Book Chapters

  1. Hiroto Yasuura, Chong-Min Kyung, Yongpan Liu, and Youn-Long Lin, "Smart Sensors at the IoT Frontier," Springer, 2017 (Orlando Arias, Kelvin Ly, and Yier Jin, "Security and Privacy in IoT Era") [PDF]
  2. S. Bhunia, S. Ray, and S. Sur-Kolay (Editors), "Fundamentals of IP and SoC Security - Design, Verification and Debug," Springer, 2017 (Xiaolong Guo, Xiaolong Guo, and Yier Jin, "Chapter 10. IP Trust Validation Using Proof-Carrying Hardware") [PDF]
  3. P. Mishra, S. Bhunia, and M. Tehranipoor (Editors), "Hardware IP Security and Trust," Springer, 2017 (Raj Gautam Dutta, Xiaolong Guo and Yier Jin, "Chapter 4. IP Trust: The Problem and Design/Validation-Based Solution") [PDF]
  4. C. Hong, M Potkonjak (Editors), "Secure System Design and Trustable Computing", Springer, 2016 (Yier Jin, Dimitry Maliuk, Yiorgos Makris, "Chapter 7. Hardware Trojan Detection in Analog/RF Integrated Circuits") [PDF]
  5. M. Tehranipoor, C. Wang (Editors), “Introduction to Hardware Security and Trust,” Springer, 2011 (Yier Jin, Eric Love, Yiorgos Makris, "Chapter 16. Design for Hardware Trust") [PDF]

Journal Publications

  1. [TVLSI '17] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification," IEEE Transactions on Very Large Scale Integration System (TVLSI), vol. 25, no. 12, 2017. [PDF]
  2. [TCAD '17] Juan Wang, Hong Zhi, Yuhan Zhang, and Yier Jin, "Enabling Security-enhanced Attestation With Intel SGX for Remote Terminal and IoT," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2017. (to appear) [PDF]
  3. [TVLSI '17] Jiaji He, Yiqiang Zhao, Xiaolong Guo, Yier Jin, "Hardware Trojan Detection through Chip-Free Electromagnetic Side-Channel Statistical Analysis," IEEE Transactions on Very Large Scale Integration System (TVLSI), vol. 25, no. 10, pp. 2939-2948, 2017. [PDF]
  4. [TIFS '17] Yier Jin, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, and Yiorgos Makris, "Data Secrecy Protection through Information Flow Tracking in Proof-Carrying Hardware IP (Part I: Framework Fundamentals)," IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 10, pp. 2416-2429, 2017. [PDF]
  5. [TIFS '17] Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin, and Yiorgos Makris, "Data Secrecy Protection through Information Flow Tracking in Proof-Carrying Hardware IP (Part II: Framework Automation)," IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 10, pp. 2430-2443, 2017. [PDF]
  6. [TVLSI '16] Yu Liu, Yier Jin, Aria Nosratinia, and Yiorgos Makris, "Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs," IEEE Transactions on Very Large Scale Integration Systems (TVLSI), vol. 25, no. 4, pp. 1506-1519, 2017. [PDF]
  7. [Integration '16] Travis Meade, Shaojie Zhang, and Yier Jin, "IP Protection Through Gate-Level Netlist Security Enhancement," Integration, the VLSI Journal, 2016. [PDF]
  8. [TIFS '16] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems," IEEE Transactions on Information Forensics and Security (TIFS), 2016. [PDF]
  9. [TMSCS '16] Jacob Wurm, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor, "Introduction to Cyber-Physical System Security: A Cross-Layer Perspective,'' IEEE Transactions on Multi-Scale Computing Systems, 2016. [PDF]
  10. [TETC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael Niemier, and X. Sharon Hu, "Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs,'' IEEE Transactions on Emerging Topics in Computing (TETC), 2016. [PDF]
  11. [TODAES '16] Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and M. Tehranipoor, "Hardware Trojans: Lessons Learned After One Decade of Research,'' ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, no. 1, pp. 6:1-6:23, 2016. [PDF]
  12. [D&T '16] Sandip Ray, Yier Jin, and Arijit Raychowdhury, "The Changing Computing Paradigm with Internet of Things: A Tutorial Introduction," IEEE Design & Test, vol. 33, no. 2, pp. 76-96, 2016. [PDF]
  13. [JETC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre Gaillardon, Giovanni Micheli, Xunzhao Yin, X. Shanron Hu, Michael Niemier, and Yier Jin, "Emerging Technology based Design of Primitives for Hardware Security," ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 13, issue 1, pp. 3:1-3:19, 2016. [PDF]
  14. [TMSCS '15] Orlando Arias, Jacob Wurm, Khoa Hoang, and Yier Jin, "Privacy and Security in Internet of Things and Wearable Devices," IEEE Transactions on Multi-Scale Computing Systems, vol.1, no. 2, pp. 99-109, 2015. [PDF]
