Book

  1. Yier Jin and Gang Qu, "Hardware Security," Publishing House of Electronics Industry, 2021

Book Chapters

  1. Charles A. Kamhoua Laurent L. Njilla Alexander Kott Sachin Shetty (Editors), "Modeling and Design of Secure Internet of Things," Wiley, 2020 (Orlando Arias, Fahim Rahman, Mark Tehranipoor, Yier Jin, "Chapter 19. IoT Device Attestation")
  2. Yuan Cao and Chip Hong Chang (Editors), "Frontiers in Hardware Security and Trust: Theory, Design and Practice," IET, 2020 (Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin, "Chapter 5. Formal Veri.cation for SoC Security")
  3. Per Larsen, and Ahmad-Reza Sadeghi (Editors), "The Continuing Arms Race - Code-Reuse Attacks and defenses," Morgan & Claypool, 2018 (Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, and Lucas Davi, "Chapter 7. Hardware Control Flow Integrity") [PDF]
  4. Hiroto Yasuura, Chong-Min Kyung, Yongpan Liu, and Youn-Long Lin, "Smart Sensors at the IoT Frontier," Springer, 2017 (Orlando Arias, Kelvin Ly, and Yier Jin, "Security and Privacy in IoT Era") [PDF]
  5. Swarup Bhunia, Sandip Ray, and Susmita Sur-Kolay (Editors), "Fundamentals of IP and SoC Security - Design, Verification and Debug," Springer, 2017 (Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Chapter 10. IP Trust Validation Using Proof-Carrying Hardware") [PDF]
  6. Prabhat Mishra, Swarup Bhunia, and Mark Tehranipoor (Editors), "Hardware IP Security and Trust," Springer, 2017 (Raj Gautam Dutta, Xiaolong Guo and Yier Jin, "Chapter 4. IP Trust: The Problem and Design/Validation-Based Solution") [PDF]
  7. Chip-Hong Chang, Miodrag Potkonjak (Editors), "Secure System Design and Trustable Computing", Springer, 2016 (Yier Jin, Dimitry Maliuk, Yiorgos Makris, "Chapter 7. Hardware Trojan Detection in Analog/RF Integrated Circuits") [PDF]
  8. Mark Tehranipoor, Cliff Wang (Editors), "Introduction to Hardware Security and Trust," Springer, 2011 (Yier Jin, Eric Love, Yiorgos Makris, "Chapter 16. Design for Hardware Trust") [PDF]

Journal Publications

  1. [TITS '22] Raj Gautam Dutta, Yaodan Hu, Feng Yu, Teng Zhang, and Yier Jin, "Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment," IEEE Transactions on Intelligent Transportation Systems (TITS), vol. 23, no. 4, pp. 3418-3429, 2022.
  2. [JETC '22] Max Panoff, Honggang Yu, Haoqi Shan, and Yier Jin, "A Review and Comparison on AI Enhanced Side Channel Analysis," ACM Journal on Emerging Technologies in Computing Systems (JETC), 2022. (early access)
  3. [TIFS '22] Kejun Chen, Orlando Arias, Qingxu Deng, Daniela Oliveira, Xiaolong Guo, and Yier Jin, "FineDIFT: Fine-Grained Dynamic Information Flow Tracking for DataFlow Integrity using Coprocessor," IEEE Transactions on Information Forensics and Security (TIFS), vol. 17, pp. 559-573, 2022.
  4. [D&T '22] Jiaji He, Xiaolong Guo, Mark Tehranipoor, Apostol Vassilev, and Yier Jin, "EM Side Channels in Hardware Security: Attacks and Defenses," IEEE Design & Test on Computers (D&T), vol. 39, no. 2, pp. 100-111, 2022.
  5. [JSSC '21] Yen-Cheng Chiu, Tung-Cheng Chang, Chun-Ying Lee, Je-Min Hung, Kuang-Tang Chang, Cheng-Xin Xue, Ssu-Yen Wu, Hui-Yao Kao, Peng Chen, Hsiao-Yu Huang, Shih-Hsih Teng, Chieh-Pu Lo, Yi-Chun Shih, Yu-Der Chih, Tsung-Yung Jonathan Chang, Yier Jin, Meng-Fan Chang, “A 22nm 1Mb 1024b-Read Data-Protected STT-MRAM Macro with Near-Memory Shift-and-Rotate Functionality and 42.6GB/s Read Bandwidth for Security-Aware Mobile Device,” IEEE Journal of Solid-State Circuits (JSSC), 2021. (early access)
  6. [TIFS '21] Kaveh Shamsi and Yier Jin, “In Praise of Exact-Functional-Secrecy in Circuit Locking,” IEEE Transactions on Information Forensics and Security (TIFS), 2021. [PDF]
  7. [TCAD '21] Jiaji He, Haocheng Ma, Max Panoff, Hanning Wang, Yiqiang Zhao, Leibo Liu, Xiaolong Guo, and Yier Jin, “Security Oriented Design Framework for EM SideChannel Protection in RTL Implementations,” IEEE Transactions on ComputerAided Design of Integrated Circuits and Systems (TCAD), 2021. (to appear)
  8. [CSUR '21] Christopher Brant, Prakash Shrestha, Benjamin Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah Crandall, and Daniela Oliveira, “Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking,” ACM Computing Surveys (CSUR), 2021. (to appear)
  9. [TIFS '21] Kaveh Shamsi and Yier Jin, “In Praise of Exact-Functional-Secrecy in Circuit Locking,” IEEE Transactions on Information Forensics and Security (TIFS), 2021. (to appear)
  10. [Micromachines '21] Kejun Chen, Xiaolong Guo, Qingxu Deng, Yier Jin, “Dynamic Information Flow Tracking: Taxonomy, Challenges, and Opportunities,” Micromachines. Special Issue Hardware Security Attacks and Countermeasures in Integrated Circuits, 2021.[PDF]
  11. [JETCAS '21] Haocheng Ma, Jiaji He, Max Panoff, Yier Jin and Yiqiang Zhao, "Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection," IEEE Journal on Emerging and Selected Topics in Circuits and Systems(JETCAS), 2021. (to appear)
  12. [SNCS '21] Max Panoff, Raj Gautam Dutta, Yaodan Hu, Kaichen Yang, and Yier Jin, "On Sensor Security in the Era of IoT and CPS," Springer Nature Computer Science (SNCS), vol. 2, pp. 51:1-51:14, 2021.
