Biblio

Export 162 results:
Sort by: Author Title Type [ Year  (Desc)]
2017
Mirhoseini, A., B. D. Rouhani, E. M. Songhori, and F. Koushanfar, "ExtDict: Extensible Dictionaries for Data- and Platform-Aware Large-Scale Learning", International Parallel & Distributed Processing Symposium (IPDPS): IEEE, 2017.  Download: ExtDict.pdf (636.32 KB)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "TinyDL: Just-In-Time Deep Learning Solution For Constrained Embedded Systems", International Symposium on Circuits and Systems (ISCAS): IEEE, 2017.  Download: TinyDL.pdf (1011.05 KB)
Riazi, S. M., E. M. Songhori, and F. Koushanfar, "PriSearch: Efficient Search on Private Data", Design Automation Conference (DAC), Austin, Texas, 05/2017.
Riazi, S. M., M. Samragh, and F. Koushanfar, "CAMsure: Secure Content-Addressable Memory for Approximate Search", ACM Transactions on Embedded Computing Systems (TECS), 2017.  Download: main_journal.pdf (1.11 MB)
Samragh, M., M. Ghasemzadeh, and F. Koushanfar, "Customizing Neural Networks for Efficient FPGA Implementation", IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM): IEEE, 2017. Abstract  Download: SamraghCustomizing.pdf (3.65 MB)
Samragh, M., M. Imani, F. Koushanfar, and T. Rosing, "LookNN: Neural Network with No Multiplication", Design Automation and Test in Europe (DATE), 2017. Abstract  Download: LookNN.pdf (419 KB)
2016
Mirhoseini, A., A. - R. Sadeghi, and F. Koushanfar, "CryptoML: Secure Outsourcing of Big Data Machine Learning Applications", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: CryptoML.pdf (430.37 KB)
Riazi, S. M., N. K. R. Dantu, V. L. N. Gattu, and F. Koushanfar, "GenMatch: Secure DNA Compatibility Testing", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: GenMatch.pdf (294.6 KB)
Zhang, Y., and F. Koushanfar, "Robust Privacy-Preserving Fingerprint Authentication", IEEE International Symposium on Hardware Oriented Security and Trust(HOST), May, 2016. Abstract  Download: fingerprint.pdf (96.55 KB)
Mirhoseini, A., B. D. Rouhani, E. M. Songhori, and F. Koushanfar, "Chime: Checkpointing long computations on intermittently energized IoT devices", IEEE Transactions on Multi-Scale Computing Systems (TMSCS), vol. 2, issue 99, 1/2016. Abstract  Download: chime.pdf (2.34 MB)
Riazi, S. M., "Large-Scale Privacy-Preserving Matching and Search", Electrical and Computer Engineering, vol. Master of Science: Rice University, pp. 123, 07/2017, 2016. Abstract  Download: Thesis.pdf (7.45 MB)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "DeLight: Adding Energy Dimension To Deep Neural Networks", International Symposium on Low Power Electronics and Design (ISLPED), San Francisco, ACM, 2016.  Download: DeLight.pdf (852.29 KB)
Rouhani, B. D., A. Mirhoseini, and F. Koushanfar, "Going deeper than deep learning for massive data analytics under physical constraints", Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, 2016.  Download: Deep.pdf (304.41 KB)
2015
Koushanfar, F., A. Mirhoseini, G. Qu, and Z. Zhang, "DA Systemization of Knowledge: A Catalog of Prior Forward-Looking Initiatives", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November, 2015. Abstract  Download: DA Systemization of Knowledge.pdf (561.24 KB)
Kahng, A. B., and F. Koushanfar, "Evolving EDA Beyond its E-Roots: An Overview", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November, 2015. Abstract  Download: Evolving EDA.pdf (523 KB)
Rouhani, B., E. Songhori, A. Mirhoseini, and F. Koushanfar, "SSketch: An Automated Framework for Streaming Sketch-based Analysis of Big Data on FPGA", 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), May/2015. Abstract  Download: SSketch.pdf (670.5 KB)
