Publications
You can also find my publications on Google Scholar and dblp.
* denotes shared first authorship
Reading It Like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks
Sirui Shen and Chenglu Jin.
Annual Computer Security Applications Conference (ACSAC’24).
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery
Chenglu Jin*, Chao Yin*, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, and Haibin Zhang.
ACM Conference on Computer and Communications Security (CCS’24).
Dynamic Group Time-based One-time Passwords
Xuelian Cao, Zheng Yang, Jianting Ning, Chenglu Jin, Rongxing Lu, Zhiming Liu, and Jianying Zhou.
IEEE Transactions on Information Forensics and Security (TIFS’24).
Masked Memory Primitive for Key Insulated Schemes
Zachary DiMeglio, Jenna Bustami, Deniz Gurevin, Chenglu Jin, Marten van Dijk, and Omer Khan.
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’24).
Privacy and Integrity Protection for IoT Multimodal Data using Machine Learning and Blockchain
Qingzhi Liu, Yuchen Huang, Chenglu Jin, Xiaohan Zhou, Ying Mao, Cagatay Catal, and Long Cheng.
ACM Transactions on Multimedia Computing Communications and Applications (TOMM’23).
Optimizing Proof of Aliveness in Cyber-Physical Systems
Zheng Yang*, Chenglu Jin*, Xuelian Cao, Marten van Dijk, and Jianying Zhou.
IEEE Transactions on Dependable and Secure Computing (TDSC’23). (Online archive)
Secure Remote Attestation with Strong Key Insulation Guarantees
Deniz Gurevin, Chenglu Jin, Phuong Ha Nguyen, Omer Khan, and Marten van Dijk.
IEEE Transactions on Computers (TC’23). (Online archive)
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and its Relation to the Random Oracle Model
Marten van Dijk, and Chenglu Jin.
Journal of Cryptology (JoC’23).
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things
Chenglu Jin*, Zheng Yang*, Tao Xiang, Sridhar Adepu, and Jianying Zhou.
IEEE Transactions on Information Forensics and Security (TIFS’23). (Online archive)
Programmable Access-Controlled and Generic Erasable PUF Design and Its Applications
Chenglu Jin, Wayne Burleson, Marten van Dijk, and Ulrich Rührmair.
Journal of Cryptographic Engineering (JCEN’22). (Online archive)
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, and Jianying Zhou.
Annual Computer Security Applications Conference (ACSAC’21). (Online archive, Slides)
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers
Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, and Jianying Zhou.
IACR Transactions on Symmetric Cryptology (ToSC’21). (Artifact)
HACK3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing
Michael Linares*, Nishant Aswani*, Gary Mac, Chenglu Jin, Fei Chen, Nikhil Gupta, and Ramesh Karri.
IEEE Computer’21. (Online archive)
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems
Zheng Yang, Chao Yin, Chenglu Jin, Jianting Ning, and Jianying Zhou.
ACM Cyber-Physical System Security Workshop (CPSS@AsiaCCS’21). (Online archive)
A Survey of Cybersecurity of Digital Manufacturing
Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, and Ramesh Karri.
Proceedings of the IEEE (PIEEE’21). (Presentation)
Erasable PUFs: Formal Treatment and Generic Design
Chenglu Jin, Wayne Burleson, Marten van Dijk, and Ulrich Rührmair.
Workshop on Attacks and Solutions in Hardware Security (ASHES@CCS’20). (Online archive, Slides)
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems
Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, and Jianying Zhou.
ACM Asia Conference on Computer and Communications Security (AsiaCCS’20). (Presentation)
Proof of Aliveness
Chenglu Jin*, Zheng Yang*, Marten van Dijk, and Jianying Zhou.
Annual Computer Security Applications Conference (ACSAC’19). (Artifact, Slides)
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, and Marten van Dijk.
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES’19). (Artifact, Presentation, Tutorial)
Exploiting Lithography Limits for Hardware Security Applications
Raihan Sayeed Khan, Nafisa Noor, Chenglu Jin, Sadid Muneer, Faruk Dirisaglik, Adam Cywar, Phuong Ha Nguyen, Marten van Dijk, Ali Gokirmak, and Helena Silva.
IEEE Conference on Nanotechnology (IEEE-NANO’19). (Online archive)
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin and Marten van Dijk.
IEEE Transactions on Dependable and Secure Computing (TDSC’19). (Online archive, Slides)
Advancing the State-of-the-Art in Hardware Trojans Detection
Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, and Marten van Dijk.
IEEE Transactions on Dependable and Secure Computing (TDSC’19). (Online archive, Presentation)
Snapshotter: Lightweight Intrusion Detection and Prevention System for Industrial Control Systems
Chenglu Jin, Saeed Valizadeh, and Marten van Dijk.
IEEE International Conference on Industrial Cyber-Physical Systems (ICPS’18). (Slides)
Weak-Unforgeable Tags for Secure Supply Chain Management
Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, and Reza Rahaeimehr.
International Conference on Financial Cryptography and Data Security (FC’18). (Full version)
FPGA Implementation of a Cryptographically-Secure PUF based on Learning Parity with Noise
Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, and Marten van Dijk.
Cryptography’17. (Artifact)
Phase Calibrated Ring Oscillator PUF Design and Implementation on FPGAs
Wei Yan, Chenglu Jin, Fatemeh Tehranipoor, and John A. Chandy.
International Conference on Field-Programmable Logic and Applications (FPL’17). (Online archive)
Advancing the State-of-the-Art in Hardware Trojans Design
Syed Kamran Haider, Chenglu Jin, and Marten van Dijk.
IEEE International Midwest Symposium on Circuits and Systems (MWSCAS’17). (Full version)
New Clone-Detection Approach for RFID-Based Supply Chains
Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, and Marten van Dijk.
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’17).
Mitigating Synchronized Hardware Trojan Attacks in Smart Grids
Chenglu Jin, Lingyu Ren, Xubin Liu, Peng Zhang, and Marten van Dijk.
Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG@CPSWeek’17). (Online archive, Slides)
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?
Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hély, and Ramesh Karri.
IEEE Transactions on Emerging Topics in Computing (TETC’16).
Simulation and Analysis of Negative-Bias Temperature Instability Aging on Power Analysis Attacks
Xiaofei Guo, Naghmeh Karimi, Francesco Regazzoni, Chenglu Jin, and Ramesh Karri.
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’15). (Online archive)
Security Analysis of Concurrent Error Detection against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri.
Journal of Cryptographic Engineering (JCEN’15).
NREPO: Normal Basis Recomputing with Permuted Operands
Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, and Ramesh Karri.
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). (Online archive)