Michail (Mihalis) Maniatakos
Michail (Mihalis) Maniatakos
Associate Professor, New York University Abu Dhabi
Verified email at nyu.edu - Homepage
Cited by
Cited by
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
Security and privacy in cyber-physical systems: A survey of surveys
J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu
IEEE Design & Test 34 (4), 7-17, 2017
Manufacturing and security challenges in 3D printing
SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri
Jom 68 (7), 1872-1881, 2016
Systematic software-based self-test for pipelined processors
D Gizopoulos, M Psarakis, M Hatzimihail, M Maniatakos, A Paschalis, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 16 (11 …, 2008
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
Instruction-level impact analysis of low-level faults in a modern microprocessor controller
M Maniatakos, N Karimi, C Tirumurti, A Jas, Y Makris
IEEE Transactions on Computers 60 (9), 1260-1273, 2010
Cyber-physical systems: A security perspective
C Konstantinou, M Maniatakos, F Saqib, S Hu, J Plusquellic, Y Jin
2015 20th IEEE European Test Symposium (ETS), 1-8, 2015
Impact of firmware modification attacks on power systems field devices
C Konstantinou, M Maniatakos
2015 IEEE International Conference on Smart Grid Communications …, 2015
The HEROIC framework: Encrypted computation without shared keys
NG Tsoutsos, M Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
Machine learning-based defense against process-aware attacks on industrial control systems
A Keliris, H Salehghaffari, B Cairl, P Krishnamurthy, M Maniatakos, ...
2016 IEEE International Test Conference (ITC), 1-10, 2016
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation
NG Tsoutsos, M Maniatakos
IEEE Transactions on Emerging Topics in Computing 2 (1), 81-93, 2013
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment
C Konstantinou, M Sazos, AS Musleh, A Keliris, A Al-Durra, M Maniatakos
IET Cyber-Physical Systems: Theory & Applications 2 (4), 180-187, 2017
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials 21 (4), 1800495, 2019
Advanced techniques for designing stealthy hardware trojans
NG Tsoutsos, C Konstantinou, M Maniatakos
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-4, 2014
ICSREF: A framework for automated reverse engineering of industrial control systems binaries
A Keliris, M Maniatakos
arXiv preprint arXiv:1812.03478, 2018
On the correlation between controller faults and instruction-level errors in modern microprocessors
N Karimi, M Maniatakos, A Jas, Y Makris
2008 IEEE International Test Conference, 1-10, 2008
Workload-driven selective hardening of control state elements in modern microprocessors
M Maniatakos, Y Makris
2010 28th VLSI test symposium (VTS), 159-164, 2010
ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting
N Gupta, F Chen, NG Tsoutsos, M Maniatakos
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
Cryptoleq: A heterogeneous abstract machine for encrypted and unencrypted computation
O Mazonka, NG Tsoutsos, M Maniatakos
IEEE Transactions on Information Forensics and Security 11 (9), 2123-2138, 2016
The system can't perform the operation now. Try again later.
Articles 1–20