Songhori, E., S. U. Hussain, A. - R. Sadeghi, T. Schneider, and F. Koushanfar, "TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits", IEEE Symposium on Security and Privacy (S&P)(14% acceptance rate), May, 2015. Abstract  Download: TinyGarble.pdf (693.26 KB)
Songhori, E., A. Mirhoseini, and F. Koushanfar, "AHEAD: Automated Framework for Hardware Accelerated Iterative Data Analysis", IEEE/ACM Design, Automation & Test in Europe (DATE), March, 2015. Abstract  Download: AHEAD.pdf (352.43 KB)
Mirhoseini, A., M. Potkonjak, and F. Koushanfar, "Phase Change Memory Write Cost Minimization by Data Encoding", IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), Special Issue on Computing in Emerging Technologies, vol. 5, issue 1, 3/2015. Abstract  Download: Write Cost Minimization.pdf (1.74 MB)
2014
Shahrjerdi, D., J. Rajendran, S. Garg, F. Koushanfar, and R. Karri, "Shielding and Securing Integrated Circuits with Sensors", International Conference on Computer-Aided Design, November, 2014. Abstract  Download: Shielding_Securing_IC.pdf (390.61 KB)
Munir, A., and F. Koushanfar, "D2Cyber: A Design Automation Tool for Dependable Cybercars", Design, Automation & Test in Europe (DATE), March, 2014. Abstract  Download: D2Cyber.pdf (120.8 KB)
Wendt, J. B., F. Koushanfar, and M. Potkonjak, "Techniques for Foundry Identification", Design Automation Conference (DAC), pp. 1 - 6, June, 2014. Abstract  Download: Foundry.pdf (183.18 KB)
Herder, C., M. - D. Yu, F. Koushanfar, and S. Devadas, "Physical Unclonable Functions and Applications: A Tutorial", Proceedings of the IEEE, vol. 102, issue 8, pp. 1126 - 1141, August, 2014. Abstract  Download: PUFs_and_Applications_A_Tutorial.pdf (675.4 KB)
Karri, R., and F. Koushanfar, "Trustworthy Hardware", Proceedings of the IEEE, vol. 102, issue 8, pp. 1123-1125, 8/2014.  Download: Trustworthy_Hardware.pdf (119.81 KB)
Nowroz, A. N., K. Hu, F. Koushanfar, and S. Reda, "Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, issue 12, pp. 1792-1805, 12/2014. Abstract  Download: TrojanDetection.pdf (2.14 MB)
Munir, A., A. Gordon-Ross, S. Ranka, and F. Koushanfar, "A Queueing Theoretic Approach for Performance Evaluation of Low-Power Multi-core Embedded Systems", Elsevier Journal of Parallel and Distributed Computing (JPDC), vol. 74, issue 1, no. 1, pp. 1872-1890, 1/2014. Abstract  Download: MulticoreQN_JPDC.pdf (911.71 KB)
Rührmair, U., X. Xu, J. Sölter, A. Mahmoud, M. Majzoobi, F. Koushanfar, and W. Burleson, "Efficient Power and Timing Side Channels for Physical Unclonable Functions", Lecture Notes in Computer ScienceCryptographic Hardware and Embedded Systems – CHES 2014, vol. 8731, Berlin, Heidelberg, Springer Berlin Heidelberg, pp. 476 - 492, 2014.  Download: Efficient Power and Timing Side Channels bookchap.pdf (983.83 KB)
2013
Mirhoseini, A., E. M. Songhori, and F. Koushanfar, "Automated checkpointing for enabling intensive applications on energy harvesting devices", 2013 IEEE International Symposium on Low Power Electronics and Design (ISLPED)International Symposium on Low Power Electronics and Design (ISLPED), pp. 27 - 32, September, 2013. Abstract  Download: Automated_Checkpointing.pdf (286.84 KB)
Munir, A., F. Koushanfar, H. Seudié, and A. - R. Sadeghi, "CyCAR'2013: First international academic workshop on security, privacy and dependability for cybervehicles", Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, pp. 1481 - 1482, November, 2013. Abstract  Download: CyCAR2013_ Security_Privacy_CyberVehicles.pdf (343.49 KB)
Rostami, M., F. Koushanfar, J. Rajendran, and R. Karri, "Hardware Security: Threat Models and Metrics", International Conference on Computer-Aided Deisgn, November, 2013. Abstract  Download: Hardware Security (607.13 KB)