  15. [Electronics '15] Yier Jin, "Introduction to Hardware Security," Electronics, vol. 4, issue. 4, pp. 763-784, 2015. [PDF]
  16. [Electronics '15] Yu Bi, Jiann-Shiun Yuan, and Yier Jin, "Beyond the Interconnections: Split Manufacturing in RF Designs," electronics, vol. 4, issue. 3, pp. 541-564, 2015. [PDF]
  17. [ACR '14] Daniela Oliveira, Nick Wetzel, Max Bucci, Jesus Navarro, Dean Sullivan, and Yier Jin, "Hardware-Software Collaboration for Secure Coexistence with Kernel Extensions," ACM SIGAPP Applied Computing Review, vol. 14, no. 3, pp. 22-35, 2014. [PDF]
  18. [TIFS '12] Eric Love, Yier Jin, and Yiorgos Makris, “Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition,” Special Issue on Integrated Circuits and System Security of the IEEE Transactions on Information Forensics and Security (TIFS), vol. 7, no. 1, pp. 25-40, 2012 [PDF] .
  19. [D&T '10] Yier Jin, and Yiorgos Makris, "Hardware Trojans in wireless cryptographic integrated circuits," IEEE Design & Test on Computers, vol. 27, pp. 10-25, 2010. [PDF]
  20. [IPL '08] Haibin Shen, and Yier Jin, "Low complexity bit parallel multiplier for GF(2 m) generated by equally-spaced trinomials," Information Processing Letters, Volume 107, Issue 6, 2008, pp. 211-215. [PDF]
  21. Yier Jin, Haibin Shen, Huafeng Chen, and Xiaolang Yan, "Research of fast modular multiplier for a class of finite fields," Journal of Electronics(China), Volume 25, Issue 4, 2008, pp. 482-487. [PDF]

Conference Publications

  1. [ASP-DAC '18] Tao Liu, Lei Jiang, Yier Jin, Gang Quan, and Wujie Wen, "PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning," 23rd Asia and South Paci.c Design Automation Conference (ASP-DAC), 2018. (to appear)
  2. [ASP-DAC '18] Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, and Wujie Wen, "Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks," 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 2018. (to appear)
  3. [AsianHOST '17] Xiaolong Guo, Raj Gautam Dutta, Jiaji He, and Yier Jin, "PCH Framework for IP Runtime Security Verification," Asian Hardware Oriented Security and Trust (AsianHOST), 2017, pp. 79-84. [PDF]
  4. [GLOBECOM '17] Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin, and Xinwen Fu, "An End-to-End View of IoT Security and Privacy," IEEE GLOBECOM, 2017. [PDF]
  5. [ICCAD '17] Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, and Wujie Wen, "MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation," International Conference On Computer Aided Design (ICCAD), 2017. (Best Paper Candidate) (to appear)
  6. [ICCAD '17] Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin, and Ahmad-Reza Sadeghi, "ATRIUM: Runtime Attestation Resilient Under Memory Attacks," International Conference On Computer Aided Design (ICCAD), 2017. (Best Paper Candidate) (to appear)
  7. [RAID '17] David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, and Ahmad-Reza Sadeghi, "LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization," International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2017. [PDF]
  8. [HASP '17] Orlando Arias, Dean Sullivan, and Yier Jin, "HA2lloc: Hardware-Assisted Secure Allocator," Hardware and Architectural Support for Security and Privacy (HASP), 2017. [PDF]
  9. [ISCAS '17] Travis Meade, Zheng Zhao, Shaojie Zhang, David Pan, and Yier Jin, "Revisit Sequential Logic Obfuscation: Attacks and Defenses," IEEE International Symposium on Circuits and Systems (ISCAS), 2017. [PDF]
  10. [GLSVLSI '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "Cyclic Obfuscation for Creating SAT-Unresolvable Circuits," GLSVLSI, 2017, pp. 357-362. [PDF]
  11. [GLSVLSI '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail?" GLSVLSI, 2017, pp. 173-178. [PDF]
  12. [DAC '17] Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin Kwiat, Charles Kamhoua, Laurent Njilla, and Yier Jin, "Estimation of Safe Sensor Measurements of Autonomous System Under Attack," IEEE/ACM Design Automation Conference (DAC), 2017. (to appear) [PDF]
  13. [HOST '17] Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin, "AppSAT: Approximately Deobfuscating Integrated Circuits," IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2017, pp. 46-51. (Best Paper Award) [PDF]
  14. [GOMAC '17] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Proof-Carrying Hardware based IP Protection," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-17), 2017.
  15. [GOMAC '17] Raj Gautam Dutta, Xiaolong Guo, and Yier Jin, "Trusted Autonomous Systems under Sensor Attacks," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-17), 2017.
  16. [ICNC '17] Nathalie Domingo, Bryan Pearson and Yier Jin, "Exploitations of Wireless Interfaces via Network Scanning," International Conference on Computing, Networking and Communications (ICNC), 2017. (REU Site Paper) [PDF]
  17. [ASP-DAC '17] Zihao Liu, Wujie Wen, Lei Jiang, Yier Jin, and Gang Quan, "A Statistical STT-RAM Retention Model for Fast Memory Subsystem Designs," 22nd Asia and South Pacific Design Automation Conference (ASP-DAC) , 2017, pp. 720-725. [PDF]
  18. [AsianHOST '16] Zhang Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin, "How Secure is Split Manufacturing in Preventing Hardware Trojan?" IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2016. [PDF]
  19. [MTV '16] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Automatic RTL-to-Formal Code Converter for IP Security Formal Verification," 17th International Workshop on Microprocessor and SOC Test and Veri.cation (MTV), 2016. [PDF]
  20. [BH-EU '16] Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi, and Yier Jin, "Policy Agnostic Control-Flow Integrity," Black Hat Europe, 2016. [PDF]
  21. [ICCD '16] Kelvin Ly, Orlando Arias, Jacob Wurm, Khoa Hoang, Kaveh Shamsi, and Yier Jin, "Voting System Design Pitfalls: Vulnerability Analysis and Exploitation of a Model Platform," IEEE International Conference on Computer Design (ICCD) , 2016, pp. 149-152. [PDF]
  22. [ISTFA '16] Travis Meade, Shaojie Zhang, Zheng Zhao, David Pan, and Yier Jin, "Gate-Level Netlist Reverse Engineering Tool Set for Functionality Recovery and Malicious Logic Detection," International Symposium for Testing and Failure Analysis (ISTFA) , 2016. [PDF]
  23. [SOCC '16] Raj Gautam Dutta, Xiaolong Guo, and Yier Jin, "Quantifying Trust in Autonomous System Under Uncertainties," 29th IEEE International System-on-Chip Conference (SOCC) , 2016, pp. 362-367. [PDF]
  24. [ICCAD '16] Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan, "Provably Secure Camouflaging Strategy for IC Protection," International Conference On Computer Aided Design (ICCAD) , 2016. [PDF]
  25. [ISVLSI '16] Kaveh Shamsi, Wujie Wen, and Yier Jin, "Hardware Security Challenges Beyond CMOS: Attacks and Remedies," IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2016, pp. 200-205. [PDF]
  26. [ISVLSI '16] Kelvin Ly and Yier Jin, "Security Challenges in CPS and IoT: from End-Node to the System," IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2016, pp. 63-68. [PDF]
  27. [EMBC '16] kelvin Ly, and Yier Jin, "Security Studies on Wearable Fitness Trackers," 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2016. [PDF]
  28. [DAC '16] Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, and Yier Jin, "Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity,"IEEE/ACM Design Automation Conference (DAC'16), 2016, pp. 83.2:1-6. [PDF]
  29. [DAC '16] Nancy Cam-Winget, Ahmad-Reza Sadeghi, and Yier Jin, "Can IoT be Secured: Emerging Challenges in Connecting the Unconnected," IEEE/ACM Design Automation Conference (DAC'16), 2016, pp. 71.3:1-6. [PDF]
  30. [DAC '16] Adib Nahiyan, Domenic Forte, Yier Jin, Mark Tehranipoor, Xiao Kan, and Kun Yang, "Framework of Security Vulnerabilities in Finite State Machines," IEEE/ACM Design Automation Conference (DAC'16), 2016, pp. 57.4:1-6. [PDF]
  31. [ISCAS '16] Travis Meade, Yier Jin, Mark Tehranipoor, and Shaojie Zhang, "Gate-Level Netlist Reverse Engineering for Hardware Security: Control Logic Register Identification," IEEE International Symposium on Circuits and Systems (ISCAS), 2016, pp. 1334-1337. [PDF]
  32. [GLSVLSI '16] Yu Bi, Kaveh Shamsi, Xunzhao Yin, Michael Niemier, Sharon Hu, and Yier Jin, "Enhancing Hardware Security with Emerging Transistor Technologies," GLSVLSI, 2016, pp. 305-310. [PDF]
  33. [HOST '16] Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, and Yier Jin, "Scalable SoC Trust Verification using Integrated Theorem Proving and Model Checking,'' IEEE Symposium on Hardware Oriented Security and Trust (HOST), 2016, pp. 124-129. [PDF]
  34. [VTS '16] Kaveh Shamsi and Yier Jin, "Security of Emerging Non-Volatile Memories: Attacks and Defenses,'' IEEE VLSI Test Symposium (VTS), 2016. [PDF]
  35. [VTS '16] Sandip Ray, Swarup Bhunia, Yier Jin, and Mark Tehranipoor, "[Extended Abstract] Security Validation in IoT Space,'' IEEE VLSI Test Symposium (VTS), 2016. [PDF]
  36. [DATE '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Francois-Xavier Standaert, and Yier Jin, "Leverage Emerging Technologies For DPA-Resilient Block Cipher Design," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp. 1538-1543. [PDF]
  37. [DATE '16] An Chen, X. Sharon Hu, Yier Jin, Michael Niemier, Xunzhao Yin, "Using Emerging Technologies for Hardware Security Beyond PUFs," Design, Automation and Test in Europe Conference and Exhibition (DATE), 2016, pp. 1544-1549. [PDF]
  38. [ASP-DAC '16] Travis Meade, Shaojie Zhang, and Yier Jin, "Netlist Reverse Engineering for High-Level Functionality Reconstruction," in 21st Asia and South Pacific Design Automation Conference (ASP-DAC 2016), 2016, pp. 655-660. (Best Paper Award) [PDF]
  39. [ASP-DAC '16] Jacob Wurm, Orlando Arias, Khoa Hoang, Ahmad-Reza Sadeghi and Yier Jin, "Security analysis on consumer and industrial IoT Devices," in 21st Asia and South Pacific Design Automation Conference (ASP-DAC 2016), 2016, pp. 519-524. [PDF]
  40. [GOMAC '16] Kaveh Shamsi, Pierre-Emmanuel Gaillardon, and Yier Jin, "Hardware Platform Protection Using Emerging Memory Technologies," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 21-24.
  41. [GOMAC '16] Travis Meade, Shaojie Zhang, Mark Tehranipoor, and Yier Jin, "A Comprehensive Netlist Reverse Engineering Toolset for IC Trust," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 281-284.
  42. [GOMAC '16] Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, and Yier Jin, "More Than Moore in Security: Emerging Device based Low-Power Di.erentiate Power Analysis Countermeasures," Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), 2016, pp. 467-470.
  43. [CPSS '16] Kelvin Ly, Wei Sun, and Yier Jin, "Emerging Challenges in Cyber-Physical Systems: A Balance of Performance, Correctness, and Security," IEEE Infocom CPSS Workshop, 2016.
  44. [ICCAD '15] Sandip Ray, and Yier Jin, "Security Policy Enforcement in Modern SoC Designs," International Conference On Computer Aided Design (ICCAD), 2015, pp. 345-350. [PDF]
  45. [MTV '15] Xiaolong Guo, Raj Gautam Dutta, and Yier Jin, "Hierarchy-Preserving Formal Verification Methods for Pre-Silicon Security Assurance," 16th International Workshop on Microprocessor and SOC Test and Verification (MTV), 2015. [PDF]
  46. [ICCD '15] Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael Niemier and X. Sharon Hu, “Reliable and High Performance STT-MRAM Architectures based on Controllable-Polarity Devices,” IEEE International Conference on Computer Design (ICCD), 2015, pp. 372-379. [PDF]
  47. [MILCOM '15] Omar Nakhila, Yier Jin, and Cliff Zou, “Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks,” IEEE Military Communications Conference (MILCOM), 2015. [PDF]
  48. [DAC '15] Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, and Yier Jin, ``HAFIX: Hardware-Assisted Flow Integrity Extension,'' IEEE/ACM Design Automation Conference (DAC'15), 2015. (Best Paper Award) [PDF]
  49. [DAC '15] Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, and Prabhat Mishra, ``Pre-Silicon Security Verification and Validation: A Formal Perspective,'' IEEE/ACM Design Automation Conference (DAC'15), 2015. [PDF]
  50. [DAC '15] Y. Liu, S. Hu, J. Wu, Y. Shi, Y. Jin, Y. Hu, and X. Li, ``Impact assessment of net metering on smart home cyberattack detection,'' IEEE/ACM Design Automation Conference (DAC'15), 2015. [PDF]
  51. [SAM '15] Yu Bi, Jiann-Shiun Yuan, and Yier Jin, "Split Manufacturing in Radio-Frequency Designs," The 2015 International Conference on Security and Management (SAM'15), 2015, pp. 204-210. [PDF]
  52. [ETS '15] Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic, and Y. Jin, ``Cyber-Physical Systems: A Security Perspective,'' European Test Symposium (ETS'15), 2015. [PDF]
  53. [GOMAC '15] J. Biggers, T. Meade, S. Zhang, Y. Pino, and Y. Jin, ``Automated RTL Code Rebuilding through Netlist Analysis,'' Government Microcircuit Applications and Critical Technology Conference (GOMACTech-15), 2015, pp. 155-158.
  54. [UCF_Sensor '15] Yier Jin, "Innovative IoT Authentication Methods Leveraging Smart Sensors," UCF Conference on Sensor Devices and Applications, Oct 2015.
  55. [RSA '15] Ray Potter, Yier Jin, "Don't Touch That Dial: How Smart Thermostats Have Made Us Vulnerable," RSA Conference, 2015.
  56. [CHASE '15] Yier Jin, "Security and Privacy in Internet of Things and Wearable Devices," CHASE Conference on Secure/Trustworthy Systems and Supply Chain Assurance, 2015.
  57. [ATS '14] Y. Bi, P-E. Gaillardon, X. Hu, M. Niemier, J-S. Yuan, and Y. Jin, "Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs," Asia Test Symposium (ATS), 2014, pp. 342-247. [PDF]
  58. [ISVLSI '14] Y. Jin, "Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits,"IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2014, pp. 19-24. [PDF]
  59. [DAC '14] D. Sullivan, J. Biggers, G. Zhu, S. Zhang, and Y. Jin, "FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness,'' Design Automation Conference (DAC), 2014, pp. 173:1--173:4. [PDF]
  60. [DATE '14] Y. Jin, and D. Sullivan, "Real-Time Trust Evaluation in Integrated Circuits," Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. [PDF]
  61. [DATE '14] Y. Jin, "EDA Tools Trust Evaluation through Security Property Proofs," Design, Automation and Test in Europe Conference and Exhibition, (DATE), 2014. [PDF]
  62. [TrustED '14] Yier Jin, "Embedded System Security in Smart Consumer Electronics," 4th International Workshop on Trustworthy Embedded Devices (TrustED 2014), 2014, pp. 59-59.
  63. [BLACKHAT '14] Yier Jin, Grant Hernandez, and Daniel Buentello, "Smart Nest Thermostat: A Smart Spy in Your Home," Black Hat USA, 2014.
  64. [SHAW '14] Yier Jin, and Daniela Oliveira, "Trustworthy SoC Architecture with On-Demand Security Policies and HW-SW Cooperation," 5th Workshop on SoCs, Heterogeneous Architectures and Workloads (SHAW-5), 2014.
  65. [ICCAD '13] Y. Jin, and Y. Makris, "A Proof-Carrying Based Framework for Trusted Microprocessor IP," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013. [PDF]
  66. [ICCAD '13] Y. Liu, Y. Jin, and Y. Makris, "Hardware Trojans in Wireless Cryptographic ICs: Silicon Demonstration and Detection Method Evaluation," IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013. [PDF]
  67. [IOLTS '13] Y. Jin, D. Maliuk and Y. Makris, "A Post-Deployment IC Trust Evaluation Architecture," Proceedings of IEEE International On-Line Testing Symposium (IOLTS), 2013. (invited) [PDF]
  68. [HOST '13] Y. Jin, B. Yang and Y. Makris, "Cycle Accurate Information Assurance by Proof Carrying-Based Signal Sensitivity Tracing," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, pp. 99-106. [PDF]
  69. [ETS '13] Ozgur Sinanoglu, Naghmeh karimi, Jeyavijayan Rajendran, Ramesh Karri, Yier Jin, Dimitry Maliuk, Ke Huang, Yiorgos Makris, "Reconciling the IC Test and Security Dichotomy," Proceedings of 18th IEEE European Test Symposium (ETS), 2013, pp. 1-6. [PDF]
  70. [ICCD '12] Y. Jin, M. Mihalis and Y. Makris, "Exposing Vulnerabilities of Untrusted Computing Platforms," Proceedings of the IEEE International Conference on Computer Design (ICCD), 2012, pp. 131-134. [PDF]
  71. [VTS '12] Y. Jin, and Y. Makris, "Proof Carrying-Based Information Flow Tracking for Data Secrecy Protection and Hardware Trust," Proceedings of VLSI Test Symposium (VTS), 2012, pp. 252-257. [PDF]
  72. [DATE '12] Y. Jin, D. Maliuk and Y. Makris, "Post-Deployment Trust Evaluation in Wireless Cryptographic ICs," Proceedings of the Design, Automation & Test in Europe (DATE), 2012, pp. 965-970. [PDF]
  73. [ICECS '11] Y. Jin and Y. Makris, "PSCML: Pseudo-Static Current Mode Logic," Proceedings of 18th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2011, pp. 41-44. [PDF]
  74. [ICCD '11] Y. Jin and Y. Makris, "Is Single Trojan Detection Scheme Enough?," Proceedings of the IEEE International Conference on Computer Design (ICCD), 2011, pp. 305-308. [PDF]
  75. [HOST '11] E. Love, Y. Jin and Y. Makris, "Enhancing Security via Provably Trustworthy Hardware Intellectual Property," Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2011. [PDF]
  76. [ICECS '10] Y. Jin and Y. Makris, "DFTT: Design-for-Trojan-Test," Proceedings of 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2010. [PDF]
  77. [HOST '09] Y. Jin, N. Kupp and Y. Makris, "Experiences in hardware Trojan design and implementation," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2009, pp. 50-57. [PDF]
  78. [HOST '08] Y. Jin, and Y. Makris, "Hardware Trojan detection using path delay fingerprint," Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2008, pp. 51-57. [PDF]
  79. [ICSICT '06] Y. Jin, and H. Shen, "Revisiting scalable modular multiplication over GF(2m) for elliptic curve cryptography," Proceedings of 8th International Conference on Solid-State and Integrated Circuit Technology, 2006. [PDF]
  80. [CHINACOM '06] Y. Jin, H. Shen, and R. You, "Implementation of SMS4 Block Cipher on FPGA," Proceedings of International Conference on Communications and Networking in China (CHINACOM), 2006. [PDF]
  81. [ICICIC '06] H. Shen, and Y. Jin, "Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation," Proceedings of International Conference on Innovative Computing, Information and Control (ICICIC), pp. 190-193, 2006. [PDF]
  82. [CIS '06] Dawei Li, Yier Jin, Haibin Shen, and Xiaolang Yan, "Design of Random Number Generation Algorithm," Proceedings of International Conference on Computational Intelligence and Security (CIS), 2006, pp. 1287-1290. [PDF]
  83. [EUC '06] Rongquan You, Haibin Shen, Yier Jin, and Aiming Ji, "Interconnect Estimation for Mesh-Based Reconfigurable Computing," Proceedings of The IFIP International Conference on Embedded and Ubiquitous Computing (EUC), LNCS 4096, 2006, pp. 766-775. [PDF]