  13. [TITS '20] Raj Gautam Dutta, Yaodan Hu, Feng Yu, Teng Zhang, and Yier Jin, "Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment," IEEE Transactions on Intelligent Transportation Systems (TITS), 2020. (to appear)
  14. [TCAD '20] Haocheng Ma, Jiaji He, Yanjiang Liu, Leibo Liu, Yiqiang Zhao, and Yier Jin, "Security-Driven Placement and Routing Tools for Electromagnetic Side Channel Protection," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2020. (to appear)
  15. [IET Smart Grid '20] Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin and Charalambos Konstantinou, "A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems," IET Smart Grid, 2020. [PDF]
  16. [TCAD '20] Feng Yu, RajGautam Dutta, Teng Zhang, Yaodan Hu and Yier Jin, "Fast Attack-Resilient Distributed State Estimator for Cyber-Physical Systems," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 39, no. 11, 2020. [PDF]
  17. [TCAD '20] Orlando Arias, Dean Sullivan, Haoqi Shan and Yier Jin, "SaeCAS: Secure Authenticated Execution using CAM-based Vector Storage," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 39, no.11, 2020. [PDF]
  18. [TODAES '20] Yajun Yang, Zhang Chen, Yuan Liu, Pingqiang Zhou, Tsung-Yi Ho, and Yier Jin, "How Secure is Split Manufacturing in Preventing Hardware Trojan?" ACM Transactions on Design Automation of Electronic Systems (TODAES), 2020. [PDF]
  19. [TODAES '19] Kaveh Shamsi, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin, "IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview," ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 24, issue 6, pp. 65:1-65:36, 2019. [PDF]
  20. [TIFS '19] Kaveh Shamsi, Travis Meade, Meng Li, David Pan, and Yier Jin, "On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes," IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, no. 2, pp.347-359, 2019. [PDF]
  21. [TCAD '19] Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan, "Provably Secure Camouflaging Strategy for IC Protection," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 38, no. 8, pp. 1399-1412, 2019. [PDF]
  22. [VLSI '19] Jiaji He, Xiaolong Guo, Travis Meade, Raj Gautam Dutta, Yiqiang Zhao, Yier Jin, "SoC interconnection protection through formal verification," Integration, the VLSI Journal, vol. 64, pp. 143-151, 2019. [PDF]
  23. [TCAD '19] Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, and Huaqiang Wu, "On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 38, no. 10, pp. 1820-1830, 2019. [PDF]
  24. [HASS '18] Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, and Yier Jin, "The Old Frontier of Reverse Engineering: Netlist Partitioning," Journal of hardware and Systems Security (HASS), vol. 2, no. 3, pp. 201-213, 2018. [PDF]
  25. [HASS '18] Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark Tehranipoor, and Domenic Forte, "Development and Evaluation of Hardware Obfuscation Benchmarks," Journal of Hardware and Systems Security (HASS), vol. 2, no. 2, 142-161, 2018. [PDF]
  26. [HASS '18] Kejun Chen, Shuai Zhang, Zhikang Li, Yi Zhang, Qingqu Deng, Sandip Ray, and Yier Jin, "Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges,and Practice," Journal of Hardware and Systems Security (HaSS), vol. 2, no. 2, pp. 97-110, 2018. [PDF]
  27. [TVLSI '17] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification," IEEE Transactions on Very Large Scale Integration System (TVLSI), vol. 25, no. 12, pp. 3390-3400, 2017. [PDF]
  28. [TCAD '17] Juan Wang, Hong Zhi, Yuhan Zhang, and Yier Jin, "Enabling Security-enhanced Attestation With Intel SGX for Remote Terminal and IoT," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), vol. 37, no. 1, pp. 88-96, 2018. [PDF]
  29. [TVLSI '17] Jiaji He, Yiqiang Zhao, Xiaolong Guo, Yier Jin, "Hardware Trojan Detection through Chip-Free Electromagnetic Side-Channel Statistical Analysis," IEEE Transactions on Very Large Scale Integration System (TVLSI), vol. 25, no. 10, pp. 2939-2948, 2017. [PDF]
  30. [TIFS '17] Yier Jin, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, and Yiorgos Makris, "Data Secrecy Protection through Information Flow Tracking in Proof-Carrying Hardware IP (Part I: Framework Fundamentals)," IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 10, pp. 2416-2429, 2017. [PDF]
  31. [TIFS '17] Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin, and Yiorgos Makris, "Data Secrecy Protection through Information Flow Tracking in Proof-Carrying Hardware IP (Part II: Framework Automation)," IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 10, pp. 2430-2443, 2017. [PDF]
  32. [TVLSI '16] Yu Liu, Yier Jin, Aria Nosratinia, and Yiorgos Makris, "Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs," IEEE Transactions on Very Large Scale Integration Systems (TVLSI), vol. 25, no. 4, pp. 1506-1519, 2017. [PDF]
  33. [Integration '16] Travis Meade, Shaojie Zhang, and Yier Jin, "IP Protection Through Gate-Level Netlist Security Enhancement," Integration, the VLSI Journal, 2016. [PDF]
  34. [TIFS '16] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems," IEEE Transactions on Information Forensics and Security (TIFS), 2016. [PDF]
  35. [TMSCS '16] Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor, "Introduction to Cyber-Physical System Security: A Cross-Layer Perspective,'' IEEE Transactions on Multi-Scale Computing Systems, 2016. [PDF]
  36. [TETC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael Niemier, and X. Sharon Hu, "Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs,'' IEEE Transactions on Emerging Topics in Computing (TETC), 2016. [PDF]
