Follow
NYU Center for Cybersecurity (CCS)
NYU Center for Cybersecurity (CCS)
NYU Center for Cybersecurity (CCS)
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
A primer on hardware security: Models, methods, and metrics
M Rostami, F Koushanfar, R Karri
Proceedings of the IEEE 102 (8), 1283-1295, 2014
7362014
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
7002011
Mapping on multi/many-core systems: Survey of current and emerging trends
AK Singh, M Shafique, A Kumar, J Henkel
Proceedings of the 50th Annual Design Automation Conference, 1-10, 2013
5362013
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5242016
Big data: The end of privacy or a new beginning?
IS Rubinstein
Int'l Data Priv. L. 3, 74, 2013
4192013
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
3992016
A low latency generic accuracy configurable adder
M Shafique, W Ahmad, R Hafiz, J Henkel
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
3762015
Security and privacy in cyber-physical systems: A survey of surveys
J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu
IEEE Design & Test 34 (4), 7-17, 2017
3092017
Reliable on-chip systems in the nano-era: Lessons learnt and future trends
J Henkel, L Bauer, N Dutt, P Gupta, S Nassif, M Shafique, M Tahoori, ...
Proceedings of the 50th Annual Design Automation Conference, 1-10, 2013
2542013
Regulating privacy by design
IS Rubinstein
Berkeley Tech. LJ 26, 1409, 2011
2322011
Breaking LTE on layer two
D Rupprecht, K Kohls, T Holz, C Pöpper
2019 IEEE Symposium on Security and Privacy (SP), 1121-1136, 2019
2142019
Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents
IS Rubinstein, N Good
Berkeley Tech. LJ 28, 1333, 2013
2092013
Cross-layer approximate computing: From logic to architectures
M Shafique, R Hafiz, S Rehman, W El-Harouni, J Henkel
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
2062016
Multi-scale analysis strategies in PRNU-based tampering localization
P Korus, J Huang
IEEE Transactions on Information Forensics and Security 12 (4), 809-824, 2016
2052016
Efficient uncoordinated FHSS anti-jamming communication
M Strasser, C Pöpper, S Čapkun
Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009
1952009
Anonymization and risk
IS Rubinstein, W Hartzog
Wash. L. Rev. 91, 703, 2016
1862016
Jamming-resistant Broadcast Communication without Shared Keys.
C Pöpper, M Strasser, S Capkun
USENIX security Symposium, 231-248, 2009
1822009
Data mining and Internet profiling: Emerging regulatory and technological approaches
IS Rubinstein, RD Lee, PM Schwartz
U. Chi. L. Rev. 75, 261, 2008
1812008
Architectural-space exploration of approximate multipliers
S Rehman, W El-Harouni, M Shafique, A Kumar, J Henkel, J Henkel
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2016
1712016
Secure time synchronization in sensor networks
S Ganeriwal, C Pöpper, S Čapkun, MB Srivastava
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-35, 2008
1572008
The system can't perform the operation now. Try again later.
Articles 1–20