"Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching", IEEE Transactions on Emerging Topics in Computing , issue SI:Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability, 2014.
"Quo Vadis, PUF? Trends and Challenges of Emerging Physical-Disorder based Security", Design, automation, and test in Europe, Dresden, 03/2014.
"D2Cyber: A Design Automation Tool for Dependable Cybercars", IEEE/ACM Design, Automation & Test in Europe (DATE), Dresden, Germany, March 2014.
"A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems", Elsevier Journal of Parallel and Distributed Computing (JPDC), vol. 74, issue 1, pp. 1872-1890, January 2014.
"Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]", ACM Conference on Computer and Communications Security, Berlin, ACM, 11/2013.
"Hardware Security: Threat Models and Metrics", International Conference on Computer-Aided Deisgn, San Jose, 11/2013.
"Balancing Security and Utility in Medical Devices?", Design Automation Conference, Austin, TX, IEEE, 2013.
High-Performance Optimizations on Tiled Many-Core Embedded Systems: A Matrix Multiplication Case Study
"High-Performance Optimizations on Tiled Many-Core Embedded Systems: A Matrix Multiplication Case Study", The Journal of Supercomputing, vol. 64, issue 1, April 2013.
"Provably Complete Hardware Trojan Detection Using Test Point Insertion", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, California, 11/2012.
"Idetic: A High-level Synthesis Approach for Enabling Long Computations on Transiently-powered ASICs", Pervasive Computing and Communication conference (PerCom), San Diego, California, 03/2013.