  37. [TODAES '16] Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and M. Tehranipoor, "Hardware Trojans: Lessons Learned After One Decade of Research,'' ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, no. 1, pp. 6:1-6:23, 2016. [PDF]
  38. 2018 ACM TODAES Best Paper
  39. [D&T '16] Sandip Ray, Yier Jin, and Arijit Raychowdhury, "The Changing Computing Paradigm with Internet of Things: A Tutorial Introduction," IEEE Design & Test, vol. 33, no. 2, pp. 76-96, 2016. [PDF]
  40. [JETC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre Gaillardon, Giovanni Micheli, Xunzhao Yin, X. Shanron Hu, Michael Niemier, and Yier Jin, "Emerging Technology based Design of Primitives for Hardware Security," ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 13, issue 1, pp. 3:1-3:19, 2016. [PDF]
  41. [TMSCS '15] Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin, "Privacy and Security in Internet of Things and Wearable Devices," IEEE Transactions on Multi-Scale Computing Systems, vol.1, no. 2, pp. 99-109, 2015. [PDF]
  42. [Electronics '15] Yier Jin, "Introduction to Hardware Security," Electronics, vol. 4, issue. 4, pp. 763-784, 2015. [PDF]
  43. [Electronics '15] Yu Bi, Jiann-Shiun Yuan, and Yier Jin, "Beyond the Interconnections: Split Manufacturing in RF Designs," electronics, vol. 4, issue. 3, pp. 541-564, 2015. [PDF]
  44. [ACR '14] Daniela Oliveira, Nick Wetzel, Max Bucci, Jesus Navarro, Dean Sullivan, and Yier Jin, "Hardware-Software Collaboration for Secure Coexistence with Kernel Extensions," ACM SIGAPP Applied Computing Review, vol. 14, no. 3, pp. 22-35, 2014. [PDF]
  45. [TIFS '12] Eric Love, Yier Jin, and Yiorgos Makris, “Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition,” Special Issue on Integrated Circuits and System Security of the IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, no. 1, pp. 25-40, 2012 [PDF] .
  46. [D&T '10] Yier Jin, and Yiorgos Makris, "Hardware Trojans in wireless cryptographic integrated circuits," IEEE Design & Test on Computers, vol. 27, pp. 10-25, 2010. [PDF]
  47. [IPL '08] Haibin Shen, and Yier Jin, "Low complexity bit parallel multiplier for GF(2 m) generated by equally-spaced trinomials," Information Processing Letters, Volume 107, Issue 6, 2008, pp. 211-215. [PDF]
  48. Yier Jin, Haibin Shen, Huafeng Chen, and Xiaolang Yan, "Research of fast modular multiplier for a class of finite fields," Journal of Electronics(China), Volume 25, Issue 4, 2008, pp. 482-487. [PDF]

Conference Publications

  1. [S&P '22] Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin, "Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices," IEEE Security and Privacy (Oakland), 2022. Best Paper Award [PDF]
  2. [DATE '22] Zhaoxiang Liu, Orlando Arias, Weimin Fu, Yier Jin and Xiaolong Guo, "InterIP Malicious Modification Detection through Static Information Flow Tracking," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2022. [PDF]
  3. [DATE '22] Orlando Arias, Zhaoxiang Liu, Xiaolong Guo, Yier Jin and Shuo Wang, "RTSec: Automated RTL Code Augmentation for Hardware Security Enhancement," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2022.
  4. [NANOARCH '22] Weimin Fu, Orlando Arias, Yier Jin, and Xiaolong Guo, "Fuzzing Hardware: Faith or Reality?" IEEE/ACM Symposium on Nanoscale Architectures (NANOARCH), 2022. (to appear)
  5. [SmartGridComm '21] Xiaorui Liu, Yaodan Hu, Charalambos (Harrys) Konstantinou, and Yier Jin, "CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks," 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2021. (to appear)
  6. [EMSOFT '21] Xiaolong Guo, Song Han, X. Sharon Hu, Yier Jin, Fanxin Kong, and Michael Lemmon, "Towards Scalable, Secure, and Smart Mission-Critical IoT Systems: Review and Vision," International Conference on Embedded Software (EMSOFT), 2021.
  7. [HOST '21] Yichen Jiang, Huifeng Zhu, Haoqi Shan, Xiaolong Guo, Xuan Zhang and Yier Jin, "TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection," Hardware-Oriented Security and Trust (HOST), 2021. (to appear)
  8. [ICCAD '21] Kaveh Shamsi and Yier Jin, "Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT," International Conference On Computer Aided Design (ICCAD), 2021. (to appear)
  9. [DAC '21] Yichen Jiang, Huifeng Zhu, Dean Sullivan, Xiaolong Guo, Xuan Zhang, and Yier Jin, "Quantifying Rowhammer Vulnerability for DRAM Security," Design Automation Conference (DAC), 2021. [PDF]
  10. [DAC '21] Kaichen Yang, Xuan-Yi Lin, Yixin Sun, Tsung-Yi Ho, and Yier Jin, "3D-Adv: Black-Box Physical Adversarial Attacks against Deep Learning Models through 3D Sensors," Design Automation Conference (DAC), 2021. [PDF]
  11. [DAC '21] Honggang Yu, Haoqi Shan, Max Pano., and Yier Jin, "Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning," Design Automation Conference (DAC), 2021. [PDF]
  12. [ASIACCS '21] Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, and Yier Jin, "Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules," ACM Asia Conference on Computer and Communications Security (ASIACCS), 2021. [PDF]
  13. [ICCPS '21] Yaodan Hu, Xiaochen Xian and Yier Jin, "RADM: A Risk-Aware DER Management Framework with Real-time DER Trustworthiness Evaluation," 12th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2021. [PDF]
  14. [GOMACTech '21] Max Panoff, Ty Van Roy, and Yier Jin, "AutoEM: Automatic Trace Collection and DataAnalysis for Electromagnetic Side Channel Security," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2021.
