Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling C Liu, J Rajendran, C Yang, R Karri IEEE Transactions on Emerging Topics in Computing 2 (4), 461-472, 2014 | 85 | 2014 |
Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling C Liu, C Rajendran, Jeyavijayan, Yang, R Karri 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2013 | 85 | 2013 |
A mutual auditing framework to protect IoT against hardware Trojans C Liu, P Cronin, C Yang 21st Asia and South Pacific Design Automation Conference (ASP-DAC), 69 - 74, 2016 | 42 | 2016 |
Frequency throttling side-channel attack C Liu, A Chakraborty, N Chawla, N Roggel Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 30 | 2022 |
Erasucrypto: A light-weight secure data deletion scheme for solid state drives C Liu, HA Khouzani, C Yang Proceedings on Privacy Enhancing Technologies, 2017 | 19 | 2017 |
Secure and durable (SEDURA) an integrated encryption and wear-leveling framework for PCM-based main memory C Liu, C Yang ACM Sigplan Notices 50 (5), 1-10, 2015 | 19 | 2015 |
Two sides of the same coin: Boons and banes of machine learning in hardware security W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ... IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021 | 16 | 2021 |
Securing cyber-physical systems from hardware trojan collusion C Liu, P Cronin, C Yang IEEE Transactions on Emerging Topics in Computing 8 (3), 655-667, 2017 | 13 | 2017 |
Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity C Liu, C Yang, Y Shen Proceedings of the 2014 International Conference on Hardware/Software …, 2014 | 13 | 2014 |
Improving multilevel PCM reliability through age-aware reading and writing strategies C Liu, C Yang 2014 IEEE 32nd International Conference on Computer Design (ICCD), 264-269, 2014 | 10 | 2014 |
Methodology of assessing information leakage through software-accessible telemetries C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 7 | 2021 |
Exploiting heterogeneity in MPSoCs to prevent potential trojan propagation across malicious IPs C Liu, C Yang Proceedings of the 24th edition of the great lakes symposium on VLSI, 335-340, 2014 | 7 | 2014 |
Architecting data placement in SSDs for efficient secure deletion implementation HA Khouzani, C Liu, C Yang 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2018 | 6 | 2018 |
The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems N Chawla, C Liu, A Chakraborty, I Chervatyuk, K Sun, TM Hamasaki, ... https://arxiv.org/abs/2306.16391, 2023 | 1 | 2023 |
Design time and runtime collaborative defense to enhance embedded system security C Liu University of Delaware, 2016 | 1 | 2016 |
Defense Against Hardware Trojan Collusion in MPSoCs C Liu, C Yang Behavioral Synthesis for Hardware Security, 233-264, 2021 | | 2021 |