Hardware Trojan detection using path delay fingerprint Y Jin, Y Makris Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International …, 2008 | 803 | 2008 |
Hardware trojans: Lessons learned after one decade of research K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016 | 451 | 2016 |
Privacy and security in internet of things and wearable devices O Arias, J Wurm, K Hoang, Y Jin IEEE Transactions on Multi-Scale Computing Systems 1 (2), 99-109, 2015 | 392 | 2015 |
Security analysis on consumer and industrial IoT devices J Wurm, K Hoang, O Arias, AR Sadeghi, Y Jin 2016 21st Asia and South Pacific design automation conference (ASP-DAC), 519-524, 2016 | 313 | 2016 |
AppSAT: Approximately deobfuscating integrated circuits K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 304 | 2017 |
Experiences in hardware Trojan design and implementation Y Jin, N Kupp, Y Makris 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, 50-57, 2009 | 290 | 2009 |
HAFIX: Hardware-assisted flow integrity extension L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ... Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 228 | 2015 |
Smart nest thermostat: A smart spy in your home G Hernandez, O Arias, D Buentello, Y Jin Black Hat USA, 2014 | 223 | 2014 |
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition E Love, Y Jin, Y Makris IEEE Transactions on Information Forensics and Security 7 (1), 25-40, 2011 | 188 | 2011 |
Provably secure camouflaging strategy for IC protection M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan IEEE transactions on computer-aided design of integrated circuits and …, 2017 | 172 | 2017 |
Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray, Y Jin Journal of Hardware and Systems Security 2, 97-110, 2018 | 169 | 2018 |
Hardware Trojans in wireless cryptographic ICs Y Jin, Y Makris Design & Test of Computers, IEEE 27 (1), 26-35, 2010 | 158 | 2010 |
Cyclic obfuscation for creating SAT-unresolvable circuits K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017 | 157 | 2017 |
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis J He, Y Zhao, X Guo, Y Jin IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017 | 143 | 2017 |
The changing computing paradigm with internet of things: A tutorial introduction S Ray, Y Jin, A Raychowdhury IEEE Design & Test 33 (2), 76-96, 2016 | 137 | 2016 |
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin NDSS, 2020 | 104 | 2020 |
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 102 | 2016 |
Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs Y Liu, Y Jin, A Nosratinia, Y Makris IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (4 …, 2016 | 100 | 2016 |
Atrium: Runtime attestation resilient under memory attacks S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017 | 93 | 2017 |
Introduction to cyber-physical system security: A cross-layer perspective J Wurm, Y Jin, Y Liu, S Hu, K Heffner, F Rahman, M Tehranipoor IEEE Transactions on Multi-Scale Computing Systems 3 (3), 215-227, 2016 | 92 | 2016 |