  15. [GOMACTech '21] Aritra Dasgupta, Md Moshiur Rahman, Orlando Arias, Luke Duncan, Yier Jin, and Swarup Bhunia, "RTLock: Logic Locking at Register-Transfer Level," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2021.
  16. [ASP-DAC '21] Huifeng Zhu, Xiaolong Guo, Yier Jin, and Xuan Zhang, "PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans," 26th Asia and South Pacific Design Automation Conference (ASP-DAC), 2021. [PDF]
  17. [AsianHOST '20] Huifeng Zhu, Xiaolong Guo, Yier Jin, and Xuan Zhang, "PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis," Asian Hardware Oriented Security and Trust (AsianHOST), 2020. [PDF]
  18. [AsianHOST '20] Jun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou and Yier Jin, "WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking," Asian Hardware Oriented Security and Trust (AsianHOST), 2020. (to appear)
  19. [AsianHOST '20] Yaodan Hu, Haoqi Shan, Raj Gautam Dutta and Yier Jin, "P2SA: Protecting Platoons from Stealthy Jamming Attack," Asian Hardware Oriented Security and Trust (AsianHOST), 2020. (to appear)
  20. [ICCD '20] Feng Yu, Yaodan Hu, Teng Zhang, and Yier Jin, "Resilient Distributed Estimator with Information Consensus for CPS Security," IEEE International Conference on Computer Design (ICCD), 2020. [PDF]
  21. [BLACKHAT '20] Honggang Yu, Tsung-Yi Ho and Yier Jin, "CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms," Black Hat USA, 2020. (to appear)
  22. [USENIX '20] Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, and Xinwen Fu, "Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks", USENIX Security, 2020. [PDF]
  23. [ICDCS '20] Nikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin, Jedidiah Crandall and Daniela Oliveira, "MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems," IEEE International Conference on Distributed Computing Systems (ICDCS), 2020. (to appear)
  24. [DAC '20] James Geist, Travis Meade, Shaojie Zhang and Yier Jin, "RELIC-FUN: Logic Identification through Functional Signal Comparisons," Design Automation Conference (DAC), 2020. [PDF]
  25. [DAC '20] Jiaji He, Xiaolong Guo, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao and Yier Jin, "Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors," Design Automation Conference (DAC), 2020. [PDF]
  26. [HOST '20] Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, and Yier Jin, "DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage," Hardware-Oriented Security and Trust (HOST), 2020. [PDF]
  27. [HOST '20] Rachel Selina Rajarathnam, Yibo Lin, Yier Jin, and David Z. Pan, "ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist," Hardware-Oriented Security and Trust (HOST), 2020. [PDF]
  28. [HOST '20] Orlando Arias, Dean Sullivan, Haoqi Shan, and Yier Jin, "LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells," Hardware-Oriented Security and Trust (HOST), 2020. [PDF]
  29. [GOMACTech '20] Kaveh Shamsi and Yier Jin, "NEOS: Netlist Encryption and Obfuscation Suite," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2020.
  30. [GOMACTech '20] Md Moshiur Rahman, Travis Meade, Yier Jin, Swarup Bhunia, "You Break I Fix: A Collaborative Approach for Strengthening Sequential Obfuscation of Hardware Intellectual Property," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2020.
  31. [DATE '20] Mohammad Mehdi Sharifi, Ramin Rajaei, Patsy Cadareanu, Pierre-Emmanuel Gaillardon, Yier Jin, Michael Niemier, and X. Sharon Hu, "A Novel TIGFET-based DFF Design for ImprovedResilience to Power Side-Channel Attacks," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2020. [PDF]
  32. [NDSS '20] Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, and Yier Jin, "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples," Network and Distributed System Security Symposium (NDSS), 2020. [PDF]
  33. [AAAI '20] Tzungyu Tsai, Kaichen Yang, Tsung-Yi Ho, and Yier Jin, "Robust Adversarial Objects against Deep Learning Models," 34th AAAI Conference on Artificial Intelligence (AAAI), 2020. [PDF]
  34. [AAAI '20] Kaichen Yang, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho, and Yier Jin, "Beyond Digital Domain: Fooling Deep learning Based Recognition System in PhysicalWorld," 34th AAAI Conference on Artificial Intelligence (AAAI), 2020. [PDF]
  35. [ASP-DAC '20] Kuei-Huan Chang, Po-Hao Huang, Honggang Yu, Yier Jin, and Ting-Chi Wang, "Audio Adversarial Examples Generation with Recurrent Neural Networks," 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 2020. [PDF]
  36. [ASP-DAC '20] Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, Yier Jin, "Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations," 25th Asia and South Paci.c Design Automation Conference (ASP-DAC), 2020. [PDF]
  37. [AsianHOST '19] Haocheng Ma, Jiaji He, Yanjiang Liu, Yiqiang Zhao, and Yier Jin, "CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection," Asian Hardware Oriented Security and Trust (AsianHOST), 2019. [PDF]
  38. [AsianHOST '19] Jason Portillo, Travis Meade, John Hacker, Shaojie Zhang and Yier Jin, "RERTL:Finite State Transducer Logic Recovery at Register Transfer Level," Asian Hardware Oriented Security and Trust (AsianHOST), 2019. [PDF]
  39. [MTV '19] Kejun Chen, Qingxu Deng,Yumin Hou, Yier Jin, and Xiaolong Guo, "Hardware and Software Co-Verification from Security Perspective," 20th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2019. [PDF]
  40. [IFIPIoT '19] Bryan Pearson, Lan Luo, Cli. Zou, Jacob Crain, Yier Jin, and Xinwen Fu, "Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory," 2nd IFIP IoT International Conference (IFIPIoT), 2019. [PDF]
  41. [ICCAD '19] Kaveh Shamsi, David Z. Pan, and Yier Jin, "IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits," International Conference On Computer Aided Design (ICCAD), 2019. (to appear)
  42. [ISVLSI '19] Yier Jin, "Towards Hardware-Assisted Security for IoT Systems (Invited)," IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019. [PDF]
  43. [HOST '19] Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark Tehranipoor, and Yier Jin, "QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2019. [PDF]
  44. [HOST '19] Kaveh Shamsi, David Z. Pan, and Yier Jin, "On the Impossibility of ApproximationResilient Circuit Locking," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2019. [PDF]
  45. [ACC '19] Raj Gautam Dutta, Teng Zhang, and Yier Jin, "Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack," American Control Conference (ACC), 2019. [PDF]
  46. [GOMACTech '19] Kaveh Shamsi and Yier Jin, "Programmable Via based Layout Level Design Obfuscation for Circuit Protection," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2019.
