The cybersecurity landscape in industrial control systems S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ... Proceedings of the IEEE 104 (5), 1039-1057, 2016 | 442 | 2016 |
Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters X Wang, R Karri Proceedings of the 50th annual design automation conference, 1-7, 2013 | 153 | 2013 |
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters X Wang, C Konstantinou, M Maniatakos, R Karri 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015 | 129 | 2015 |
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-flow Modifying Rootkits X Wang, R Karri IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2016 | 96 | 2016 |
Hardware performance counter-based malware identification and detection with adaptive compressive sensing X Wang, S Chai, M Isnardi, S Lim, R Karri ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016 | 78 | 2016 |
BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks V Jyothi, X Wang, SK Addepalli, R Karri The 29th International Conference on VLSI Design, 2016 | 75 | 2016 |
Malicious firmware detection with hardware performance counters X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ... IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016 | 62 | 2016 |
Magic: Malicious aging in circuits/cores N Karimi, AK Kanuparthi, X Wang, O Sinanoglu, R Karri ACM Transactions on Architecture and Code Optimization (TACO) 12 (1), 1-25, 2015 | 53 | 2015 |
SIGDROP: Signature-based ROP detection using hardware performance counters X Wang, J Backer arXiv preprint arXiv:1609.02667, 2016 | 28 | 2016 |
Two sides of the same coin: Boons and banes of machine learning in hardware security W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ... IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021 | 19 | 2021 |
Hpc-based malware detectors actually work: Transition to practice after a decade of research C Konstantinou, X Wang, P Krishnamurthy, F Khorrami, M Maniatakos, ... IEEE Design & Test 39 (4), 23-32, 2022 | 8 | 2022 |
Methodology of assessing information leakage through software-accessible telemetries C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 7 | 2021 |
Detecting kernel control-flow modifying rootkits X Wang, R Karri Network Science and Cybersecurity, 177-187, 2013 | 7 | 2013 |
Numchecker: A System Approach for Kernel Rootkit Detection X Wang, X Guo Black Hat Asia 2016, 2016 | 5 | 2016 |
The industrial control systems cyber security landscape S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ... Proceedings of the IEEE 104 (5), 2016 | 4 | 2016 |
OPAL: On-the-go Physical Attack Lab to Evaluate Power Side-channel Vulnerabilities on FPGAs R Elnaggar, S Ray, M Sabbagh, B Yuce, T Wang, J Fung 2021 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1-8, 2021 | 3 | 2021 |
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge R Guo, S Kannan, W Liu, X Wang CSAW Embedded System Challenge, 2011 | 2 | 2011 |
Reusing Hardware Performance Counters for System Security X Wang http://search.proquest.com/docview/1776488413, 2016 | | 2016 |
ConFirm X Wang, C Konstantinou, M Maniatakos, R Karri | | 2015 |