Jeyavijayan Rajendran
Orcid: 0000-0003-3687-3746Affiliations:
- Texas A&M University, Kingsville, TX, USA
According to our database1,
Jeyavijayan Rajendran
authored at least 118 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing Cybersecurity for Industrial Control Systems: Innovations in Protecting PLC-Dependent Industrial Infrastructures.
IEEE Internet Things J., November, 2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Proceedings of the 42nd IEEE VLSI Test Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Symposium on Workload Characterization, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
ModSRAM: Algorithm-Hardware Co-Design for Large Number Modular Multiplication in SRAM.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
2023
Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
2022
IEEE Trans. Emerg. Top. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Guest Editors' Introduction: Special Issue on 2021 Top Picks in Hardware and Embedded Security.
IEEE Des. Test, 2022
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges.
Proceedings of the 19th International SoC Design Conference, 2022
Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD Tool.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021
2020
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
CoRR, 2020
Proceedings of the IEEE International Test Conference, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Springer, ISBN: 978-3-030-15333-5, 2020
2019
Proceedings of the 37th IEEE VLSI Test Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the IEEE International Test Conference, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019
2018
IEEE Trans. Very Large Scale Integr. Syst., 2018
CoRR, 2018
Proceedings of the 36th IEEE VLSI Test Symposium, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 35th IEEE VLSI Test Symposium, 2017
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017
2016
Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach.
IEEE Trans. Very Large Scale Integr. Syst., 2016
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2016
Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016
Hardware-based attacks to compromise the cryptographic security of an election system.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016
Proceedings of the 35th International Conference on Computer-Aided Design, 2016
Security of neuromorphic computing: thwarting learning attacks using memristor's obsolescence effect.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors.
IEEE Trans. Computers, 2015
Proc. IEEE, 2015
Detecting malicious modifications of data in third-party intellectual property cores.
Proceedings of the 52nd Annual Design Automation Conference, 2015
2014
Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security- Driven Task Scheduling.
IEEE Trans. Emerg. Top. Comput., 2014
Proceedings of the 32nd IEEE VLSI Test Symposium, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2014
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
2013
Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach.
IEEE Des. Test, 2013
A study on the effectiveness of Trojan detection techniques using a red team blue team approach.
Proceedings of the 31st IEEE VLSI Test Symposium, 2013
Proceedings of the 26th International Conference on VLSI Design and 12th International Conference on Embedded Systems, 2013
Proceedings of the 2013 IEEE International Test Conference, 2013
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013
Proceedings of the 18th IEEE European Test Symposium, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013
2012
Stochastic Gradient Descent Inspired Training Technique for a CMOS/Nano Memristive Trainable Threshold Gate Array.
IEEE Trans. Circuits Syst. I Regul. Pap., 2012
Proc. IEEE, 2012
ACM J. Emerg. Technol. Comput. Syst., 2012
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012
Proceedings of the 30th International IEEE Conference on Computer Design, 2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
2011
Computer, 2011
Proceedings of the 29th IEEE VLSI Test Symposium, 2011
Proceedings of the VLSI Design 2011: 24th International Conference on VLSI Design, 2011
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
Proceedings of the IEEE 29th International Conference on Computer Design, 2011
2010
Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers.
Proceedings of the HOST 2010, 2010