  47. [GOMACTech '19] Honggang Yu, Kaichen Yang, and Yier Jin, "Deep Learning Application Attacks through Feature Manipulations," Government Microcircuit Applications and Critical Technology Conference (GOMACTech), 2019.
  48. [VTS '19] Miao He, Jungmin Park, Adib Nahiyan, Aposto Vassilev, Yier Jin, Mark Tehranipoor, "RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level," 37th IEEE VLSI Test Symposium (VTS), 2019. [PDF]
  49. [DATE '19] Kaveh Shamsi, Meng Li, David Pan, and Yier Jin, "KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation," Design, Automation and Test inEurope Conference and Exhibition (DATE), 2019, pp. 534-539. (Best Paper Award Nomination) [PDF]
  50. [DATE '19] Xiaolong Guo, Huifeng Zhu, Yier Jin, and Xuan Zhang, "When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2019, pp. 1706-1711. (Best Paper Award) [PDF]
  51. [ASP-DAC '19] Travis Meade, Jason Portillo, Shaojie Zhang, and Yier Jin, "NETA: When IP Fails, Secrets Leak," 24th Asia and South Pacific Design Automation Conference(ASP-DAC), 2019. [PDF]
  52. [ICCAD '18] Raj Gautam Dutta, Feng Yu, Teng Zhang, Yaodan Hu, and Yier Jin, "Security for Safety: A Path Toward Building Trusted Autonomous Vehicles," International Conference On Computer Aided Design (ICCAD), 2018. [PDF]
  53. [ITC '18] Meng Li, Kaveh Shamsi, Yier Jin, David Pan, "TimingSAT: Decamouflaging Timing-based Logic Obfuscation," International Test Conference (ITC), 2018. (to appear)
  54. [IVSW '18] Thao Le, Lucas Weaver, Jia Di, Shaojie Zhang, and Yier Jin, "Hardware Trojan Detection and Functionality Determination for Soft IPs," International Verification and Security Workshop (IVSW), 2018. [PDF]
  55. [DAC '18] Jungmin Park, Xiaolin Xu, Domenic Forte, Yier Jin, and Mark Tehranipoor, "Power-based Side-Channel Instruction-level Disassembler," Design Automation Conference (DAC), 2018. [PDF]
  56. [GLSVLSI '18] Kaveh Shamsi, Meng Li, David Pan, and Yier Jin, "Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures," ACM Great Lakes Symposium on VLSI (GLSVLSI), 2018. Best Paper Award [PDF]
  57. [HOST '18] Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu, "R2D2: Runtime Reassurance and Detection of A2 Trojan," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2018. [PDF]
  58. [HOST '18] Tao Liu, Wujie Wen, and Yier Jin, "SIN2: Stealth Infection on Neural Network - A Low-cost Agile Neural Trojan Attack Methodology," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2018. [PDF]
  59. [GOMAC '18] Jiaji He, Xiaolong Guo, and Yier Jin, "Golden Chip Free Electromagnetic Simulation and Statistical Analysis for Hardware Security," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-18), 2018.
  60. [GOMAC '18] Xiaolong Guo, Jiaji He, and Yier Jin, "Runtime SoC Trust Verification using Integrated Symbolic Execution and Solver," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-18), 2018.
  61. [GOMAC '18] Tao Liu, Yier Jin, and Wujie Wen, "Trojan Attacks and Defenses on Deep Neural Network based Intelligent Computing Systems," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-18), 2018.
