\n \n \n
\n
\n \n 2025\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Mitigating Electro-Optical Frequency Mapping Attacks on Logic-Locked Integrated Circuits.\n \n \n \n \n\n\n \n Wojtal, T.; Paul, R.; and Zuzak, M.\n\n\n \n\n\n\n
Journal of Hardware and Systems Security (JHASS),1–11. 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{wojtal2025mitigating,\n title={Mitigating Electro-Optical Frequency Mapping Attacks on Logic-Locked Integrated Circuits},\n author={Wojtal, Thomas and Paul, Robi and Zuzak, Michael},\n journal={Journal of Hardware and Systems Security (JHASS)},\n pages={1--11},\n year={2025},\n URL={https://mzuzak.github.io/files/adjoining_gate_jhass.pdf},\n publisher={Springer}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis.\n \n \n \n \n\n\n \n Paul, R.; and Zuzak, M.\n\n\n \n\n\n\n In
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2025. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{paul2025michscan,\n title={Michscan: Black-Box Neural Network Integrity Checking at Runtime Through Power Analysis},\n author={Paul, Robi and Zuzak, Michael},\n booktitle={Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},\n year={2025},\n URL={https://mzuzak.github.io/files/michscan_host.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Hardware Anomaly Detection in Microcontrollers Through Watchdog-Assisted Property Enforcement.\n \n \n \n \n\n\n \n Melnyk, M.; Thomas, J.; Wandera, M.; Koyatan Chathoth, A.; and Zuzak, M.\n\n\n \n\n\n\n
IEEE International Conference on Consumer Electronics (ICCE). 2025.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{melnyk2025hwanomaly,\n title={Hardware Anomaly Detection in Microcontrollers Through Watchdog-Assisted Property Enforcement},\n author={Melnyk, Maksym and Thomas, Jacob and Wandera, Max and Koyatan Chathoth, Ajesh and Zuzak, Michael},\n journal={IEEE International Conference on Consumer Electronics (ICCE)},\n URL={https://mzuzak.github.io/files/hw_anomaly_icce.pdf},\n year={2025}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2024\n \n \n (7)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs.\n \n \n \n \n\n\n \n Fayyazi, R.; Trueba, S. H.; Zuzak, M.; and Yang, S. J.\n\n\n \n\n\n\n
arXiv preprint arXiv:2410.17406. 2024.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{fayyazi2024proverag,\n title={ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs},\n author={Fayyazi, Reza and Trueba, Stella Hoyos and Zuzak, Michael and Yang, Shanchieh Jay},\n journal={arXiv preprint arXiv:2410.17406},\n URL={https://mzuzak.github.io/files/proverag_arxiv.pdf},\n year={2024}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n ML-Assisted Attack Detection on NoC-Based Many-Cores Through On-Chip Traffic Monitoring.\n \n \n \n \n\n\n \n Galimberti, A.; Purkait, R.; Islam, N.; Ganguly, A.; Indovina, M.; Zuzak, M.; Pudukotai Dinakarrao, S.; Zoni, D.; and Fornaciari, W.\n\n\n \n\n\n\n In
Proceedings of the IEEE International Conference on Electronics Circuits and Systems (ICECS), 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{galimberti2024icecs,\n title={ML-Assisted Attack Detection on NoC-Based Many-Cores Through On-Chip Traffic Monitoring},\n author={Galimberti, Andrea and Purkait, Rohan and Islam, Nahian and Ganguly, Amlan, and Indovina, Mark and Zuzak, Michael and Pudukotai Dinakarrao, SM and Zoni, Davide and Fornaciari, William},\n booktitle={Proceedings of the IEEE International Conference on Electronics Circuits and Systems (ICECS)},\n year={2024},\n URL={https://mzuzak.github.io/files/NoC_traffic_monitor_ICECS24.pdf}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality.\n \n \n \n \n\n\n \n McDaniel, I.; Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n
ACM Transactions on Design Automation of Electronic Systems (TODAES). 2024.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{mcdaniel2024removal,\n title={Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality},\n author={McDaniel, Isaac and Zuzak, Michael and Srivastava, Ankur},\n journal={ACM Transactions on Design Automation of Electronic Systems (TODAES)},\n year={2024},\n URL={https://mzuzak.github.io/files/sat_hard_removal_todaes.pdf},\n publisher={ACM New York, NY}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Low Overhead Logic Locking for System-Level Security: A Design Space Modeling Approach.\n \n \n \n \n\n\n \n Lam, L.; Melnyk, M.; and Zuzak, M.\n\n\n \n\n\n\n In
