A mutual auditing framework to protect IoT against hardware Trojans C Liu, P Cronin, C Yang 2016 21st Asia and South Pacific design automation conference (ASP-DAC), 69-74, 2016 | 41 | 2016 |
{Charger-Surfing}: Exploiting a power line {Side-Channel} for smartphone information leakage P Cronin, X Gao, C Yang, H Wang 30th USENIX Security Symposium (USENIX Security 21), 681-698, 2021 | 37 | 2021 |
A fetching tale: Covert communication with the hardware prefetcher P Cronin, C Yang 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 22 | 2019 |
Fine-tuning CLB placement to speed up reconfigurations in NVM-based FPGAs Y Xue, P Cronin, C Yang, J Hu 2015 25th International Conference on Field Programmable Logic and …, 2015 | 18 | 2015 |
Routing path reuse maximization for efficient NV-FPGA reconfiguration Y Xue, P Cronin, C Yang, J Hu 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 360-365, 2016 | 15 | 2016 |
An exploration of ARM system-level cache and GPU side channels P Cronin, X Gao, H Wang, C Cotton Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 13 | 2021 |
Securing cyber-physical systems from hardware trojan collusion C Liu, P Cronin, C Yang IEEE Transactions on Emerging Topics in Computing 8 (3), 655-667, 2017 | 11 | 2017 |
Lowering the barrier to online malware detection through low frequency sampling of HPCs P Cronin, C Yang 2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018 | 9 | 2018 |
'The danger of sleeping', an exploration of security in non-volatile processors P Cronin, C Yang, D Zhou, K Qiu, X Shi, Y Liu 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 121-126, 2017 | 9 | 2017 |
Time-print: Authenticating USB flash drives with novel timing fingerprints P Cronin, X Gao, H Wang, C Cotton 2022 IEEE Symposium on Security and Privacy (SP), 1002-1017, 2022 | 8 | 2022 |
A crowd-based explosive detection system with two-level feedback sensor calibration C Yang, P Cronin, A Agambayev, S Ozev, AE Cetin, A Orailoglu Proceedings of the 39th International Conference on Computer-Aided Design, 1-9, 2020 | 7 | 2020 |
Reliability and security in non-volatile processors, two sides of the same coin P Cronin, C Yang, Y Liu 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 112-117, 2018 | 7 | 2018 |
A collaborative defense against wear out attacks in non-volatile processors P Cronin, C Yang, Y Liu Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 7 | 2018 |
Covert data exfiltration using light and power channels P Cronin, C Gouert, D Mouris, NG Tsoutsos, C Yang 2019 IEEE 37th International Conference on Computer Design (ICCD), 301-304, 2019 | 5 | 2019 |
Non-volatile memories in FPGAs: Exploiting logic similarity to accelerate reconfiguration and increase programming cycles Y Xue, P Cronin, C Yang, J Hu 2015 IFIP/IEEE International Conference on Very Large Scale Integration …, 2015 | 5 | 2015 |
A low overhead solution to resilient assembly lines built from legacy controllers P Cronin, FS Hosseini, C Yang IEEE Embedded Systems Letters 10 (3), 103-106, 2018 | 4 | 2018 |
Investigating mobile and peripheral side channels for attack and defense PT Cronin University of Delaware, 2021 | | 2021 |