  62. [DATE '18] Orlando Arias, Fahim Rahman, Mark Tehranipoor, and Yier Jin, "Device Attestation: Past, Present, and Future," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2018. [PDF]
  63. [NDSS '18] Dean Sullivan, Orlando Arias, Travis Meade, and Yier Jin, "Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds," Network and Distributed System Security Symposium (NDSS), 2018. [PDF]
  64. [ASP-DAC '18] Tao Liu, Lei Jiang, Yier Jin, Gang Quan, and Wujie Wen, "PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning," 23rd Asia and South Paci.c Design Automation Conference (ASP-DAC), 2018. (Best Paper Nomination) [PDF]
  65. [ASP-DAC '18] Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, and Wujie Wen, "Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks," 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 2018. (Best Paper Nomination) [PDF]
  66. [DASC '17] Kelvin Ly, Kevin Kwiat, Charles Kamhoua, Laurent Njilla, and Yier Jin, "Approximate Power Grid Protection Against False Data Injection Attacks," 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing (DASC), 2017. [PDF]
  67. [MTV '17] Fahim Rahman, Mohammad Farmani, Mark Tehranipoor, and Yier Jin, "Hardware-assisted Cybersecurity for IoT Devices," 18th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2017. [PDF]
  68. [AsianHOST '17] Xiaolong Guo, Raj Gautam Dutta, Jiaji He, and Yier Jin, "PCH Framework for IP Runtime Security Verification," Asian Hardware Oriented Security and Trust (AsianHOST), 2017, pp. 79-84. [PDF]
  69. [GLOBECOM '17] Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, and Xinwen Fu, "An End-to-End View of IoT Security and Privacy," IEEE GLOBECOM, 2017. [PDF]
  70. [ICCAD '17] Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, and Wujie Wen, "MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation," International Conference On Computer Aided Design (ICCAD), 2017. [PDF]
  71. [ICCAD '17] Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, and Ahmad-Reza Sadeghi, "ATRIUM: Runtime Attestation Resilient Under Memory Attacks," International Conference On Computer Aided Design (ICCAD), 2017. (Best Paper Candidate) [PDF]
  72. [RAID '17] David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, and Ahmad-Reza Sadeghi, "LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization," International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017. [PDF]
  73. [HASP '17] Orlando Arias, Dean Sullivan, and Yier Jin, "HA2lloc: Hardware-Assisted Secure Allocator," Hardware and Architectural Support for Security and Privacy (HASP), 2017. [PDF]
  74. [ISCAS '17] Travis Meade, Zheng Zhao, Shaojie Zhang, David Pan, and Yier Jin, "Revisit Sequential Logic Obfuscation: Attacks and Defenses," IEEE International Symposium on Circuits and Systems (ISCAS), 2017. [PDF]
  75. [GLSVLSI '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "Cyclic Obfuscation for Creating SAT-Unresolvable Circuits," GLSVLSI, 2017, pp. 357-362. [PDF]
  76. [GLSVLSI '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?" GLSVLSI, 2017, pp. 173-178. [PDF]
  77. [DAC '17] Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin Kwiat, Charles Kamhoua, Laurent Njilla, and Yier Jin, "Estimation of Safe Sensor Measurements of Autonomous System Under Attack," IEEE/ACM Design Automation Conference (DAC), 2017. [PDF]
  78. [HOST '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "AppSAT: Approximately Deobfuscating Integrated Circuits," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2017, pp. 46-51. (Best Paper Award) [PDF]
  79. [GOMAC '17] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Proof-Carrying Hardware based IP Protection," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-17), 2017.
  80. [GOMAC '17] Raj Gautam Dutta, Xiaolong Guo, and Yier Jin, "Trusted Autonomous Systems under Sensor Attacks," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-17), 2017.
  81. [ICNC '17] Nathalie Domingo, Bryan Pearson and Yier Jin, "Exploitations of Wireless Interfaces via Network Scanning," International Conference on Computing, Networking and Communications (ICNC), 2017. (REU Site Paper) [PDF]
  82. [ASP-DAC '17] Zihao Liu, Wujie Wen, Lei Jiang, Yier Jin, and Gang Quan, "A Statistical STT-RAM Retention Model for Fast Memory Subsystem Designs," 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) , 2017, pp. 720-725. [PDF]
  83. [AsianHOST '16] Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin, "How Secure is Split Manufacturing in Preventing Hardware Trojan?" IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2016. [PDF]
  84. [MTV '16] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Automatic RTL-to-Formal Code Converter for IP Security Formal Verification," 17th International Workshop on Microprocessor and SOC Test and Veri.cation (MTV), 2016. [PDF]
  85. [BH-EU '16] Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi, and Yier Jin, "Policy Agnostic Control-Flow Integrity," Black Hat Europe, 2016. [PDF]
  86. [ICCD '16] Kelvin Ly, Orlando Arias, Jacob Wurm, Khoa Hoang, Kaveh Shamsi, and Yier Jin, "Voting System Design Pitfalls: Vulnerability Analysis and Exploitation of a Model Platform," IEEE International Conference on Computer Design (ICCD) , 2016, pp. 149-152. [PDF]
  87. [ISTFA '16] Travis Meade, Shaojie Zhang, Zheng Zhao, David Pan, and Yier Jin, "Gate-Level Netlist Reverse Engineering Tool Set for Functionality Recovery and Malicious Logic Detection," International Symposium for Testing and Failure Analysis (ISTFA) , 2016. [PDF]
  88. [SOCC '16] Raj Gautam Dutta, Xiaolong Guo, and Yier Jin, "Quantifying Trust in Autonomous System Under Uncertainties," 29th IEEE International System-on-Chip Conference (SOCC) , 2016, pp. 362-367. [PDF]
  89. [ICCAD '16] Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan, "Provably Secure Camouflaging Strategy for IC Protection," International Conference On Computer Aided Design (ICCAD) , 2016. [PDF]
  90. [ISVLSI '16] Kaveh Shamsi, Wujie Wen, and Yier Jin, "Hardware Security Challenges Beyond CMOS: Attacks and Remedies," IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2016, pp. 200-205. [PDF]
