SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking (IEEE TComp, 2022) [link]
FadingBF: A Bloom Filter with Consistent Guarantees for Online Applications (IEEE TComp, 2022) [link]
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers (Journal of Cryptology, 2021) [link]
PERI: a Posit enabled RISC-V core (ACM TACO, 2021) [link]
FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis (ACM TODAES, 2020) [link]
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers (IACR TCHES, 2020) [link]
BRUTUS: Refuting the Security Claims of the Cache Timing Randomization Countermeasure proposed in CEASER (IEEE Computer Architecture Letters, 2020) [link]
Conferences
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks (DSN, 2025)
GLiTCH : GLiTCH induced Transitions for Secure Crypto-Hardware (DAC, 2025)
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors (USENIX Security, 2024) [link] (Distinguished Paper Award)
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems (EMSOFT, 2023) [link]
YODA: Covert Communication Channel over Public DNS Resolvers (DSN, 2023) [link]
Timed Speculative Attacks exploiting Store to Load Forwarding bypassing Cache-based Countermeasures[link] (DAC, 2022)
FORTIFY: Analytical Pre-Silicon Side-Channel Characterization of Digital Designs (IEEE ASPDAC 2022) [link]
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance (IEEE HOST, 2020) [link] (Best Paper Award)
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware (DATE, 2020) [link]