Publications
My research spans the intersections of hardware security, Cyber-Physical Systems (CPS) security, and cryptography, with recent extensions into game theory and formal methods.
You can also find my publications on Google Scholar and dblp.
* denotes shared first authorship
2026
Proof of Persistent Aliveness
IEEE Transactions on Dependable and Secure Computing (TDSC'26)
2025
CacheGuardian: A Timing Side-Channel Resilient LLC Design
International Conference on Computer-Aided Design (ICCAD'25)
Ransomware Negotiation: Dynamics and Privacy-Preserving Mechanism Design
Conference on Game Theory and AI for Security (GameSec'25)
Breaking XOR Arbiter PUFs with Chosen Challenge Attack
IEEE Transactions on Information Forensics and Security (TIFS'25)
Making Deals with the Devils: the Art of Negotiation after Ransomware Attacks
International Workshop on Security Protocols (SPW'25)
Secure Remote Attestation with Strong Key Insulation Guarantees
IEEE Transactions on Computers (TC'25)
2024
Reading It Like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks
Annual Computer Security Applications Conference (ACSAC'24)
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery
ACM Conference on Computer and Communications Security (CCS'24)
Dynamic Group Time-based One-time Passwords
IEEE Transactions on Information Forensics and Security (TIFS'24)
Optimizing Proof of Aliveness in Cyber-Physical Systems
IEEE Transactions on Dependable and Secure Computing (TDSC'24)
Masked Memory Primitive for Key Insulated Schemes
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'24)
Privacy and Integrity Protection for IoT Multimodal Data using Machine Learning and Blockchain
ACM Transactions on Multimedia Computing Communications and Applications (TOMM'24)
2023
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model
Journal of Cryptology (JoC'23)
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things
IEEE Transactions on Information Forensics and Security (TIFS'23)
2022
Programmable Access-Controlled and Generic Erasable PUF Design and Its Applications
Journal of Cryptographic Engineering (JCEN'22)
2021
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Annual Computer Security Applications Conference (ACSAC'21)
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers
IACR Transactions on Symmetric Cryptology (ToSC'21)
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems
ACM Cyber-Physical System Security Workshop (CPSS@AsiaCCS'21)
2020
Erasable PUFs: Formal Treatment and Generic Design
Workshop on Attacks and Solutions in Hardware Security (ASHES@CCS'20)
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems
ACM Asia Conference on Computer and Communications Security (AsiaCCS'20)
2019
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES'19)
Exploiting Lithography Limits for Hardware Security Applications
IEEE Conference on Nanotechnology (IEEE-NANO'19)
Secure and Efficient Initialization and Authentication Protocols for SHIELD
IEEE Transactions on Dependable and Secure Computing (TDSC'19)
Advancing the State-of-the-Art in Hardware Trojans Detection
IEEE Transactions on Dependable and Secure Computing (TDSC'19)
2018
Snapshotter: Lightweight Intrusion Detection and Prevention System for Industrial Control Systems
IEEE International Conference on Industrial Cyber-Physical Systems (ICPS'18)
Weak-Unforgeable Tags for Secure Supply Chain Management
International Conference on Financial Cryptography and Data Security (FC'18)
2017
FPGA Implementation of a Cryptographically-Secure PUF based on Learning Parity with Noise
Cryptography'17
Phase Calibrated Ring Oscillator PUF Design and Implementation on FPGAs
International Conference on Field-Programmable Logic and Applications (FPL'17)
Advancing the State-of-the-Art in Hardware Trojans Design
IEEE International Midwest Symposium on Circuits and Systems (MWSCAS'17)
New Clone-Detection Approach for RFID-Based Supply Chains
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'17)
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids
Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG@CPSWeek'17)
2016
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
IEEE Transactions on Emerging Topics in Computing (TETC'16)
2015
Simulation and Analysis of Negative-Bias Temperature Instability Aging on Power Analysis Attacks
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'15)
Security Analysis of Concurrent Error Detection against Differential Fault Analysis
Journal of Cryptographic Engineering (JCEN'15)
2014
NREPO: Normal Basis Recomputing with Permuted Operands
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'14)