  91. [ISVLSI '16] Kelvin Ly and Yier Jin, "Security Challenges in CPS and IoT: from End-Node to the System," IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2016, pp. 63-68. [PDF]
  92. [EMBC '16] kelvin Ly, and Yier Jin, "Security Studies on Wearable Fitness Trackers," 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2016. [PDF]
  93. [DAC '16] Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, and Yier Jin, "Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity,"IEEE/ACM Design Automation Conference (DAC), 2016, pp. 83.2:1-6. [PDF]
  94. [DAC '16] Nancy Cam-Winget, Ahmad-Reza Sadeghi, and Yier Jin, "Can IoT be Secured: Emerging Challenges in Connecting the Unconnected," IEEE/ACM Design Automation Conference (DAC), 2016, pp. 71.3:1-6. [PDF]
  95. [DAC '16] Adib Nahiyan, Domenic Forte, Yier Jin, Mark Tehranipoor, Xiao Kan, and Kun Yang, "Framework of Security Vulnerabilities in Finite State Machines," IEEE/ACM Design Automation Conference (DAC), 2016, pp. 57.4:1-6. [PDF]
  96. [ISCAS '16] Travis Meade, Yier Jin, Mark Tehranipoor, and Shaojie Zhang, "Gate-Level Netlist Reverse Engineering for Hardware Security: Control Logic Register Identification," IEEE International Symposium on Circuits and Systems (ISCAS), 2016, pp. 1334-1337. [PDF]
  97. [GLSVLSI '16] Yu Bi, Kaveh Shamsi, Xunzhao Yin, Michael Niemier, Sharon Hu, and Yier Jin, "Enhancing Hardware Security with Emerging Transistor Technologies," GLSVLSI, 2016, pp. 305-310. [PDF]
  98. [HOST '16] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking,'' IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2016, pp. 124-129. [PDF]
  99. [VTS '16] Kaveh Shamsi and Yier Jin, "Security of Emerging Non-Volatile Memories: Attacks and Defenses," IEEE VLSI Test Symposium (VTS), 2016. [PDF]
  100. [VTS '16] Sandip Ray, Swarup Bhunia, Yier Jin, and Mark Tehranipoor, "[Extended Abstract] Security Validation in IoT Space," IEEE VLSI Test Symposium (VTS), 2016. [PDF]
  101. [DATE '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Francois-Xavier Standaert, and Yier Jin, "Leverage Emerging Technologies For DPA-Resilient Block Cipher Design," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp. 1538-1543. [PDF]
  102. [DATE '16] An Chen, X. Sharon Hu, Yier Jin, Michael Niemier, Xunzhao Yin, "Using Emerging Technologies for Hardware Security Beyond PUFs," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp. 1544-1549. [PDF]
  103. [ASP-DAC '16] Travis Meade, Shaojie Zhang, and Yier Jin, "Netlist Reverse Engineering for High-Level Functionality Reconstruction," in 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 2016, pp. 655-660. (Best Paper Award) [PDF]
  104. [ASP-DAC '16] Jacob Wurm, Orlando Arias, Khoa Hoang, Ahmad-Reza Sadeghi and Yier Jin, "Security analysis on consumer and industrial IoT Devices," in 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 2016, pp. 519-524. [PDF]
  105. [GOMAC '16] Kaveh Shamsi, Pierre-Emmanuel Gaillardon, and Yier Jin, "Hardware Platform Protection Using Emerging Memory Technologies," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 21-24.
  106. [GOMAC '16] Travis Meade, Shaojie Zhang, Mark Tehranipoor, and Yier Jin, "A Comprehensive Netlist Reverse Engineering Toolset for IC Trust," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 281-284.
  107. [GOMAC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, and Yier Jin, "More Than Moore in Security: Emerging Device based Low-Power Di.erentiate Power Analysis Countermeasures," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 467-470.
  108. [CPSS '16] Kelvin Ly, Wei Sun, and Yier Jin, "Emerging Challenges in Cyber-Physical Systems: A Balance of Performance, Correctness, and Security," IEEE Infocom CPSS Workshop, 2016.
  109. [ICCAD '15] Sandip Ray, and Yier Jin, "Security Policy Enforcement in Modern SoC Designs," International Conference On Computer Aided Design (ICCAD), 2015, pp. 345-350. [PDF]
  110. [MTV '15] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Hierarchy-Preserving Formal Verification Methods for Pre-Silicon Security Assurance," 16th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2015. [PDF]
  111. [ICCD '15] Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael Niemier and X. Sharon Hu, “Reliable and High Performance STT-MRAM Architectures based on Controllable-Polarity Devices," IEEE International Conference on Computer Design (ICCD), 2015, pp. 372-379. [PDF]
  112. [MILCOM '15] Omar Nakhila, Yier Jin, and Cliff Zou, "Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks," IEEE Military Communications Conference (MILCOM), 2015. [PDF]
  113. [DAC '15] Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin, "HAFIX: Hardware-Assisted Flow Integrity Extension," IEEE/ACM Design Automation Conference (DAC), 2015. (Best Paper Award) [PDF]
  114. [DAC '15] Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, and Prabhat Mishra, "Pre-Silicon Security Verification and Validation: A Formal Perspective," IEEE/ACM Design Automation Conference (DAC), 2015. [PDF]
  115. [DAC '15] Yang Liu, Shiyan Hu, Jie Wu, Yiyu Shi, Yier Jin, Yu Hu, and Xiaowei Li, "Impact assessment of net metering on smart home cyberattack detection," IEEE/ACM Design Automation Conference (DAC), 2015. [PDF]
  116. [SAM '15] Yu Bi, Jiann-Shiun Yuan, and Yier Jin, "Split Manufacturing in Radio-Frequency Designs," The 2015 International Conference on Security and Management (SAM), 2015, pp. 204-210. [PDF]
  117. [ETS '15] Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Yier Jin, "Cyber-Physical Systems: A Security Perspective," European Test Symposium (ETS), 2015. [PDF]
  118. [GOMAC '15] Jeff Biggers, Travis Meade, Shaojie Zhang, Youngok Pino, and Yier Jin, "Automated RTL Code Rebuilding through Netlist Analysis," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-15), 2015, pp. 155-158.
  119. [UCF_Sensor '15] Yier Jin, "Innovative IoT Authentication Methods Leveraging Smart Sensors," UCF Conference on Sensor Devices and Applications, Oct 2015.
  120. [RSA '15] Ray Potter, Yier Jin, "Don't Touch That Dial: How Smart Thermostats Have Made Us Vulnerable," RSA Conference, 2015.
  121. [CHASE '15] Yier Jin, "Security and Privacy in Internet of Things and Wearable Devices," CHASE Conference on Secure/Trustworthy Systems and Supply Chain Assurance, 2015.
