Follow
Michael Zuzak
Michael Zuzak
Assistant Professor of Computer Engineering, Rochester Institute of Technology
Verified email at rit.edu - Homepage
Title
Cited by
Cited by
Year
Keynote: A disquisition on logic locking
A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
1282019
A survey on neural trojans
Y Liu, A Mondal, A Chakraborty, M Zuzak, N Jacobsen, D Xing, ...
2020 21st International Symposium on Quality Electronic Design (ISQED), 33-39, 2020
1002020
Strong anti-SAT: Secure and effective logic locking
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020
582020
Benchmarking at the frontier of hardware security: Lessons from logic locking
B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, ...
arXiv preprint arXiv:2006.06806, 2020
432020
Robust and attack resilient logic locking with a high application-level impact
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021
262021
Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection
Z Cheng, H Choi, S Feng, JC Liang, G Tao, D Liu, M Zuzak, X Zhang
The Twelfth International Conference on Learning Representations, 2023
232023
Trace logic locking: Improving the parametric space of logic locking
M Zuzak, Y Liu, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
222020
A Resource Binding Approach to Logic Obfuscation
M Zuzak, Y Liu, A Srivastava
2021 58th ACM/IEEE Design Automation Conference (DAC), 1-6, 2021
132021
Nested mimd-simd parallelization for heterogeneous microprocessors
D Gerzhoy, X Sun, M Zuzak, D Yeung
ACM Transactions on Architecture and Code Optimization (TACO) 16 (4), 1-27, 2019
122019
Obfusgem: Enhancing processor design obfuscation through security-aware on-chip memory and data path design
M Zuzak, A Srivastava
Proceedings of the International Symposium on Memory Systems, 260-271, 2020
92020
Memory locking: An automated approach to processor design obfuscation
M Zuzak, A Srivastava
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 541-546, 2019
92019
A combined logical and physical attack on logic obfuscation
M Zuzak, Y Liu, I McDaniel, A Srivastava
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022
72022
Evaluating the Security of Logic-Locked Probabilistic Circuits
M Zuzak, A Mondal, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
72021
A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks
Y Liu, M Zuzak, D Xing, I McDaniel, P Mittu, O Ozbay, A Akib, A Srivastava
2022 IEEE 4th International Conference on Artificial Intelligence Circuits …, 2022
42022
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators
H Xu, D Liu, C Merkel, M Zuzak
arXiv preprint arXiv:2304.06017, 2023
32023
A black-box sensitization attack on SAT-hard instances in logic obfuscation
I McDaniel, M Zuzak, A Srivastava
2022 IEEE 40th International Conference on Computer Design (ICCD), 239-246, 2022
22022
StatSAT: A Boolean satisfiability based attack on logic-locked probabilistic circuits
A Mondal, M Zuzak, A Srivastava
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
22020
HMCTherm: A cycle-accurate HMC simulator integrated with detailed power and thermal simulation
Z Yang, M Zuzak, A Srivastava
Proceedings of the International Symposium on Memory Systems, 209-117, 2018
22018
Exploiting multi-loop parallelism on heterogeneous microprocessors
M Zuzak, D Yeung
Proceedings of the 10th International Workshop on Programmability and …, 2017
22017
Removal of sat-hard instances in logic obfuscation through inference of functionality
I McDaniel, M Zuzak, A Srivastava
ACM Transactions on Design Automation of Electronic Systems 29 (4), 1-23, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20