Michail Maniatakos
Orcid: 0000-0001-6899-0651Affiliations:
- New York University Abu Dhabi, UAE
- Yale University, New Haven, CT, USA (PhD 2012)
According to our database1,
Michail Maniatakos
authored at least 138 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption.
ACM Trans. Embed. Comput. Syst., July, 2024
A Subspace Projective Clustering Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks.
IEEE Trans. Artif. Intell., July, 2024
Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., June, 2024
LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots.
CoRR, 2024
IEEE Access, 2024
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024
Optimizing Ciphertext Management for Faster Fully Homomorphic Encryption Computation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Detecting Backdoor Attacks in Black-Box Neural Networks through Hardware Performance Counters.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
AdvHunter: Detecting Adversarial Perturbations in Black-Box Neural Networks through Hardware Performance Counters.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems.
Proceedings of the Australian & New Zealand Control Conference, 2024
2023
IEEE Secur. Priv., 2023
IACR Cryptol. ePrint Arch., 2023
HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis.
CoRR, 2023
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses.
CoRR, 2023
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems.
CoRR, 2023
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023
TRAPDOOR: Repurposing neural network backdoors to detect dataset bias in machine learning-based genomic analysis.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Privacy-Preserving Machine Learning for Healthcare: Open Challenges and Future Perspectives.
Proceedings of the Trustworthy Machine Learning for Healthcare, 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics.
IEEE Trans. Biom. Behav. Identity Sci., 2022
HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research.
IEEE Des. Test, 2022
PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations.
CoRR, 2022
FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing.
CoRR, 2022
CoRR, 2022
PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks.
CoRR, 2022
ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages.
CoRR, 2022
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
2021
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021
IACR Cryptol. ePrint Arch., 2021
TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis.
CoRR, 2021
Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021
Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption.
IEEE Access, 2021
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
A Trigger Exploration Method for Backdoor Attacks on Deep Learning-Based Traffic Control Systems.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021
2020
IEEE Des. Test, 2020
IEEE Des. Test, 2020
FaceHack: Triggering backdoored facial recognition systems using facial characteristics.
CoRR, 2020
Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems.
CoRR, 2020
Proceedings of the 38th IEEE VLSI Test Symposium, 2020
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2020
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020
Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
J. Hardw. Syst. Secur., 2019
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
FLEP-SGS<sup>2</sup>: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems.
Proceedings of the 25th IEEE International Symposium on On-Line Testing and Robust System Design, 2019
Proceedings of the 25th IEEE International Symposium on On-Line Testing and Robust System Design, 2019
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019
2018
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation.
IEEE Trans. Computers, 2018
IACR Cryptol. ePrint Arch., 2018
IEEE Embed. Syst. Lett., 2018
IEEE Embed. Syst. Lett., 2018
IEEE Comput. Archit. Lett., 2018
Proceedings of the VLSI-SoC: Design and Engineering of Electronics Systems Based on New Computing Paradigms, 2018
Proceedings of the IFIP/IEEE International Conference on Very Large Scale Integration, 2018
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
2017
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment.
IET Cyper-Phys. Syst.: Theory & Appl., 2017
IEEE Des. Test, 2017
IEEE Des. Test, 2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited.
Proceedings of the 54th Annual Design Automation Conference, 2017
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
IEEE Trans. Multi Scale Comput. Syst., 2016
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016
Proceedings of the 17th Latin-American Test Symposium, 2016
Machine learning-based defense against process-aware attacks on Industrial Control Systems.
Proceedings of the 2016 IEEE International Test Conference, 2016
Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
2015
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving.
IEEE Trans. Very Large Scale Integr. Syst., 2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
IEEE Trans. Computers, 2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations.
Proceedings of the 25th International Workshop on Power and Timing Modeling, 2015
Proceedings of the 2015 IEEE International Test Conference, 2015
Proceedings of the 10th International Design & Test Symposium, 2015
ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015
Proceedings of the 20th IEEE European Test Symposium, 2015
Privacy-preserving functional IP verification utilizing fully homomorphic encryption.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation.
IEEE Trans. Emerg. Top. Comput., 2014
Proceedings of the 32nd IEEE VLSI Test Symposium, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the 10th European Workshop on Microelectronics Education (EWME), 2014
Proceedings of the 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
2013
IEEE Trans. Computers, 2013
J. Electron. Test., 2013
Proceedings of the 31st IEEE VLSI Test Symposium, 2013
Proceedings of the 31st IEEE VLSI Test Symposium, 2013
Proceedings of the 31st IEEE VLSI Test Symposium, 2013
Investigating the Application of One Instruction Set Computing for Encrypted Data Computation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013
Privilege escalation attack through address space identifier corruption in untrusted modern processors.
Proceedings of the 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
2012
Global Signal Vulnerability (GSV) Analysis for Selective State Element Hardening in Modern Microprocessors.
IEEE Trans. Computers, 2012
Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors.
Proceedings of the 2012 IEEE International Test Conference, 2012
Proceedings of the 30th International IEEE Conference on Computer Design, 2012
2011
Instruction-Level Impact Analysis of Low-Level Faults in a Modern Microprocessor Controller.
IEEE Trans. Computers, 2011
Workload-Cognizant Concurrent Error Detection in the Scheduler of a Modern Microprocessor.
IEEE Trans. Computers, 2011
Proceedings of the 29th IEEE VLSI Test Symposium, 2011
Proceedings of the 16th European Test Symposium, 2011
2010
Workload-driven selective hardening of control state elements in modern microprocessors.
Proceedings of the 28th IEEE VLSI Test Symposium, 2010
2009
Instruction-Level Impact Comparison of RT- vs. Gate-Level Faults in a Modern Microprocessor Controller.
Proceedings of the 27th IEEE VLSI Test Symposium, 2009
Proceedings of the 27th International Conference on Computer Design, 2009
2008
IEEE Trans. Very Large Scale Integr. Syst., 2008
On the Correlation between Controller Faults and Instruction-Level Errors in Modern Microprocessors.
Proceedings of the 2008 IEEE International Test Conference, 2008
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008
Design and Evaluation of a Timestamp-Based Concurrent Error Detection Method (CED) in a Modern Microprocessor Controller.
Proceedings of the 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 2008