SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking (IEEE TComp, 2022) [link]
FadingBF: A Bloom Filter with Consistent Guarantees for Online Applications (IEEE TComp, 2022) [link]
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers (Journal of Cryptology, 2021) [link]
PERI: a Posit enabled RISC-V core (ACM TACO, 2021) [link]
FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis (ACM TODAES, 2020) [link]
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers (IACR TCHES, 2020) [link]
BRUTUS: Refuting the Security Claims of the Cache Timing Randomization Countermeasure proposed in CEASER (IEEE Computer Architecture Letters, 2020) [link]
ALEXIA: A Processor with Light Weight Extensions for Memory Safety (ACM TECS, 2019) [link]
Conferences
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors (USENIX Security, 2024) [link] (Distinguished Paper Award)
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems (EMSOFT, 2023) [link]
YODA: Covert Communication Channel over Public DNS Resolvers (DSN, 2023) [link]
Timed Speculative Attacks exploiting Store to Load Forwarding bypassing Cache-based Countermeasures[link] (DAC, 2022)
Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations (IEEE ASPDAC 2022) [link]
FORTIFY: Analytical Pre-Silicon Side-Channel Characterization of Digital Designs (IEEE ASPDAC 2022) [link]
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance (IEEE HOST, 2020) [link] (Best Paper Award)
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware (DATE, 2020) [link]