"A Primer on Hardware Security: Models, Methods, and Metrics", Proceedings of the IEEE, vol. 102, issue 8, 08/2014.
"Power and Timing Side Channels for PUFs and their Efficient Exploitation", Cryptology ePrint Archive: Report 2013/851, 2013.
"Combined Modeling and Side Channel Attacks on Strong PUFs", Cryptology ePrint Archive, Report 2013/632, 2013.
"Automated checkpointing for enabling intensive applications on energy harvesting devices", 2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED), Beijing, China, IEEE, pp. 27 - 32, 2013.
CyCAR'2013: First international academic workshop on security, privacy and dependability for cybervehicles
"CyCAR'2013: First international academic workshop on security, privacy and dependability for cybervehicles", the 2013 ACM SIGSAC conferenceProceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, Berlin, GermanyNew York, New York, USA, ACM Press, pp. 1481 - 1482, 2013.
"A Timing Channel Spyware for the CSMA/CA Protocol", IEEE Transactions on Information Forensics and Security, vol. 8, issue 3, pp. 477 - 487, 03/2013.
"Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things", IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, issue 1, pp. 1 - 4, 03/2013.
"PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs", Design Automation Conference (DAC) 2014, Best paper candidate, San Francisco, ACM, 06/2014.
"Processor-Based Strong Physical Unclonable Functions with Aging-Based Response Tuning", IEEE Transactions on Emerging Topics in Computing, vol. published online, 2013.
"Low-power Resource Binding by Postsilicon Customization", ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 2, New York, NY, USA, ACM, pp. 26:1–26:22, 2013.