Rostami, M., A. Juels, and F. Koushanfar, "Heart-to-Heart (H2H): Authentication for Implanted Medical Devices [updated; see the erratum]", ACM Conference on Computer and Communications Security, November, 2013. Abstract  Download: presentation.pptx (1.96 MB); paper (updated).pdf (611.27 KB); erratum.txt (167 bytes)
Majzoobi, M., J. Kong, and F. Koushanfar, "Low-power Resource Binding by Postsilicon Customization", ACM Trans. Des. Autom. Electron. Syst., vol. 18, no. 2, New York, NY, USA, ACM, pp. 26:1–26:22, 3/2013. Abstract  Download: a26-majzoobi.pdf (787.34 KB)
Majzoobi, M., and F. Koushanfar, "Post-silicon Resource Binding Customization for Low Power", ACM Transactions on Design Automation of Electronic Systems (TODAES), no. in press, 3/2013. Abstract  Download: Post-silicon Resource Binding Customization for Low Power (519.22 KB)
Kiyavash, N., F. Koushanfar, T. P. Coleman, and M. Rodrigues, "A Timing Channel Spyware for the CSMA/CA Protocol", IEEE Transactions on Information Forensics and Security, vol. 8, issue 3, pp. 477 - 487, 3/2013. Abstract  Download: Timing_Channel_Spyware.pdf (1.25 MB)
2012
Wei, S., K. Li, F. Koushanfar, and M. Potkonjak, "Provably Complete Hardware Trojan Detection Using Test Point Insertion", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November, 2012. Abstract  Download: hwtrojandetection.pdf (866.05 KB)
Koushanfar, F., S. Fazzari, C. McCants, W. Bryson, M. Sale, P. Song, and M. Potkonjak, "Can EDA Combat the Rise of Electronic Counterfeiting?", Design Automation Conference (DAC), Can EDA Combat the Rise of Electronic Counterfeiting?, IEEE, June, 2012. Abstract  Download: PDF (133.16 KB)
Mirhoseini, A., M. Potkonjak, and F. Koushanfar, "Coding-based Energy Minimization for Phase Change Memory", Design Automation Conference (DAC), June, 2012. Abstract  Download: PDF (215.57 KB)
Wei, S., A. Nahapetian, M. Nelson, F. Koushanfar, and M. Potkonjak, "Gate Characterization Using Singular Value Decomposition: Foundations and Applications", IEEE Transactions on Information Forensics and Security, vol. 7, issue 2, pp. 765-773, 4/2012. Abstract  Download: Gate_Characterization.pdf (846.21 KB)
Koushanfar, F., "Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management", IEEE Transactions on Information Forensics and Security, vol. 7, issue 1, pp. 51-63, 2/2012. Abstract  Download: Provably Secure Active IC Metering.pdf (1.22 MB)
2011
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA-based True Random Number Generation using Circuit Metastability with Adaptive Feedback Control", Workshop on Cryptographic Hardware and Embedded Systems (CHES), October, 2011. Abstract  Download: FPGA-Random (427.84 KB)
Wei, S., F. Koushanfar, and M. Potkonjak, "Integrated circuit digital rights management techniques using physical level characterization", Proceedings of the 11th annual ACM workshop on Digital rights management - DRM '11, pp. 3, October, 2011. Abstract  Download: Integrated Circuit Digital Rights Management Techniques.pdf (1.14 MB)
Koushanfar, F., and A. Mirhoseini, "Hybrid Heterogeneous Energy Supply Networks", IEEE International Symposium on Circuits and Systems (ISCAS), May, 2011. Abstract  Download: Hybrid Heterogeneous Energy Supply Networks (458.01 KB)
Majzoobi, M., G. Ghiaasi-Hafezi, F. Koushanfar, and S. Nassif, "Ultra-low Power Current-based PUF", IEEE International Symposium on Circuits and Systems (ISCAS), May, 2011. Abstract  Download: Ultra-low Power Current-based PUF (159.04 KB)
Mirhoseini, A., and F. Koushanfar, "HypoEnergy: Hybrid supercapacitor-battery power-supply optimization for Energy efficiency", Design, Automation, and Test in Europe conference (DATE), March, 2011. Abstract  Download: HypoEnergy (110.67 KB)
