Michail Maniatakos

Orcid: 0000-0001-6899-0651

Affiliations:
  • New York University Abu Dhabi, UAE
  • Yale University, New Haven, CT, USA (PhD 2012)


According to our database1, Michail Maniatakos authored at least 128 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems.
Proceedings of the Australian & New Zealand Control Conference, 2024

2023
Dissecting the Industrial Control Systems Software Supply Chain.
IEEE Secur. Priv., 2023

RPU: The Ring Processing Unit.
IACR Cryptol. ePrint Arch., 2023

TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation.
IACR Cryptol. ePrint Arch., 2023

HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis.
CoRR, 2023

Perception, performance, and detectability of conversational artificial intelligence across 32 university courses.
CoRR, 2023

Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning.
CoRR, 2023

Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems.
CoRR, 2023

Optimizing Constrained-Modulus Barrett Multiplier for Power and Flexibility.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

TRAPDOOR: Repurposing neural network backdoors to detect dataset bias in machine learning-based genomic analysis.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Privacy-Preserving Machine Learning for Healthcare: Open Challenges and Future Perspectives.
Proceedings of the Trustworthy Machine Learning for Healthcare, 2023

FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Design Space Exploration of Modular Multipliers for ASIC FHE accelerators.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

Quantifying the Overheads of Modular Multiplication.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2023

CoFHEE: A Co-processor for Fully Homomorphic Encryption Execution.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023

PerDoor: Persistent Backdoors in Federated Learning using Adversarial Perturbations.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2022
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation.
IEEE Trans. Dependable Secur. Comput., 2022

FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics.
IEEE Trans. Biom. Behav. Identity Sci., 2022

HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research.
IEEE Des. Test, 2022

PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations.
CoRR, 2022

FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing.
CoRR, 2022

Scalable privacy-preserving cancer type prediction with homomorphic encryption.
CoRR, 2022

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks.
CoRR, 2022

ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages.
CoRR, 2022

Fast and Compact Interleaved Modular Multiplication Based on Carry Save Addition.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

2021
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution.
IACR Cryptol. ePrint Arch., 2021

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis.
CoRR, 2021

Explainability Matters: Backdoor Attacks on Medical Imaging.
CoRR, 2021

Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021

Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption.
IEEE Access, 2021

ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Towards Non-intrusive Malware Detection for Industrial Control Systems.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

Real-time Private Membership Test using Homomorphic Encryption.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

A Trigger Exploration Method for Backdoor Attacks on Deep Learning-Based Traffic Control Systems.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting.
IEEE Des. Test, 2020

A Data-Based Detection Method Against False Data Injection Attacks.
IEEE Des. Test, 2020

FaceHack: Triggering backdoored facial recognition systems using facial characteristics.
CoRR, 2020

Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems.
CoRR, 2020

Practical Data-in-Use Protection Using Binary Decision Diagrams.
IEEE Access, 2020

SNIFU: Secure Network Interception for Firmware Updates in legacy PLCs.
Proceedings of the 38th IEEE VLSI Test Symposium, 2020

Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2020

Muon-Ra: Quantum random number generation from cosmic rays.
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020

Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

CPSIOTSEC'20: 2020 Joint Workshop on CPS&IoT Security and Privacy.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems.
J. Hardw. Syst. Secur., 2019

ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

FLEP-SGS<sup>2</sup>: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems.
Proceedings of the 25th IEEE International Symposium on On-Line Testing and Robust System Design, 2019

JTAG: A Multifaceted Tool for Cyber Security.
Proceedings of the 25th IEEE International Symposium on On-Line Testing and Robust System Design, 2019

CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

On automating delayered IC analysis for hardware IP protection.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

Process-Aware Cyberattacks for Thermal Desalination Plants.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation.
IEEE Trans. Computers, 2018

E<sup>3</sup>: A Framework for Compiling C++ Programs with Encrypted Operands.
IACR Cryptol. ePrint Arch., 2018

Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems.
IEEE Embed. Syst. Lett., 2018

Guest Editor Introduction: Embedded Security Challenge.
IEEE Embed. Syst. Lett., 2018

TERMinator Suite: Benchmarking Privacy-Preserving Architectures.
IEEE Comput. Archit. Lett., 2018

Assessment of Low-Budget Targeted Cyberattacks Against Power Systems.
Proceedings of the VLSI-SoC: Design and Engineering of Electronics Systems Based on New Computing Paradigms, 2018

Low-budget Energy Sector Cyberattacks via Open Source Exploitation.
Proceedings of the IFIP/IEEE International Conference on Very Large Scale Integration, 2018

Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

PHYLAX: Snapshot-based profiling of real-time embedded devices via JTAG interface.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment.
IET Cyper-Phys. Syst.: Theory & Appl., 2017

Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy.
IEEE Des. Test, 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Des. Test, 2017

Memory-Bounded Randomness for Hardware-Constrained Encrypted Computation.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited.
Proceedings of the 54th Annual Design Automation Conference, 2017

Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

SGXCrypter: IP protection for portable executables using Intel's SGX technology.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

Obfuscating branch decisions based on encrypted data using MISR and hash digests.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Malicious Firmware Detection with Hardware Performance Counters.
IEEE Trans. Multi Scale Comput. Syst., 2016

Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.
IEEE Trans. Inf. Forensics Secur., 2016

The Cybersecurity Landscape in Industrial Control Systems.
Proc. IEEE, 2016

Remote field device fingerprinting using device-specific modbus information.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

Attacking the smart grid using public information.
Proceedings of the 17th Latin-American Test Symposium, 2016

Machine learning-based defense against process-aware attacks on Industrial Control Systems.
Proceedings of the 2016 IEEE International Test Conference, 2016

Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving.
IEEE Trans. Very Large Scale Integr. Syst., 2015

The HEROIC Framework: Encrypted Computation Without Shared Keys.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Revisiting Vulnerability Analysis in Modern Microprocessors.
IEEE Trans. Computers, 2015

Impact of firmware modification attacks on power systems field devices.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations.
Proceedings of the 25th International Workshop on Power and Timing Modeling, 2015

Extending residue-based fault tolerance to encrypted computation.
Proceedings of the 2015 IEEE International Test Conference, 2015

Obfuscated arbitrary computation using cryptographic primitives.
Proceedings of the 10th International Design & Test Symposium, 2015

ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

Cyber-physical systems: A security perspective.
Proceedings of the 20th IEEE European Test Symposium, 2015

Privacy-preserving functional IP verification utilizing fully homomorphic encryption.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation.
IEEE Trans. Emerg. Top. Comput., 2014

Special session 8A: E.J. McCluskey Doctoral Thesis Award semi-final.
Proceedings of the 32nd IEEE VLSI Test Symposium, 2014

Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Innovative engineering outreach using Intel<sup>®</sup> security and embedded tools.
Proceedings of the 10th European Workshop on Microelectronics Education (EWME), 2014

Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions.
Proceedings of the 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2014

HEROIC: Homomorphically EncRypted One Instruction Computer.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Advanced Techniques for Designing Stealthy Hardware Trojans.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

2013
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers.
IEEE Trans. Computers, 2013

On the Impact of Performance Faults in Modern Microprocessors.
J. Electron. Test., 2013

Special session 3B: E.J. McCluskey Doctoral Thesis Award semi-final - Posters.
Proceedings of the 31st IEEE VLSI Test Symposium, 2013

Special session 8A: E.J. McCluskey doctoral thesis award semi-final - presentations.
Proceedings of the 31st IEEE VLSI Test Symposium, 2013

Special session 4B: Elevator talks.
Proceedings of the 31st IEEE VLSI Test Symposium, 2013

Investigating the Application of One Instruction Set Computing for Encrypted Data Computation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Investigating the limits of AVF analysis in the presence of multiple bit errors.
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013

Privilege escalation attack through address space identifier corruption in untrusted modern processors.
Proceedings of the 8th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2013

AVF-driven parity optimization for MBU protection of in-core memory arrays.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
Global Signal Vulnerability (GSV) Analysis for Selective State Element Hardening in Modern Microprocessors.
IEEE Trans. Computers, 2012

Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors.
Proceedings of the 2012 IEEE International Test Conference, 2012

Exposing vulnerabilities of untrusted computing platforms.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

2011
Instruction-Level Impact Analysis of Low-Level Faults in a Modern Microprocessor Controller.
IEEE Trans. Computers, 2011

Workload-Cognizant Concurrent Error Detection in the Scheduler of a Modern Microprocessor.
IEEE Trans. Computers, 2011

Exponent monitoring for low-cost concurrent error detection in FPU control logic.
Proceedings of the 29th IEEE VLSI Test Symposium, 2011

AVF Analysis Acceleration via Hierarchical Fault Pruning.
Proceedings of the 16th European Test Symposium, 2011

2010
Workload-driven selective hardening of control state elements in modern microprocessors.
Proceedings of the 28th IEEE VLSI Test Symposium, 2010

2009
Instruction-Level Impact Comparison of RT- vs. Gate-Level Faults in a Modern Microprocessor Controller.
Proceedings of the 27th IEEE VLSI Test Symposium, 2009

Impact analysis of performance faults in modern microprocessors.
Proceedings of the 27th International Conference on Computer Design, 2009

2008
Systematic Software-Based Self-Test for Pipelined Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2008

On the Correlation between Controller Faults and Instruction-Level Errors in Modern Microprocessors.
Proceedings of the 2008 IEEE International Test Conference, 2008

Constraint-Based Placement and Routing for FPGAs Using Self-Organizing Maps.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Design and Evaluation of a Timestamp-Based Concurrent Error Detection Method (CED) in a Modern Microprocessor Controller.
Proceedings of the 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 2008


  Loading...