Follow
Chen Liu
Title
Cited by
Cited by
Year
Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling
C Liu, J Rajendran, C Yang, R Karri
IEEE Transactions on Emerging Topics in Computing 2 (4), 461-472, 2014
842014
Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling
C Liu, C Rajendran, Jeyavijayan, Yang, R Karri
2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2013
842013
A mutual auditing framework to protect IoT against hardware Trojans
C Liu, P Cronin, C Yang
21st Asia and South Pacific Design Automation Conference (ASP-DAC), 69 - 74, 2016
412016
Secure and durable (SEDURA) an integrated encryption and wear-leveling framework for PCM-based main memory
C Liu, C Yang
ACM Sigplan Notices 50 (5), 1-10, 2015
192015
Frequency throttling side-channel attack
C Liu, A Chakraborty, N Chawla, N Roggel
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
182022
Erasucrypto: A light-weight secure data deletion scheme for solid state drives
C Liu, HA Khouzani, C Yang
Proceedings on Privacy Enhancing Technologies, 2017
182017
Improving multilevel PCM reliability through age-aware reading and writing strategies
C Liu, C Yang
2014 IEEE 32nd International Conference on Computer Design (ICCD), 264-269, 2014
122014
Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity
C Liu, C Yang, Y Shen
Proceedings of the 2014 International Conference on Hardware/Software …, 2014
112014
Two sides of the same coin: Boons and banes of machine learning in hardware security
W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021
102021
Securing cyber-physical systems from hardware trojan collusion
C Liu, P Cronin, C Yang
IEEE Transactions on Emerging Topics in Computing 8 (3), 655-667, 2017
102017
Exploiting heterogeneity in MPSoCs to prevent potential trojan propagation across malicious IPs
C Liu, C Yang
Proceedings of the 24th edition of the great lakes symposium on VLSI, 335-340, 2014
72014
Architecting data placement in SSDs for efficient secure deletion implementation
HA Khouzani, C Liu, C Yang
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2018
62018
Methodology of assessing information leakage through software-accessible telemetries
C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
52021
Design time and runtime collaborative defense to enhance embedded system security
C Liu
University of Delaware, 2016
12016
The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems
N Chawla, C Liu, A Chakraborty, I Chervatyuk, K Sun, TM Hamasaki, ...
https://arxiv.org/abs/2306.16391, 2023
2023
Defense Against Hardware Trojan Collusion in MPSoCs
C Liu, C Yang
Behavioral Synthesis for Hardware Security, 233-264, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–16