Name
Affiliation
Papers
M. MANIATAKOS
NYU-AD
75
Collaborators
Citations 
PageRank 
90
358
35.84
Referers 
Referees 
References 
836
1276
821
Search Limit
1001000
Title
Citations
PageRank
Year
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation00.342022
A Data-Based Detection Method Against False Data Injection Attacks10.382020
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting10.362020
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems00.342020
Practical Data-In-Use Protection Using Binary Decision Diagrams00.342020
Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit00.342020
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems20.402019
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution00.342019
On automating delayered IC analysis for hardware IP protection.00.342019
Process-Aware Cyberattacks for Thermal Desalination Plants.00.342019
FLEP-SGS<sup>2</sup>: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security00.342019
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.80.552019
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems10.402019
TERMinator Suite: Benchmarking Privacy-Preserving Architectures.20.392018
E3: A Framework for Compiling C++ Programs with Encrypted Operands.00.342018
Low-budget Energy Sector Cyberattacks via Open Source Exploitation00.342018
Guest Editor Introduction: Embedded Security Challenge.00.342018
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation.10.352018
Assessment of Low-Budget Targeted Cyberattacks Against Power Systems.00.342018
Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems.20.382018
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering.10.482017
Memory-Bounded Randomness For Hardware-Constrained Encrypted Computation00.342017
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.290.972017
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy.00.342017
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment.20.382017
The Cybersecurity Landscape in Industrial Control Systems.391.772016
Remote field device fingerprinting using device-specific modbus information00.342016
Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture20.362016
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation.20.392016
Malicious Firmware Detection with Hardware Performance Counters.40.392016
Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds10.352016
Privacy-preserving functional IP verification utilizing fully homomorphic encryption40.412015
Obfuscated arbitrary computation using cryptographic primitives00.342015
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving60.432015
Revisiting Vulnerability Analysis in Modern Microprocessors50.472015
Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations00.342015
ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters100.602015
Extending residue-based fault tolerance to encrypted computation10.362015
Impact of firmware modification attacks on power systems field devices60.522015
The HEROIC Framework: Encrypted Computation without Shared Keys180.742015
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation.70.592015
Cyber-physical systems: A security perspective40.442015
Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation20.372014
Special session 4B: Elevator talks00.342014
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation150.772014
Special session 8C: E.J. McCluskey doctoral thesis award semi-final00.342014
Special session 8C: E.J. McCluskey doctoral thesis award semi-final00.342014
HEROIC: Homomorphically EncRypted One Instruction Computer110.612014
Innovative engineering outreach using Intel® security and embedded tools00.342014
Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions40.702014
  • 1
  • 2