WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks T Trippel, O Weisse, W Xu, P Honeyman, K Fu 2017 IEEE European symposium on security and privacy (EuroS&P), 3-18, 2017 | 377 | 2017 |
Fuzzing Hardware Like Software T Trippel, KG Shin, A Chernyakhovsky, G Kelly, D Rizzo, M Hicks 31st USENIX Security Symposium (USENIX Security 22), 3237-3254, 2022 | 110 | 2022 |
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans T Trippel, M Shin, Kang G., Bush, Kevin B., Hicks 41st IEEE Symposium on Security and Privacy (S&P), 2020 | 37 | 2020 |
SYNFI: pre-silicon fault analysis of an open-source secure element P Nasahl, M Osorio, P Vogel, M Schaffner, T Trippel, D Rizzo, S Mangard arXiv preprint arXiv:2205.04775, 2022 | 20 | 2022 |
Bomberman: Defining and defeating hardware ticking timebombs at design-time T Trippel, KG Shin, KB Bush, M Hicks 2021 IEEE Symposium on Security and Privacy (SP), 970-986, 2021 | 18 | 2021 |
T-TER: Defeating A2 trojans with targeted tamper-evident routing T Trippel, KG Shin, KB Bush, M Hicks Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 9 | 2023 |
An extensible framework for quantifying the coverage of defenses against untrusted foundries T Trippel, KG Shin, KB Bush, M Hicks arXiv preprint arXiv:1906.08836, 2019 | 3 | 2019 |
Defensive routing: A preventive layoutlevel defense against untrusted foundries T Trippel, KG Shin, KB Bush, M Hicks arXiv preprint arXiv:1906.08842, 2019 | 2 | 2019 |
Protecting motion sensors from acoustic injection attack K Fu, P Honeyman, T Trippel, O Weisse US Patent 11,209,454, 2021 | 1 | 2021 |
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos A Kwong, C Bolton, T Trippel, W Xu, K Fu | 1 | 2017 |
Defensive routing and related techniques KB Bush, MD Hicks, TD Trippel US Patent 11,347,902, 2022 | | 2022 |
Developing Trustworthy Hardware with Security-Driven Design and Verification T Trippel | | 2021 |
Integrated circuit (IC) portholes and related techniques KB Bush, MD Hicks, TD Trippel US Patent 10,839,109, 2020 | | 2020 |
Anarchy by Design J Erickson, T Trippel | | |
UbiCrypt: Making ubiquitous encryption compatible with enterprise security O Weisse, T Trippel, J Erickson | | |
Cloaking Order in Chaos J Erickson, A Quinn, T Trippel | | |
Intel SGX Powered Cryptographic Library J Erickson, T Trippel | | |