Manufacturing and Security Challenges in 3D Printing SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri JOM, 1-10, 2016 | 317 | 2016 |
Embedding tracking codes in additive manufactured parts for product authentication F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta Advanced Engineering Materials 21 (4), 1800495, 2019 | 73 | 2019 |
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation NG Tsoutsos, M Maniatakos Emerging Topics in Computing, IEEE Transactions on, 1-1, 2013 | 71 | 2013 |
E 3: A Framework for Compiling C++ Programs with Encrypted Operands E Chielle, O Mazonka, NG Tsoutsos, M Maniatakos | 63 | 2018 |
The HEROIC framework: Encrypted computation without shared keys NG Tsoutsos, M Maniatakos IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 63 | 2015 |
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs D Mouris, NG Tsoutsos IEEE Transactions on Information Forensics and Security, 1-16, 2021 | 47 | 2021 |
Advanced techniques for designing stealthy hardware trojans NG Tsoutsos, C Konstantinou, M Maniatakos Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014 | 42 | 2014 |
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks C Gouert, D Mouris, NG Tsoutsos Privacy Enhancing Technologies Symposium (PETS) 2023 (3), 154-172, 2023 | 40 | 2023 |
ObfusCADe: Obfuscating additive manufacturing cad models against counterfeiting N Gupta, F Chen, NG Tsoutsos, M Maniatakos Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 40 | 2017 |
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering NG Tsoutsos, H Gamil, M Maniatakos Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 15-20, 2017 | 33 | 2017 |
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation O Mazonka, NG Tsoutsos, M Maniatakos IEEE Transactions on Information Forensics and Security, 1-16, 2016 | 32 | 2016 |
REDsec: Running Encrypted Discretized Neural Networks in Seconds L Folkerts, C Gouert, NG Tsoutsos Network and Distributed System Security Symposium (NDSS), 1-17, 2023 | 31* | 2023 |
HEROIC: Homomorphically EncRypted One Instruction Computer NG Tsoutsos, M Maniatakos Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 …, 2014 | 30 | 2014 |
NFTs For 3D Models: Sustaining Ownership In Industry 4.0 D Mouris, NG Tsoutsos IEEE Consumer Electronics Magazine, 2022 | 26 | 2022 |
Security assessment and impact analysis of cyberattacks in integrated T&D power systems I Zografopoulos, C Konstantinou, NG Tsoutsos, D Zhu, R Broadwater Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical …, 2021 | 26 | 2021 |
Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds A Keliris, C Konstantinou, NG Tsoutsos, R Baiad, M Maniatakos Asia and South Pacific Design Automation Conference (ASPDAC), 511-518, 2016 | 24 | 2016 |
Investigating the application of one instruction set computing for encrypted data computation NG Tsoutsos, M Maniatakos International Conference on Security, Privacy, and Applied Cryptography …, 2013 | 23 | 2013 |
TERMinator Suite: Benchmarking Privacy-Preserving Architectures D Mouris, NG Tsoutsos, M Maniatakos Cryptology ePrint Archive 2017 (1218), 1-12, 2017 | 20 | 2017 |
ROMEO: Conversion and Evaluation of HDL Designs in the Encrypted Domain C Gouert, NG Tsoutsos Design Automation Conference (DAC), 1-6, 2020 | 18 | 2020 |
SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology D Tychalas, NG Tsoutsos, M Maniatakos Asia and South Pacific Design Automation Conference (ASPDAC) 2017, 1-6, 2017 | 18 | 2017 |