Follow
Michael Zuzak
Michael Zuzak
Assistant Professor of Computer Engineering, Rochester Institute of Technology
Verified email at rit.edu - Homepage
Title
Cited by
Cited by
Year
Keynote: A disquisition on logic locking
A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
1072019
A survey on neural trojans
Y Liu, A Mondal, A Chakraborty, M Zuzak, N Jacobsen, D Xing, ...
2020 21st International Symposium on Quality Electronic Design (ISQED), 33-39, 2020
852020
Strong anti-SAT: Secure and effective logic locking
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020
492020
Benchmarking at the frontier of hardware security: Lessons from logic locking
B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, ...
arXiv preprint arXiv:2006.06806, 2020
352020
Robust and attack resilient logic locking with a high application-level impact
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021
192021
Trace logic locking: Improving the parametric space of logic locking
M Zuzak, Y Liu, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
162020
Nested mimd-simd parallelization for heterogeneous microprocessors
D Gerzhoy, X Sun, M Zuzak, D Yeung
ACM Transactions on Architecture and Code Optimization (TACO) 16 (4), 1-27, 2019
112019
A Resource Binding Approach to Logic Obfuscation
M Zuzak, Y Liu, A Srivastava
2021 58th ACM/IEEE Design Automation Conference (DAC), 1-6, 2021
92021
Memory locking: An automated approach to processor design obfuscation
M Zuzak, A Srivastava
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 541-546, 2019
92019
Obfusgem: Enhancing processor design obfuscation through security-aware on-chip memory and data path design
M Zuzak, A Srivastava
Proceedings of the International Symposium on Memory Systems, 260-271, 2020
72020
Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection
Z Cheng, H Choi, S Feng, JC Liang, G Tao, D Liu, M Zuzak, X Zhang
The Twelfth International Conference on Learning Representations, 2023
6*2023
Evaluating the Security of Logic-Locked Probabilistic Circuits
M Zuzak, A Mondal, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
62021
A combined logical and physical attack on logic obfuscation
M Zuzak, Y Liu, I McDaniel, A Srivastava
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022
42022
A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks
Y Liu, M Zuzak, D Xing, I McDaniel, P Mittu, O Ozbay, A Akib, A Srivastava
2022 IEEE 4th International Conference on Artificial Intelligence Circuits …, 2022
32022
HMCTherm: A cycle-accurate HMC simulator integrated with detailed power and thermal simulation
Z Yang, M Zuzak, A Srivastava
Proceedings of the International Symposium on Memory Systems, 209-117, 2018
22018
Exploiting multi-loop parallelism on heterogeneous microprocessors
M Zuzak, D Yeung
Proceedings of the 10th International Workshop on Programmability and …, 2017
22017
Low overhead system-level obfuscation through hardware resource sharing
D Xing, M Zuzak, A Srivastava
2023 24th International Symposium on Quality Electronic Design (ISQED), 1-8, 2023
12023
A black-box sensitization attack on SAT-hard instances in logic obfuscation
I McDaniel, M Zuzak, A Srivastava
2022 IEEE 40th International Conference on Computer Design (ICCD), 239-246, 2022
12022
Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries
MJ Zuzak
University of Maryland, College Park, 2022
12022
Independent Verification and Validation of Security-Aware EDA Tools and IP
B Tan, S Garg, R Karri, Y Liu, M Zuzak, A Chakraborty, A Srivastava, ...
2021 58th ACM/IEEE Design Automation Conference (DAC), 1299-1302, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20