On the feasibility of online malware detection with performance counters J Demme, M Maycock, J Schmitz, A Tang, A Waksman, S Sethumadhavan, ... ACM SIGARCH computer architecture news 41 (3), 559-570, 2013 | 573 | 2013 |
FANCI: identification of stealthy malicious logic using boolean functional analysis A Waksman, M Suozzo, S Sethumadhavan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 466 | 2013 |
Silencing hardware backdoors A Waksman, S Sethumadhavan 2011 IEEE Symposium on Security and Privacy, 49-63, 2011 | 223 | 2011 |
Side-channel vulnerability factor: A metric for measuring information leakage J Demme, R Martin, A Waksman, S Sethumadhavan ACM SIGARCH computer architecture news 40 (3), 106-117, 2012 | 173 | 2012 |
Tamper evident microprocessors A Waksman, S Sethumadhavan 2010 IEEE Symposium on Security and Privacy, 173-188, 2010 | 121 | 2010 |
Trustworthy hardware from untrusted components S Sethumadhavan, A Waksman, M Suozzo, Y Huang, J Eum Communications of the ACM 58 (9), 60-71, 2015 | 47 | 2015 |
Interactions between the L1 cell adhesion molecule and ezrin support traction‐force generation and can be regulated by tyrosine phosphorylation T Sakurai, OD Gil, JD Whittard, M Gazdoiu, T Joseph, J Wu, A Waksman, ... Journal of neuroscience research 86 (12), 2602-2614, 2008 | 43 | 2008 |
Systems and methods for detecting attacks against a digital circuit L Sethumadhavan, A Waksman US Patent 9,098,700, 2015 | 35 | 2015 |
System and methods for silencing hardware backdoors L Sethumadhavan, A Waksman US Patent 9,037,895, 2015 | 24 | 2015 |
Practical, lightweight secure inclusion of third-party intellectual property A Waksman, S Sethumadhavan, J Eum IEEE Design & Test 30 (2), 8-16, 2013 | 21 | 2013 |
A quantitative, experimental approach to measuring processor side-channel security J Demme, R Martin, A Waksman, S Sethumadhavan IEEE Micro 33 (3), 68-77, 2013 | 18 | 2013 |
A red team/blue team assessment of functional analysis methods for malicious circuit identification A Waksman, J Rajendran, M Suozzo, S Sethumadhavan Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014 | 11 | 2014 |
System and methods for silencing hardware backdoors L Sethumadhavan, A Waksman US Patent 9,325,493, 2016 | 6 | 2016 |
Identification of backdoors and backdoor triggers L Sethumadhavan, A Waksman, M Suozzo US Patent 9,916,449, 2018 | 5 | 2018 |
Implementations to facilitate hardware trust and security L Sethumadhavan, A Waksman US Patent 10,055,587, 2018 | 4 | 2018 |
Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources A Waksman Columbia University, 2014 | 4 | 2014 |
Implementations to facilitate hardware trust and security L Sethumadhavan, A Waksman US Patent 10,599,847, 2020 | 1 | 2020 |
Fanci A Waksman, M Suozzo, S Sethumadhavan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 1 | 2013 |
The magazine archive includes every article published in Communications of the ACM for over the past 50 years. S Sethumadhavan, A Waksman, M Suozzo, Y Huang, J Eum Communications of the ACM 58 (9), 60-71, 2015 | | 2015 |
Cost and Scalability of Hardware Encryption Techniques AS Waksman, L Sethumadhavan | | 2013 |