var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fmzuzak.github.io%2Ftalks%2Ftalks.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fmzuzak.github.io%2Ftalks%2Ftalks.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fmzuzak.github.io%2Ftalks%2Ftalks.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Designing Obfuscated ICs for System-Wide Security during IC Manufacture and Test .\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2023.\n Great Lakes Security Day (GLSD)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t8,\ntitle= {Designing Obfuscated ICs for System-Wide Security during IC Manufacture and Test\n},\nauthor = {Zuzak, Michael},\nyear = {2023},\nnote= {Great Lakes Security Day (GLSD)}\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Hardware: The Foundation of Security.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2022.\n RIT Electrical and Computer Engineering Research Seminar\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t7,\ntitle= {Hardware: The Foundation of Security},\nauthor = {Zuzak, Michael},\nyear = {2022},\nnote= {RIT Electrical and Computer Engineering Research Seminar}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n New Horizons in Hardware Security.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2021.\n Rochester Institute of Technology\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t1,\ntitle= {New Horizons in Hardware Security},\nauthor = {Zuzak, Michael},\nyear = {2021},\nnote= {Rochester Institute of Technology}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Designing Obfuscated Systems for Enhanced Hardware-Oriented Security.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2021.\n SIGDA Design Automation Conference (DAC) PhD Forum\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t2,\ntitle= {Designing Obfuscated Systems for Enhanced Hardware-Oriented Security},\nauthor = {Zuzak, Michael},\nyear = {2021},\nnote= {SIGDA Design Automation Conference (DAC) PhD Forum}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Securing Hardware in a Globalized Supply-Chain.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2020.\n ARCS Scholar Reception\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t3,\ntitle= {Securing Hardware in a Globalized Supply-Chain},\nauthor = {Zuzak, Michael},\nyear = {2020},\nnote= {ARCS Scholar Reception}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Building Functional ICs with Approximate Keys.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2019.\n CSAW'19 Logic Locking Conquest Finals\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t4,\ntitle= {Building Functional ICs with Approximate Keys},\nauthor = {Zuzak, Michael},\nyear = {2019},\nnote= {CSAW'19 Logic Locking Conquest Finals}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards the Design and Fabrication of Secure Integrated Circuits.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2019.\n ARCS Scholar Reception - National Academy of Engineering\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t5,\ntitle= {Towards the Design and Fabrication of Secure Integrated Circuits},\nauthor = {Zuzak, Michael},\nyear = {2019},\nnote= {ARCS Scholar Reception - National Academy of Engineering}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Memory Locking: An Automated Approach to Processor Design Obfuscation.\n \n \n \n\n\n \n Zuzak, M.\n\n\n \n\n\n\n 2019.\n Design Automation Conference (DAC)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@unpublished{t6,\ntitle= {Memory Locking: An Automated Approach to Processor Design Obfuscation},\nauthor = {Zuzak, Michael},\nyear = {2019},\nnote= {Design Automation Conference (DAC)}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);