Proceedings of the International Symposium on Low Power Electronic Design (ISLPED), 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2024dsm,\nauthor = {Lam, Long and Melnyk, Maksym and Zuzak, Michael},\ntitle = {Low Overhead Logic Locking for System-Level Security: A Design Space Modeling Approach},\nyear = {2024},\nURL={https://mzuzak.github.io/files/ll_dsm_islped.pdf},\nbooktitle = {Proceedings of the International Symposium on Low Power Electronic Design (ISLPED)}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection.\n \n \n \n \n\n\n \n Cheng, Z.; Choi, H.; Feng, S.; Liang, J. C.; Tao, G.; Liu, D.; Zuzak, M.; and Zhang, X.\n\n\n \n\n\n\n In
The Twelfth International Conference on Learning Representations (ICLR), 2024. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{cheng2024fusion,\n title={Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection},\n author={Cheng, Zhiyuan and Choi, Hongjun and Feng, Shiwei and Liang, James Chenhao and Tao, Guanhong and Liu, Dongfang and Zuzak, Michael and Zhang, Xiangyu},\n booktitle={The Twelfth International Conference on Learning Representations (ICLR)},\n URL={https://mzuzak.github.io/files/fusion_iclr.pdf},\n year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Complementing Vehicle Trajectories Using Two Camera Viewpoints.\n \n \n \n \n\n\n \n Nakano, K.; Nakazawa, M.; and Zuzak, M.\n\n\n \n\n\n\n
IEEE International Conference on Consumer Electronics (ICCE). 2024.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{zuzak2024complementing,\n title={Complementing Vehicle Trajectories Using Two Camera Viewpoints},\n author={Nakano, Katsuaki and Nakazawa, Minoru and Zuzak, Michael},\n journal={IEEE International Conference on Consumer Electronics (ICCE)},\n URL={https://mzuzak.github.io/files/multiview_ICCE.pdf},\n year={2024}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2023\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Security-Aware Resource Binding to Enhance Logic Obfuscation.\n \n \n \n \n\n\n \n Zuzak, M.; Liu, Y.; and Srivastava, A.\n\n\n \n\n\n\n
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2023.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{zuzak2023binding,\n title={Security-Aware Resource Binding to Enhance Logic Obfuscation},\n author={Zuzak, Michael and Liu, Yuntao and Srivastava, Ankur},\n journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},\n URL={https://mzuzak.github.io/files/secure_binding_TCAD.pdf},\n year={2023}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving.\n \n \n \n \n\n\n \n Cheng, Z.; Choi, H.; Liang, J.; Feng, S.; Tao, G.; Liu, D.; Zuzak, M.; and Zhang, X.\n\n\n \n\n\n\n In
arXiv preprint arXiv:2304.14614, 2023. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2023fusion,\n title={Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving},\n author={Cheng, Zhiyuan and Choi, Hongjun and Liang, James and Feng, Shiwei and Tao, Guanhong and Liu, Dongfang and Zuzak, Michael and Zhang, Xiangyu},\n URL={https://mzuzak.github.io/files/adv_fusion.pdf},\n booktitle={arXiv preprint arXiv:2304.14614},\n year={2023}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators.\n \n \n \n \n\n\n \n Xu, H.; Liu, D.; Merkel, C.; and Zuzak, M.\n\n\n \n\n\n\n In
Great Lakes Symposium on VLSI (GLSVLSI), pages 1–6, 2023. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2023trojan,\n title={Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators},\n author={Xu, Hongye and Liu, Dongfang and Merkel, Cory and Zuzak, Michael},\n booktitle={Great Lakes Symposium on VLSI (GLSVLSI)},\n pages={1--6},\n year={2023},\n URL={https://mzuzak.github.io/files/Logic_Locking_for_Neural_Trojans.pdf},\n organization={ACM}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Low Overhead System-Level Obfuscation through Hardware Resource Sharing.\n \n \n \n \n\n\n \n Xing, D.; Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
International Symposium on Quality Electronic Design (ISQED), pages 1–8, 2023. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2023sharing,\n title={Low Overhead System-Level Obfuscation through Hardware Resource Sharing},\n author={Xing, Daniel and Zuzak, Michael and Srivastava, Ankur},\n booktitle={International Symposium on Quality Electronic Design (ISQED)},\n pages={1--8},\n year={2023},\n URL={https://mzuzak.github.io/files/shared_locking_ISQED.pdf},\n organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2022\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation.\n \n \n \n \n\n\n \n McDaniel, I.; Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
IEEE International Conference on Computer Design (ICCD), pages 1–8, 2022. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2022sensitization,\n title={A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation},\n author={McDaniel, Isaac and Zuzak, Michael and Srivastava, Ankur},\n booktitle={IEEE International Conference on Computer Design (ICCD)},\n pages={1--8},\n year={2022},\n URL={https://mzuzak.github.io/files/BB_Attack_SATHard.pdf},\n organization={IEEE}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Combined Logical and Physical Attack on Logic Obfuscation.\n \n \n \n \n\n\n \n Zuzak, M.; Liu, Y.; McDaniel, I.; and Srivastava, A.\n\n\n \n\n\n\n In
2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 1–8, 2022. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2022clap,\n title={A Combined Logical and Physical Attack on Logic Obfuscation},\n author={Zuzak, Michael and Liu, Yuntao and McDaniel, Isaac and Srivastava, Ankur},\n booktitle={2022 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)},\n pages={1--8},\n year={2022},\n URL={https://mzuzak.github.io/files/CLAP_Attack.pdf},\n organization={ACM}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks.\n \n \n \n \n\n\n \n Liu, Y.; Zuzak, M.; Xing, D.; McDaniel, I.; Mittu, P.; Ozbay, O.; Akib, A.; and Srivastava, A.\n\n\n \n\n\n\n In
2022 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS), 2022. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{liu2022survey,\n title={A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks},\n author={Liu, Yuntao and Zuzak, Michael and Xing, Daniel and McDaniel, Isaac and Mittu, Priya and Ozbay, Olsan and Akib, Abir and Srivastava, Ankur},\n booktitle={2022 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS)},\n URL={https://mzuzak.github.io/files/dnn_side_channel_aicas.pdf},\n year={2022}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Neural Trojans.\n \n \n \n \n\n\n \n Liu, Y.; Mondal, A.; Chakraborty, A.; Zuzak, M.; Jacobsen, N.; Xing, D.; and Srivastava, A.\n\n\n \n\n\n\n Encyclopedia of Cryptography, Security and Privacy. Jajodia, S.; Samarati, P.; and Yung, M., editor(s). Springer Berlin Heidelberg, 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inbook{Liu2022,\nchapter="Neural Trojans",\ntitle="Encyclopedia of Cryptography, Security and Privacy",\nauthor="Liu, Yuntao and Mondal, Ankit and Chakraborty, Abhishek and Zuzak, Michael and Jacobsen, Nina and Xing, Daniel and Srivastava, Ankur",\neditor="Jajodia, Sushil and Samarati, Pierangela and Yung, Moti",\nyear="2022",\npublisher="Springer Berlin Heidelberg",\nURL="https://doi.org/10.1007/978-3-642-27739-9_1654-1"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries.\n \n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n Ph.D. Thesis, University of Maryland, College Park, 2022.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@phdthesis{zuzak2022designing,\n title={Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries},\n author={Zuzak, Michael},\n year={2022},\n URL={https://mzuzak.github.io/files/phd_dissertation_zuzak.pdf},\n school={University of Maryland, College Park}\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Evaluating the Security of Logic-Locked Probabilistic Circuits.\n \n \n \n \n\n\n \n Zuzak, M.; Mondal, A.; and Srivastava, A.\n\n\n \n\n\n\n
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{zuzak2021evaluating,\n title={Evaluating the Security of Logic-Locked Probabilistic Circuits},\n author={Zuzak, Michael and Mondal, Ankit and Srivastava, Ankur},\n journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},\n URL={https://mzuzak.github.io/files/herk_tcad.pdf},\n year={2021}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Resource Binding Approach to Logic Obfuscation.\n \n \n \n \n\n\n \n Zuzak, M.; Liu, Y.; and Srivastava, A.\n\n\n \n\n\n\n In
2021 58th ACM/IEEE Design Automation Conference (DAC), pages 235–240, 2021. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2021resource,\n title={A Resource Binding Approach to Logic Obfuscation},\n author={Zuzak, Michael and Liu, Yuntao and Srivastava, Ankur},\n booktitle={2021 58th ACM/IEEE Design Automation Conference (DAC)},\n pages={235--240},\n URL={https://mzuzak.github.io/files/hls_dac.pdf},\n year={2021}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Robust and Attack Resilient Logic Locking with a High Application-Level Impact.\n \n \n \n \n\n\n \n Liu, Y.; Zuzak, M.; Xie, Y.; Chakraborty, A.; and Srivastava, A.\n\n\n \n\n\n\n
ACM Journal on Emerging Technologies in Computing Systems. 2021.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{liu2021robust,\n title={Robust and Attack Resilient Logic Locking with a High Application-Level Impact},\n author={Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava},\n journal={ACM Journal on Emerging Technologies in Computing Systems},\n URL={https://mzuzak.github.io/files/sas_jetc.pdf},\n year={2021}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2020\n \n \n (7)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design.\n \n \n \n \n\n\n \n Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
International Symposium on Memory Systems, 2020. ACM\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2020obfusgem,\n title={ObfusGEM: Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design},\n author={Zuzak, Michael and Srivastava, Ankur},\n booktitle={International Symposium on Memory Systems},\n URL={https://mzuzak.github.io/files/obfusgem_memsys.pdf},\n year={2020},\n publisher={ACM}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Provable Detection and Location of Hardware Trojans with Linear Hybrid Cellular Automata.\n \n \n \n\n\n \n Zuzak, M.; Fitelson, M.; Montano, S.; and Srivastava, A.\n\n\n \n\n\n\n In
Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2020. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{lhca2020zuzak,\n title={Provable Detection and Location of Hardware Trojans with Linear Hybrid Cellular Automata},\n author={Zuzak, Michael and Fitelson, Michael and Montano, Sergio and Srivastava, Ankur},\n year={2020},\n booktitle={Government Microcircuit Applications and Critical Technology Conference (GOMACTech)}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A survey on neural trojans.\n \n \n \n \n\n\n \n Liu, Y.; Mondal, A.; Chakraborty, A.; Zuzak, M.; Jacobsen, N.; Xing, D.; and Srivastava, A.\n\n\n \n\n\n\n In
2020 21st International Symposium on Quality Electronic Design (ISQED), pages 33–39, 2020. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{liu2020survey,\n title={A survey on neural trojans},\n author={Liu, Yuntao and Mondal, Ankit and Chakraborty, Abhishek and Zuzak, Michael and Jacobsen, Nina and Xing, Daniel and Srivastava, Ankur},\n booktitle={2020 21st International Symposium on Quality Electronic Design (ISQED)},\n pages={33--39},\n URL={https://mzuzak.github.io/files/neural_trojan_isqed.pdf},\n year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n StatSAT: A Boolean Satisfiability based Attack on Logic-Locked Probabilistic Circuits.\n \n \n \n \n\n\n \n Mondal, A.; Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
2020 57th ACM/IEEE Design Automation Conference (DAC), pages 1–6, 2020. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{mondal2020statsat,\n title={StatSAT: A Boolean Satisfiability based Attack on Logic-Locked Probabilistic Circuits},\n author={Mondal, Ankit and Zuzak, Michael and Srivastava, Ankur},\n booktitle={2020 57th ACM/IEEE Design Automation Conference (DAC)},\n pages={1--6},\n URL={https://mzuzak.github.io/files/statsat_dac.pdf},\n year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Strong Anti-SAT: Secure and Effective Logic Locking.\n \n \n \n \n\n\n \n Liu, Y.; Zuzak, M.; Xie, Y.; Chakraborty, A.; and Srivastava, A.\n\n\n \n\n\n\n In
International Symposium on Quality Electronic Design (ISQED), 2020. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{liu2020strong,\n title={Strong Anti-SAT: Secure and Effective Logic Locking.},\n author={Liu, Yuntao and Zuzak, Michael and Xie, Yang and Chakraborty, Abhishek and Srivastava, Ankur},\n booktitle={International Symposium on Quality Electronic Design (ISQED)},\n URL={https://mzuzak.github.io/files/sas_isqed.pdf},\n year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Trace Logic Locking: Improving the Parametric Space of Logic Locking.\n \n \n \n \n\n\n \n Zuzak, M.; Liu, Y.; and Srivastava, A.\n\n\n \n\n\n\n
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{zuzak2020trace,\n title={Trace Logic Locking: Improving the Parametric Space of Logic Locking},\n author={Zuzak, Michael and Liu, Yuntao and Srivastava, Ankur},\n journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},\n URL={https://mzuzak.github.io/files/tll_tcad.pdf},\n year={2020}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Benchmarking at the frontier of hardware security: Lessons from logic locking.\n \n \n \n \n\n\n \n Tan, B.; Karri, R.; Limaye, N.; Sengupta, A.; Sinanoglu, O.; Rahman, M. M.; Bhunia, S.; Duvalsaint, D.; Rezaei, A.; Shen, Y.; and others\n\n\n \n\n\n\n