  122. [ATS '14] Yu Bi, Pierre-Emmanuel Gaillardon, X. Sharon Hu, Michael Niemier, Jiann-Shiun Yuan, and Yier Jin, "Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs," Asia Test Symposium (ATS), 2014, pp. 342-247. [PDF]
  123. [ISVLSI '14] Yier Jin, "Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits,"IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2014, pp. 19-24. [PDF]
  124. [DAC '14] Dean Sullivan, Jeff Biggers, Guidong Zhu, Shaojie Zhang, and Yier Jin, "FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness," Design Automation Conference (DAC), 2014, pp. 173:1--173:4. [PDF]
  125. [DATE '14] Yier Jin, and Dean Sullivan, "Real-Time Trust Evaluation in Integrated Circuits," Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. [PDF]
  126. [DATE '14] Yier Jin, "EDA Tools Trust Evaluation through Security Property Proofs," Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. [PDF]
  127. [TrustED '14] Yier Jin, "Embedded System Security in Smart Consumer Electronics," 4th International Workshop on Trustworthy Embedded Devices (TrustED), 2014, pp. 59-59.
  128. [BLACKHAT '14] Yier Jin, Grant Hernandez, and Daniel Buentello, "Smart Nest Thermostat: A Smart Spy in Your Home," Black Hat USA, 2014.
  129. [SHAW '14] Yier Jin, and Daniela Oliveira, "Trustworthy SoC Architecture with On-Demand Security Policies and HW-SW Cooperation," 5th Workshop on SoCs, Heterogeneous Architectures and Workloads (SHAW-5), 2014.
  130. [ICCAD '13] Yier Jin, and Yiorgos Makris, "A Proof-Carrying Based Framework for Trusted Microprocessor IP," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013. [PDF]
  131. [ICCAD '13] Y. Liu, Yier Jin, and Yiorgos Makris, "Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration and Detection Method Evaluation," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013. [PDF]
  132. [IOLTS '13] Yier Jin, Dimitry Maliuk and Yiorgos Makris, "A Post-Deployment IC Trust Evaluation Architecture," Proceedings of IEEE International On-Line Testing Symposium (IOLTS), 2013. (invited) [PDF]
  133. [HOST '13] Yier Jin, Bo Yang and Yiorgos Makris, "Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, pp. 99-106. [PDF]
  134. [ETS '13] Ozgur Sinanoglu, Naghmeh karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Dimitry Maliuk, Ke Huang, Yiorgos Makris, "Reconciling the IC Test and Security Dichotomy," Proceedings of 18th IEEE European Test Symposium (ETS), 2013, pp. 1-6. [PDF]
  135. [ICCD '12] Yier Jin, Michail Mihalis and Yiorgos Makris, "Exposing Vulnerabilities of Untrusted Computing Platforms," Proceedings of the IEEE International Conference on Computer Design (ICCD), 2012, pp. 131-134. [PDF]
  136. [VTS '12] Yier Jin, and Yiorgos Makris, "Proof Carrying-Based Information Flow Tracking for Data Secrecy Protection and Hardware Trust," Proceedings of VLSI Test Symposium (VTS), 2012, pp. 252-257. [PDF]
  137. [DATE '12] Yier Jin, Dzmitry Maliuk and Yiorgos Makris, "Post-Deployment Trust Evaluation in Wireless Cryptographic ICs," Proceedings of the Design, Automation & Test in Europe (DATE), 2012, pp. 965-970. [PDF]
  138. [ICECS '11] Yier Jin and Yiorgos Makris, "PSCML: Pseudo-Static Current Mode Logic," Proceedings of 18th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2011, pp. 41-44. [PDF]
  139. [ICCD '11] Yier Jin and Yiorgos Makris, "Is Single Trojan Detection Scheme Enough?," Proceedings of the IEEE International Conference on Computer Design (ICCD), 2011, pp. 305-308. [PDF]
  140. [HOST '11] Eric Love, Yier Jin and Yiorgos Makris, "Enhancing Security via Provably Trustworthy Hardware Intellectual Property," Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011. [PDF]
  141. [ICECS '10] Yier Jin and Yiorgos Makris, "DFTT: Design-for-Trojan-Test," Proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010. [PDF]
  142. [HOST '09] Yier Jin, Nathan Kupp and Yiorgos Makris, "Experiences in hardware Trojan design and implementation," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2009, pp. 50-57. [PDF]
  143. [HOST '08] Yier Jin, and Yiorgos Makris, "Hardware Trojan detection using path delay fingerprint," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2008, pp. 51-57. [PDF]
  144. [ICSICT '06] Yier Jin, and Haibin Shen, "Revisiting scalable modular multiplication over GF(2m) for elliptic curve cryptography," Proceedings of 8th International Conference on Solid-State and Integrated Circuit Technology, 2006. [PDF]
  145. [CHINACOM '06] Yier Jin, Haibin Shen, and Rongquan You, "Implementation of SMS4 Block Cipher on FPGA," Proceedings of International Conference on Communications and Networking in China (CHINACOM), 2006. [PDF]
  146. [ICICIC '06] Haibin Shen, Yier Jin, and Rongquan You, "Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation," Proceedings of International Conference on Innovative Computing, Information and Control (ICICIC), pp. 190-193, 2006. [PDF]
  147. [CIS '06] Dawei Li, Yier Jin, Haibin Shen, and Xiaolang Yan, "Design of Random Number Generation Algorithm," Proceedings of International Conference on Computational Intelligence and Security (CIS), 2006, pp. 1287-1290. [PDF]
  148. [EUC '06] Rongquan You, Haibin Shen, Yier Jin, and Aiming Ji, "Interconnect Estimation for Mesh-Based Reconfigurable Computing," Proceedings of The IFIP International Conference on Embedded and Ubiquitous Computing (EUC), LNCS 4096, 2006, pp. 766-775. [PDF]