Dyer, E., M. Majzoobi, and F. Koushanfar, "Hybrid Spatial Modeling of Non-Stationary Process Variations", Design Automation Conference (DAC), pp. in press, June, 2011. Abstract  Download: Hybrid_DAC (604.3 KB)
Mirhoseini, A., and F. Koushanfar, "Learning to Manage Combined Energy Supply Systems", International Symposium on Low Power Electronics and Design (ISLPED), pp. in press, August, 2011. Abstract  Download: Learn (172.7 KB)
Majzoobi, M., and F. Koushanfar, "Time-Bounded Authentication of FPGAs", IEEE Transactions on Information Forensics and Security (TIFS), vol. 6, issue 3, pp. 1123-1135, 3/2011. Abstract  Download: Time-Bounded Authentication of FPGAs (981.6 KB)
Koushanfar, F., and A. Mirhoseini, "A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection", IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162 -174, 3/2011. Abstract  Download: Framework (929.9 KB)
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "FPGA-oriented Security", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: Fpga-security (1011.56 KB)
Koushanfar, F., "Hardware Metering: A Survey.", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: Metering (1.16 MB)
Ruhrmair, U., S. Devadas, and F. Koushanfar, "Security based on Physical Unclonability and Disorder", Introduction to Hardware Security and Trust: Springer, 2011. Abstract  Download: PUF_Chapter (3.53 MB)
2010
Koushanfar, F., "Hierarchical hybrid power supply networks", Design Automation Conference (DAC), June, 2010. Abstract  Download: PDF (189.33 KB)
Koushanfar, F., and Y. Alkabani, "Provably secure obfuscation of diverse watermarks for sequential circuits", International Symposium on Hardware-Oriented Security and Trust (HOST), June, 2010. Abstract  Download: PDF (242.28 KB)
Mirhoseini, A., Y. Alkabani, and F. Koushanfar, "Real time emulations: foundation and applications", Design Automation Conference (DAC), June, 2010 . Abstract  Download: PDF (101.93 KB)
Majzoobi, M., F. Koushanfar, and S. Devadas, "FPGA PUF using programmable delay lines", IEEE Workshop on Information Forensics and Security, December, 2010. Abstract  Download: PDF (211.47 KB)
Koushanfar, F., M. Majzoobi, and M. Potkonjak, "Nonparametric Combinatorial Regression for Shape Constrained Modeling", IEEE Trans. On Signal Processing, vol. 58, issue 2, pp. 626 - 637, 2/2010. Abstract  Download: PDF (1.15 MB)
Tehranipoor, M., and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection", IEEE Design & Test of Computers, 2/2010. Abstract  Download: PDF (1.05 MB)
Roy, J. A., F. Koushanfar, and I. L. Markov, "Ending Piracy of Integrated Circuits", IEEE Computer, vol. 43, pp. 30-38, 10/2010. Abstract  Download: PDF (250.95 KB)
Tehranipoor, M., and F. Koushanfar, "Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem", IEEE Design & Test of Computers, vol. 27, issue 1, pp. 8 - 9, 1/2010.  Download: PDF (69.7 KB)
2009
Majzoobi, M., F. Koushanfar, and M. Potkonjak, "Techniques for Design and Implementation of Secure Reconfigurable PUFs", ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 2, pp. 5:1–5:33, March, 2009. Abstract  Download: PDF (1.4 MB)
Nelson, M., A. Nahapetian, F. Koushanfar, and M. Potkonjak, "SVD-Based Ghost Circuitry Detection", Information Hiding (IH), pp. 221 - 234, 2009///. Abstract  Download: PDF (145.55 KB)
Alkabani, Y., and F. Koushanfar, "Consistency-based characterization for IC Trojan detection", IEEE/ACM International Conference on Computer Aided Design (ICCAD), pp. 123-127, 2009. Abstract  Download: PDF (148.79 KB)

Navigation

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer