsoy, Leo Chen, Mark Gerstein, Michail Maniatakos:
Scalable privacy-preserving cancer type prediction with homomorphic encryption. CoRR abs/2204.05496 (2022) - [i14]Mohammed Nabeel, Deepraj Soni, Mohammed Ashraf, Mizan Abraha Gebremichael, Homer Gamil, Eduardo Chielle, Ramesh Karri, Mihai Sanduleanu, Michail Maniatakos:
CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution. CoRR abs/2204.08742 (2022) - [i13]Eduardo Chielle, Oleg Mazonka, Homer Gamil, Michail Maniatakos:
Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic. CoRR abs/2204.12201 (2022) - [i12]Andrei Bytes, Prashant Hari Narayan Rajput, Michail Maniatakos, Jianying Zhou:
FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing. CoRR abs/2204.13499 (2022) - [i11]Manaar Alam, Esha Sarkar, Michail Maniatakos:
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations. CoRR abs/2205.13523 (2022) - [i10]Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos:
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs. CoRR abs/2212.04229 (2022) - 2021
- [j27]Esha Sarkar, Eduardo Chielle, Gamze Gürsoy, Oleg Mazonka, Mark Gerstein, Michail Maniatakos:
Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption. IEEE Access 9: 93097-93110 (2021) - [j26]Christina Pöpper, Michail Maniatakos, Roberto Di Pietro:
Cyber security research in the Arab region: a blooming ecosystem with global ambitions. Commun. ACM 64(4): 96-101 (2021) - [j25]Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari:
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 16: 4772-4787 (2021) - [c65]Yue Wang, Michail Maniatakos, Saif Eddin Jabari:
A Trigger Exploration Method for Backdoor Attacks on Deep Learning-Based Traffic Control Systems. CDC 2021: 4394-4399 - [c64]Eduardo Chielle, Homer Gamil, Michail Maniatakos:
Real-time Private Membership Test using Homomorphic Encryption. DATE 2021: 1282-1287 - [c63]Prashant Hari Narayan Rajput, Michail Maniatakos:
Towards Non-intrusive Malware Detection for Industrial Control Systems. DATE 2021: 1703-1706 - [c62]Prashant Hari Narayan Rajput, Esha Sarkar, Dimitrios Tychalas, Michail Maniatakos:
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware. EuroS&P 2021: 369-384 - [c61]Dimitrios Tychalas, Hadjer Benkraouda, Michail Maniatakos:
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications. USENIX Security Symposium 2021: 2847-2862 - [e6]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e5]Michail Maniatakos, Cristina Alcaraz:
CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8487-2 [contents] - [i9]Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout:
Explainability Matters: Backdoor Attacks on Medical Imaging. CoRR abs/2101.00008 (2021) - [i8]Esha Sarkar, Michail Maniatakos:
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis. CoRR abs/2108.10132 (2021) - [i7]Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution. IACR Cryptol. ePrint Arch. 2021: 659 (2021) - 2020
- [j24]Oleg Mazonka, Esha Sarkar, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Practical Data-in-Use Protection Using Binary Decision Diagrams. IEEE Access 8: 23847-23862 (2020) - [j23]Esha Sarkar, Yousif Alkindi, Michail Maniatakos:
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting. IEEE Des. Test 37(2): 103-110 (2020) - [j22]Charalambos Konstantinou, Michail Maniatakos:
A Data-Based Detection Method Against False Data Injection Attacks. IEEE Des. Test 37(5): 67-74 (2020) - [c60]Anand Agrawal, Marios Sazos, Ahmed Al-Durra, Michail Maniatakos:
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining. CPSIOTSEC@CCS 2020: 31-36 - [c59]Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos:
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems. AsiaCCS 2020: 744-758 - [c58]Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy. CCS 2020: 2135-2136 - [c57]Dimitrios Tychalas, Michail Maniatakos:
IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation. DATE 2020: 662-665 - [c56]Dimitrios Tychalas, Michail Maniatakos:
Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers. ICCD 2020: 33-36 - [c55]Homer Gamil, Pranav Mehta, Eduardo Chielle, Adriano Di Giovanni, Mohammed Nabeel, Francesco Arneodo, Michail Maniatakos:
Muon-Ra: Quantum random number generation from cosmic rays. IOLTS 2020: 1-6 - [c54]Lenos Hadjidemetriou, Georgios Tertytchny, Hazem Karbouj, Charalambos D. Charalambous, Maria K. Michael, Marios Sazos, Michail Maniatakos:
Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit. ISGT-Europe 2020: 126-130 - [c53]Hadjer Benkraouda, Muhammad Ashif Chakkantakath, Anastasis Keliris, Michail Maniatakos:
SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs. VTS 2020: 1-6 - [e4]Michail Maniatakos, Yuqing Zhang:
CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8087-4 [contents] - [i6]Yue Wang, Esha Sarkar, Michail Maniatakos, Saif Eddin Jabari:
Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems. CoRR abs/2003.07859 (2020) - [i5]Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos:
FaceHack: Triggering backdoored facial recognition systems using facial characteristics. CoRR abs/2006.11623 (2020)
2010 – 2019
- 2019
- [j21]Charalambos Konstantinou, Michail Maniatakos:
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems. J. Hardw. Syst. Secur. 3(2): 132-146 (2019) - [c52]Prashant Hari Narayan Rajput, Pankaj Rajput, Marios Sazos, Michail Maniatakos:
Process-Aware Cyberattacks for Thermal Desalination Plants. AsiaCCS 2019: 441-452 - [c51]Esha Sarkar, Michail Maniatakos:
On automating delayered IC analysis for hardware IP protection. COINS 2019: 205-210 - [c50]Mohammed Nabeel, Mohammed Ashraf, Eduardo Chielle, Nektarios Georgios Tsoutsos, Michail Maniatakos:
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution. HOST 2019: 131-140 - [c49]Prashant Hari Narayan Rajput, Michail Maniatakos:
JTAG: A Multifaceted Tool for Cyber Security. IOLTS 2019: 155-158 - [c48]Dimitrios Tychalas, Anastasis Keliris, Michail Maniatakos:
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems. IOLTS 2019: 194-199 - [c47]Charalambos Konstantinou, Marios Sazos, Michail Maniatakos:
FLEP-SGS2: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security. ISGT 2019: 1-5 - [c46]Anastasis Keliris, Michail Maniatakos:
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. NDSS 2019 - [p1]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data. Security and Fault Tolerance in Internet of Things 2019: 87-110 - [e3]Dimitris Gizopoulos, Dan Alexandrescu, Panagiota Papavramidou, Michail Maniatakos:
25th IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2019, Rhodes, Greece, July 1-3, 2019. IEEE 2019, ISBN 978-1-7281-2490-2 [contents] - [e2]Michail Maniatakos, Ibrahim Abe M. Elfadel, Matteo Sonza Reorda, H. Fatih Ugurdag, José Monteiro, Ricardo Reis:
VLSI-SoC: Opportunities and Challenges Beyond the Internet of Things - 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, Abu Dhabi, United Arab Emirates, October 23-25, 2017, Revised and Extended Selected Papers. IFIP Advances in Information and Communication Technology 500, Springer 2019, ISBN 978-3-030-15662-6 [contents] - 2018
- [j20]Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos:
TERMinator Suite: Benchmarking Privacy-Preserving Architectures. IEEE Comput. Archit. Lett. 17(2): 122-125 (2018) - [j19]Michail Maniatakos:
Guest Editor Introduction: Embedded Security Challenge. IEEE Embed. Syst. Lett. 10(3): 81-82 (2018) - [j18]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems. IEEE Embed. Syst. Lett. 10(3): 95-98 (2018) - [j17]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation. IEEE Trans. Computers 67(1): 16-31 (2018) - [c45]Charalambos Konstantinou, Eduardo Chielle, Michail Maniatakos:
PHYLAX: Snapshot-based profiling of real-time embedded devices via JTAG interface. DATE 2018: 869-872 - [c44]Dimitrios Tychalas, Michail Maniatakos:
Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree. ICECS 2018: 477-480 - [c43]Anastasis Keliris, Charalambos Konstantinou, Marios Sazos, Michail Maniatakos:
Low-budget Energy Sector Cyberattacks via Open Source Exploitation. VLSI-SoC 2018: 101-106 - [c42]Xiaorui Liu, Anastasis Keliris, Charalambos Konstantinou, Marios Sazos, Michail Maniatakos:
Assessment of Low-Budget Targeted Cyberattacks Against Power Systems. VLSI-SoC (Selected Papers) 2018: 232-256 - [e1]Dimitris Gizopoulos, Dan Alexandrescu, Mihalis Maniatakos, Panagiota Papavramidou:
24th IEEE International Symposium on On-Line Testing And Robust System Design, IOLTS 2018, Platja D'Aro, Spain, July 2-4, 2018. IEEE 2018, ISBN 978-1-5386-5992-2 [contents] - [i4]Anastasis Keliris, Michail Maniatakos:
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. CoRR abs/1812.03478 (2018) - [i3]Eduardo Chielle, Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos:
E3: A Framework for Compiling C++ Programs with Encrypted Operands. IACR Cryptol. ePrint Arch. 2018: 1013 (2018) - 2017
- [j16]Michail Maniatakos, Alvaro A. Cárdenas, Ramesh Karri:
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy. IEEE Des. Test 34(4): 5-6 (2017) - [j15]Jairo Giraldo, Esha Sarkar, Alvaro A. Cárdenas, Michail Maniatakos, Murat Kantarcioglu:
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys. IEEE Des. Test 34(4): 7-17 (2017) - [j14]Charalambos Konstantinou, Marios Sazos, Ahmed S. Musleh, Anastasis Keliris, Ahmed Al-Durra, Michail Maniatakos:
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment. IET Cyper-Phys. Syst.: Theory & Appl. 2(4): 180-187 (2017) - [c41]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Obfuscating branch decisions based on encrypted data using MISR and hash digests. AsianHOST 2017: 115-120 - [c40]Dimitrios Tychalas, Nektarios Georgios Tsoutsos, Michail Maniatakos:
SGXCrypter: IP protection for portable executables using Intel's SGX technology. ASP-DAC 2017: 354-359 - [c39]Nektarios Georgios Tsoutsos, Homer Gamil, Michail Maniatakos:
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering. CPSS@AsiaCCS 2017: 15-20 - [c38]Nikhil Gupta, Fei Chen, Nektarios Georgios Tsoutsos, Michail Maniatakos:
ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited. DAC 2017: 82:1-82:6 - [c37]Nektarios Georgios Tsoutsos, Oleg Mazonka, Michail Maniatakos:
Memory-Bounded Randomness for Hardware-Constrained Encrypted Computation. ICCD 2017: 673-680 - [i2]Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos:
TERMinator Suite: Benchmarking Privacy-Preserving Architectures. IACR Cryptol. ePrint Arch. 2017: 1218 (2017) - 2016
- [j13]Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, Ramesh Karri:
The Cybersecurity Landscape in Industrial Control Systems. Proc. IEEE 104(5): 1039-1057 (2016) - [j12]Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. IEEE Trans. Inf. Forensics Secur. 11(9): 2123-2138 (2016) - [j11]Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou, Steve Kim:
Malicious Firmware Detection with Hardware Performance Counters. IEEE Trans. Multi Scale Comput. Syst. 2(3): 160-173 (2016) - [c36]Anastasis Keliris, Charalambos Konstantinou, Nektarios Georgios Tsoutsos, Raghad Baiad, Michail Maniatakos:
Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds. ASP-DAC 2016: 511-518 - [c35]Charalambos Konstantinou, Michail Maniatakos:
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation. CPS-SPC@CCS 2016: 81-92 - [c34]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture. ICCD 2016: 157-160 - [c33]Anastasis Keliris, Hossein Salehghaffari, Brian R. Cairl, Prashanth Krishnamurthy, Michail Maniatakos, Farshad Khorrami:
Machine learning-based defense against process-aware attacks on Industrial Control Systems. ITC 2016: 1-10 - [c32]Charalambos Konstantinou, Marios Sazos, Michail Maniatakos:
Attacking the smart grid using public information. LATS 2016: 105-110 - [c31]Anastasis Keliris, Michail Maniatakos:
Remote field device fingerprinting using device-specific modbus information. MWSCAS 2016: 1-4 - 2015
- [j10]Michail Maniatakos, Maria K. Michael, Chandra Tirumurti, Yiorgos Makris:
Revisiting Vulnerability Analysis in Modern Microprocessors. IEEE Trans. Computers 64(9): 2664-2674 (2015) - [j9]Nektarios Georgios Tsoutsos, Michail Maniatakos:
The HEROIC Framework: Encrypted Computation Without Shared Keys. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 875-888 (2015) - [j8]Michail Maniatakos, Maria K. Michael, Yiorgos Makris:
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving. IEEE Trans. Very Large Scale Integr. Syst. 23(11): 2447-2460 (2015) - [c30]Charalambos Konstantinou, Anastasis Keliris, Michail Maniatakos:
Privacy-preserving functional IP verification utilizing fully homomorphic encryption. DATE 2015: 333-338 - [c29]Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, Yier Jin:
Cyber-physical systems: A security perspective. ETS 2015: 1-8 - [c28]Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri:
ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters. ICCAD 2015: 544-551 - [c27]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Obfuscated arbitrary computation using cryptographic primitives. IDT 2015: 5-8 - [c26]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Extending residue-based fault tolerance to encrypted computation. ITC 2015: 1-10 - [c25]Anastasis Keliris, Vasilis Dimitsas, Olympia Kremmyda, Dimitris Gizopoulos, Michail Maniatakos:
Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations. PATMOS 2015: 25-32 - [c24]Charalambos Konstantinou, Michail Maniatakos:
Impact of firmware modification attacks on power systems field devices. SmartGridComm 2015: 283-288 - [i1]Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos:
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. IACR Cryptol. ePrint Arch. 2015: 1226 (2015) - 2014
- [j7]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation. IEEE Trans. Emerg. Top. Comput. 2(1): 81-93 (2014) - [c23]Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Michail Maniatakos:
Advanced Techniques for Designing Stealthy Hardware Trojans. DAC 2014: 174:1-174:4 - [c22]Nektarios Georgios Tsoutsos, Michail Maniatakos:
HEROIC: Homomorphically EncRypted One Instruction Computer. DATE 2014: 1-6 - [c21]Anastasis Keliris, Michail Maniatakos:
Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions. DTIS 2014: 1-6 - [c20]Raghudeep Kannavara, Patrick Schaumont, Michail Maniatakos, Michael A. Smith, Scott Buck:
Innovative engineering outreach using Intel® security and embedded tools. EWME 2014: 127-132 - [c19]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation. ISVLSI 2014: 59-64 - [c18]Michele Portolan, Michail Maniatakos:
Special session 8A: E.J. McCluskey Doctoral Thesis Award semi-final. VTS 2014: 1 - 2013
- [j6]Naghmeh Karimi, Michail Maniatakos, Chandrasekharan Tirumurti, Yiorgos Makris:
On the Impact of Performance Faults in Modern Microprocessors. J. Electron. Test. 29(3): 351-366 (2013) - [j5]Michail Maniatakos, Prabhakar Kudva, Bruce M. Fleischer, Yiorgos Makris:
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers. IEEE Trans. Computers 62(7): 1376-1388 (2013) - [c17]Michail Maniatakos, Maria K. Michael, Yiorgos Makris:
AVF-driven parity optimization for MBU protection of in-core memory arrays. DATE 2013: 1480-1485 - [c16]Michail Maniatakos:
Privilege escalation attack through address space identifier corruption in untrusted modern processors. DTIS 2013: 161-166 - [c15]Michail Maniatakos, Maria K. Michael, Yiorgos Makris:
Investigating the limits of AVF analysis in the presence of multiple bit errors. IOLTS 2013: 49-54 - [c14]Nektarios Georgios Tsoutsos, Michail Maniatakos:
Investigating the Application of One Instruction Set Computing for Encrypted Data Computation. SPACE 2013: 21-37 - [c13]Jennifer Dworak, Ronald Shawn Blanton, Masahiro Fujita, Kazumi Hatayama, Naghmeh Karimi, Michail Maniatakos, Antonis M. Paschalis, Adit D. Singh, Tian Xia:
Special session 4B: Elevator talks. VTS 2013: 1 - [c12]Michele Portolan, Michail Maniatakos:
Special session 8A: E.J. McCluskey doctoral thesis award semi-final - presentations. VTS 2013: 1 - [c11]Michele Portolan, Michail Maniatakos:
Special session 3B: E.J. McCluskey Doctoral Thesis Award semi-final - Posters. VTS 2013: 1 - 2012
- [j4]Michail Maniatakos, Chandrasekharan Tirumurti, Rajesh Galivanche, Yiorgos Makris:
Global Signal Vulnerability (GSV) Analysis for Selective State Element Hardening in Modern Microprocessors. IEEE Trans. Computers 61(10): 1361-1370 (2012) - [c10]Yier Jin, Michail Maniatakos, Yiorgos Makris:
Exposing vulnerabilities of untrusted computing platforms. ICCD 2012: 131-134 - [c9]Michail Maniatakos, Maria K. Michael, Yiorgos Makris:
Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors. ITC 2012: 1-8 - 2011
- [j3]Michail Maniatakos, Naghmeh Karimi, Chandra Tirumurti, Abhijit Jas, Yiorgos Makris:
Instruction-Level Impact Analysis of Low-Level Faults in a Modern Microprocessor Controller. IEEE Trans. Computers 60(9): 1260-1273 (2011) - [j2]Naghmeh Karimi, Michail Maniatakos, Abhijit Jas, Chandra Tirumurti, Yiorgos Makris:
Workload-Cognizant Concurrent Error Detection in the Scheduler of a Modern Microprocessor. IEEE Trans. Computers 60(9): 1274-1287 (2011) - [c8]Michail Maniatakos, Chandra Tirumurti, Abhijit Jas, Yiorgos Makris:
AVF Analysis Acceleration via Hierarchical Fault Pruning. ETS 2011: 87-92 - [c7]Michail Maniatakos, Yiorgos Makris, Prabhakar Kudva, Bruce M. Fleischer:
Exponent monitoring for low-cost concurrent error detection in FPU control logic. VTS 2011: 235-240 - 2010
- [c6]Michail Maniatakos, Yiorgos Makris:
Workload-driven selective hardening of control state elements in modern microprocessors. VTS 2010: 159-164
2000 – 2009
- 2009
- [c5]Naghmeh Karimi, Michail Maniatakos, Chandra Tirumurti, Abhijit Jas, Yiorgos Makris:
Impact analysis of performance faults in modern microprocessors. ICCD 2009: 91-96 - [c4]Michail Maniatakos, Naghmeh Karimi, Chandra Tirumurti, Abhijit Jas, Yiorgos Makris:
Instruction-Level Impact Comparison of RT- vs. Gate-Level Faults in a Modern Microprocessor Controller. VTS 2009: 9-14 - 2008
- [j1]Dimitris Gizopoulos, Mihalis Psarakis, Miltiadis Hatzimihail, Michail Maniatakos, Antonis M. Paschalis, Anand Raghunathan, Srivaths Ravi:
Systematic Software-Based Self-Test for Pipelined Processors. IEEE Trans. Very Large Scale Integr. Syst. 16(11): 1441-1453 (2008) - [c3]Michail Maniatakos, Naghmeh Karimi, Yiorgos Makris, Abhijit Jas, Chandra Tirumurti:
Design and Evaluation of a Timestamp-Based Concurrent Error Detection Method (CED) in a Modern Microprocessor Controller. DFT 2008: 454-462 - [c2]Michail Maniatakos, Songhua Xu, Willard L. Miranker:
Constraint-Based Placement and Routing for FPGAs Using Self-Organizing Maps. ICTAI (2) 2008: 465-469 - [c1]Naghmeh Karimi, Michail Maniatakos, Abhijit Jas, Yiorgos Makris:
On the Correlation between Controller Faults and Instruction-Level Errors in Modern Microprocessors. ITC 2008: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint