The cybersecurity landscape in industrial control systems S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ... Proceedings of the IEEE 104 (5), 1039-1057, 2016 | 411 | 2016 |
Security and privacy in cyber-physical systems: A survey of surveys J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu IEEE Design & Test 34 (4), 7-17, 2017 | 322 | 2017 |
Manufacturing and security challenges in 3D printing SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri Jom 68 (7), 1872-1881, 2016 | 304 | 2016 |
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters X Wang, C Konstantinou, M Maniatakos, R Karri 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015 | 124 | 2015 |
Systematic software-based self-test for pipelined processors D Gizopoulos, M Psarakis, M Hatzimihail, M Maniatakos, A Paschalis, ... IEEE Transactions on Very Large Scale Integration (VLSI) Systems 16 (11 …, 2008 | 122 | 2008 |
Cyber-physical systems: A security perspective C Konstantinou, M Maniatakos, F Saqib, S Hu, J Plusquellic, Y Jin 2015 20th IEEE European Test Symposium (ETS), 1-8, 2015 | 111 | 2015 |
ICSREF: A framework for automated reverse engineering of industrial control systems binaries A Keliris, M Maniatakos Network and Distributed System Security Symposium (NDSS), 2019, 2018 | 104 | 2018 |
Machine learning-based defense against process-aware attacks on industrial control systems A Keliris, H Salehghaffari, B Cairl, P Krishnamurthy, M Maniatakos, ... 2016 IEEE International Test Conference (ITC), 1-10, 2016 | 99 | 2016 |
Instruction-level impact analysis of low-level faults in a modern microprocessor controller M Maniatakos, N Karimi, C Tirumurti, A Jas, Y Makris IEEE Transactions on Computers 60 (9), 1260-1273, 2010 | 89 | 2010 |
Impact of firmware modification attacks on power systems field devices C Konstantinou, M Maniatakos 2015 IEEE International Conference on Smart Grid Communications …, 2015 | 87 | 2015 |
Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems Y Wang, E Sarkar, W Li, M Maniatakos, SE Jabari IEEE Transactions on Information Forensics and Security 16, 4772-4787, 2021 | 74 | 2021 |
Embedding tracking codes in additive manufactured parts for product authentication F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta Advanced Engineering Materials 21 (4), 1800495, 2019 | 69 | 2019 |
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation NG Tsoutsos, M Maniatakos IEEE Transactions on Emerging Topics in Computing 2 (1), 81-93, 2013 | 67 | 2013 |
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses H Ibrahim, F Liu, R Asim, B Battu, S Benabderrahmane, B Alhafni, ... Scientific Reports 13 (1), 12187, 2023 | 66 | 2023 |
GPS spoofing effect on phase angle monitoring and control in a real‐time digital simulator‐based hardware‐in‐the‐loop environment C Konstantinou, M Sazos, AS Musleh, A Keliris, A Al‐Durra, M Maniatakos IET Cyber‐Physical Systems: Theory & Applications 2 (4), 180-187, 2017 | 65 | 2017 |
The HEROIC framework: Encrypted computation without shared keys NG Tsoutsos, M Maniatakos IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 63 | 2015 |
Malicious firmware detection with hardware performance counters X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ... IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016 | 60 | 2016 |
E3: A framework for compiling C++ programs with encrypted operands E Chielle, O Mazonka, H Gamil, NG Tsoutsos, M Maniatakos Cryptology ePrint Archive, 2018 | 54 | 2018 |
Facehack: Attacking facial recognition systems using malicious facial characteristics E Sarkar, H Benkraouda, G Krishnan, H Gamil, M Maniatakos IEEE Transactions on Biometrics, Behavior, and Identity Science 4 (3), 361-372, 2021 | 48* | 2021 |
A case study on implementing false data injection attacks against nonlinear state estimation C Konstantinou, M Maniatakos Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016 | 47 | 2016 |