Ramesh Karri

Affiliations: 
Electrical and Computer Engineering New York University, New York, NY, United States 
Area:
Electronics and Electrical Engineering
Google:
"Ramesh Karri"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Sinanoglu O, Karri R. (2016) Guest editorial special issue on secure and trustworthy computing Acm Journal On Emerging Technologies in Computing Systems. 13
Wang X, Chai S, Isnardi M, et al. (2016) Hardware performance counter-based malware identification and detection with adaptive compressive sensing Acm Transactions On Architecture and Code Optimization. 13
Jyothi V, Wang X, Addepalli SK, et al. (2016) BRAIN: BehavioR Based Adaptive Intrusion Detection in Networks: Using Hardware Performance Counters to Detect DDoS Attacks Proceedings of the Ieee International Conference On Vlsi Design. 2016: 587-588
Rajendran J, Sinanoglu O, Karri R. (2016) Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach Ieee Transactions On Very Large Scale Integration (Vlsi) Systems
McLaughlin S, Konstantinou C, Wang X, et al. (2016) The Cybersecurity Landscape in Industrial Control Systems Proceedings of the Ieee. 104: 1039-1057
Wang X, Konstantinou C, Maniatakos M, et al. (2016) ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters 2015 Ieee/Acm International Conference On Computer-Aided Design, Iccad 2015. 544-551
Zeltmann SE, Gupta N, Tsoutsos NG, et al. (2016) Manufacturing and Security Challenges in 3D Printing Jom. 1-10
Subidh Ali S, Ibrahim M, Sinanoglu O, et al. (2015) Security Assessment of Cyberphysical DigitalMicrofluidic Biochips. Ieee/Acm Transactions On Computational Biology and Bioinformatics
Ali S, Ibrahim M, Sinanoglu O, et al. (2015) Security Assessment of Cyberphysical Digital Microfluidic Biochips. Ieee/Acm Transactions On Computational Biology and Bioinformatics / Ieee, Acm
DeTrano A, Karimi N, Karri R, et al. (2015) Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets. Thescientificworldjournal. 2015: 743618
See more...