Recent Papers
N.G. Tsoutsos and M. Maniatakos, "Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation," IEEE Transactions on Computers (IEEEXplore) (Author version) (Short video)
O. Mazonka, N.G. Tsoutsos and M. Maniatakos, "Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation," IEEE Transactions on Information Forensics and Security (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture," IEEE International Conference on Computer Design (ICCD) 2016 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Extending Residue-based Fault Tolerance to Encrypted Computation," IEEE International Test Conference (ITC) 2015 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems," IEEE Embedded System Letters (IEEEXplore)
F. Chen, Y. Luo, N.G. Tsoutsos, M. Maniatakos, K. Shahin, N. Gupta, "Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication," Advanced Engineering Materials (Wiley)
D. Mouris, N.G. Tsoutsos and M. Maniatakos, "TERMinator Suite: Benchmarking Privacy-Preserving Architectures," IEEE Computer Architecture Letters (IEEEXplore)
D. Tychalas, N.G. Tsoutsos and M. Maniatakos, "SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology," Asia and South Pacific Design Automation Conference (ASPDAC) 2017 (IEEEXplore)
N. Gupta, F. Chen, N.G. Tsoutsos and M. Maniatakos, "ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting," Design Automation Conference (DAC) 2017 (ACM DL)
N.G. Tsoutsos, O. Mazonka and M. Maniatakos, "Memory-bounded Randomness for Hardware-constrained Encrypted Computation," IEEE International Conference on Computer Design (ICCD) 2017 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests," IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2017 (IEEEXplore)
N.G. Tsoutsos, H. Gamil and M. Maniatakos, "Secure 3D Printing: Reconstructing and Validating Solid Geometries Using Toolpath Reverse Engineering," ACM Cyber-Physical System Security Workshop (CPSS) 2017 (ACM DL)
N.G. Tsoutsos and M. Maniatakos, "The HEROIC Framework: Encrypted Computation without Shared Keys," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation," Special Issue of IEEE Transactions on Emerging Topics in Computing on Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability (IEEEXplore, openAccess)
N.G. Tsoutsos and M. Maniatakos, "Obfuscated arbitrary computation using cryptographic primitives," IEEE International Design & Test Symposium (IDT) 2015 (IEEEXplore)
S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, "Manufacturing and Security Challenges in 3D Printing," JOM (Springer)
A. Keliris, C. Konstantinou, N.G. Tsoutsos, R. Baiad, and M. Maniatakos, "Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds," Asia and South Pacific Design Automation Conference (ASPDAC) 2016 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Trust no one: Thwarting 'heartbleed' attacks using privacy-preserving computation," IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2014 (IEEEXplore)
N.G. Tsoutsos, C. Konstantinou and M. Maniatakos, "Advanced Techniques for Designing Stealthy Hardware Trojans," Design Automation Conference (DAC) 2014 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "HEROIC: Homomorphically EncRypted One Instruction Computer," Design, Automation and Test in Europe Conference and Exhibition (DATE) 2014 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Investigating the Application of One Instruction Set Computing for Encrypted Data Computation," International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) 2013 (Springer)
N.G. Tsoutsos and M. Maniatakos, "Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation," IEEE Transactions on Computers (IEEEXplore) (Author version) (Short video)
O. Mazonka, N.G. Tsoutsos and M. Maniatakos, "Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation," IEEE Transactions on Information Forensics and Security (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture," IEEE International Conference on Computer Design (ICCD) 2016 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Extending Residue-based Fault Tolerance to Encrypted Computation," IEEE International Test Conference (ITC) 2015 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems," IEEE Embedded System Letters (IEEEXplore)
F. Chen, Y. Luo, N.G. Tsoutsos, M. Maniatakos, K. Shahin, N. Gupta, "Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication," Advanced Engineering Materials (Wiley)
D. Mouris, N.G. Tsoutsos and M. Maniatakos, "TERMinator Suite: Benchmarking Privacy-Preserving Architectures," IEEE Computer Architecture Letters (IEEEXplore)
D. Tychalas, N.G. Tsoutsos and M. Maniatakos, "SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology," Asia and South Pacific Design Automation Conference (ASPDAC) 2017 (IEEEXplore)
N. Gupta, F. Chen, N.G. Tsoutsos and M. Maniatakos, "ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting," Design Automation Conference (DAC) 2017 (ACM DL)
N.G. Tsoutsos, O. Mazonka and M. Maniatakos, "Memory-bounded Randomness for Hardware-constrained Encrypted Computation," IEEE International Conference on Computer Design (ICCD) 2017 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests," IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2017 (IEEEXplore)
N.G. Tsoutsos, H. Gamil and M. Maniatakos, "Secure 3D Printing: Reconstructing and Validating Solid Geometries Using Toolpath Reverse Engineering," ACM Cyber-Physical System Security Workshop (CPSS) 2017 (ACM DL)
N.G. Tsoutsos and M. Maniatakos, "The HEROIC Framework: Encrypted Computation without Shared Keys," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation," Special Issue of IEEE Transactions on Emerging Topics in Computing on Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability (IEEEXplore, openAccess)
N.G. Tsoutsos and M. Maniatakos, "Obfuscated arbitrary computation using cryptographic primitives," IEEE International Design & Test Symposium (IDT) 2015 (IEEEXplore)
S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, "Manufacturing and Security Challenges in 3D Printing," JOM (Springer)
A. Keliris, C. Konstantinou, N.G. Tsoutsos, R. Baiad, and M. Maniatakos, "Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds," Asia and South Pacific Design Automation Conference (ASPDAC) 2016 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Trust no one: Thwarting 'heartbleed' attacks using privacy-preserving computation," IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2014 (IEEEXplore)
N.G. Tsoutsos, C. Konstantinou and M. Maniatakos, "Advanced Techniques for Designing Stealthy Hardware Trojans," Design Automation Conference (DAC) 2014 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "HEROIC: Homomorphically EncRypted One Instruction Computer," Design, Automation and Test in Europe Conference and Exhibition (DATE) 2014 (IEEEXplore)
N.G. Tsoutsos and M. Maniatakos, "Investigating the Application of One Instruction Set Computing for Encrypted Data Computation," International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) 2013 (Springer)