arXiv preprint arXiv:2006.06806. 2020.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{tan2020benchmarking,\n title={Benchmarking at the frontier of hardware security: Lessons from logic locking},\n author={Tan, Benjamin and Karri, Ramesh and Limaye, Nimisha and Sengupta, Abhrajit and Sinanoglu, Ozgur and Rahman, Md Moshiur and Bhunia, Swarup and Duvalsaint, Danielle and Rezaei, Amin and Shen, Yuanqi and others},\n URL={https://mzuzak.github.io/files/ll_bench_tr.pdf},\n journal={arXiv preprint arXiv:2006.06806},\n year={2020}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Memory Locking: An Automated Approach to Processor Design Obfuscation.\n \n \n \n \n\n\n \n Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 541–546, 2019. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2019memory,\n title={Memory Locking: An Automated Approach to Processor Design Obfuscation},\n author={Zuzak, Michael and Srivastava, Ankur},\n booktitle={2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)},\n pages={541--546},\n URL={https://mzuzak.github.io/files/memory_locking_isvlsi.pdf},\n year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Keynote: A Disquisition on Logic Locking.\n \n \n \n \n\n\n \n Chakraborty, A.; Jayasankaran, N. G.; Liu, Y.; Rajendran, J.; Sinanoglu, O.; Srivastava, A.; Xie, Y.; Yasin, M.; and Zuzak, M.\n\n\n \n\n\n\n
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{chakraborty2019keynote,\n title={Keynote: A Disquisition on Logic Locking},\n author={Chakraborty, Abhishek and Jayasankaran, Nithyashankari Gummidipoondi and Liu, Yuntao and Rajendran, Jeyavijayan and Sinanoglu, Ozgur and Srivastava, Ankur and Xie, Yang and Yasin, Muhammad and Zuzak, Michael},\n journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},\n URL={https://mzuzak.github.io/files/ll_survey_tcad.pdf},\n year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Exploiting Nested Mimd-Simd Parallelization for Heterogeneous Microprocessors.\n \n \n \n \n\n\n \n Gerzhoy, D.; Sun, X.; Zuzak, M.; and Yeung, D.\n\n\n \n\n\n\n
ACM Transactions on Architecture and Code Optimization (TACO), 16(4): 1–27. 2019.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{gerzhoy2019nested,\n title={Exploiting Nested Mimd-Simd Parallelization for Heterogeneous Microprocessors},\n author={Gerzhoy, Daniel and Sun, Xiaowu and Zuzak, Michael and Yeung, Donald},\n journal={ACM Transactions on Architecture and Code Optimization (TACO)},\n volume={16},\n number={4},\n pages={1--27},\n URL={https://mzuzak.github.io/files/multigrain_taco.pdf},\n year={2019}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2018\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Hmctherm: a cycle-accurate hmc simulator integrated with detailed power and thermal simulation.\n \n \n \n \n\n\n \n Yang, Z.; Zuzak, M.; and Srivastava, A.\n\n\n \n\n\n\n In
Proceedings of the International Symposium on Memory Systems, pages 209–117, 2018. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{yang2018hmctherm,\n title={Hmctherm: a cycle-accurate hmc simulator integrated with detailed power and thermal simulation},\n author={Yang, Zhiyuan and Zuzak, Michael and Srivastava, Ankur},\n booktitle={Proceedings of the International Symposium on Memory Systems},\n URL={https://mzuzak.github.io/files/hmctherm_memsys.pdf},\n pages={209--117},\n year={2018}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2016\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Exploiting multi-loop parallelism on heterogeneous microprocessors.\n \n \n \n \n\n\n \n Zuzak, M.; and Yeung, D.\n\n\n \n\n\n\n In
Proceedings of the International Workshop on Programmability and Architectures for Heterogeneous Multicores (MULTIPROG), 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zuzak2016exploiting,\n title={Exploiting multi-loop parallelism on heterogeneous microprocessors},\n author={Zuzak, Michael and Yeung, Donald},\n booktitle={Proceedings of the International Workshop on Programmability and Architectures for Heterogeneous Multicores (MULTIPROG)},\n URL={https://mzuzak.github.io/files/multigrain_multiprog.pdf},\n year={2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Exploiting Nested Parallelism on Heterogeneous Processors.\n \n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2016.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@msthesis{zuzak2016exploiting,\n title={Exploiting Nested Parallelism on Heterogeneous Processors},\n author={Zuzak, Michael},\n URL={https://mzuzak.github.io/files/ms_thesis_zuzak.pdf},\n year={2016},\n school={University of Maryland, College Park}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n