What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ramesh Karri
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort.
Johann Knechtel
Mohammad Eslami
Peng Zou
Min Wei
Xingyu Tong
Binggang Qiu
Zhijie Cai
Guohao Chen
Benchao Zhu
Jiawei Li
Jun Yu
Jianli Chen
Chun-Wei Chiu
Min-Feng Hsieh
Chia-Hsiu Ou
Ting-Chi Wang
Bangqi Fu
Qijing Wang
Yang Sun
Qin Luo
Anthony W. H. Lau
Fangzhou Wang
Evangeline F. Y. Young
Shunyang Bi
Guangxin Guo
Haonan Wu
Zhengguang Tang
Hailong You
Cong Li
Ramesh Karri
Ozgur Sinanoglu
Samuel Pagliarini
2025
journals/tifs
DEFending Integrated Circuit Layouts.
Jitendra Bhandari
Jayanth Gopinath
Mohammed Ashraf
Johann Knechtel
Ozgur Sinanoglu
Ramesh Karri
2024
journals/tifs
On Hardware Security Bug Code Fixes by Prompting Large Language Models.
Baleegh Ahmad
Shailja Thakur
Benjamin Tan
Ramesh Karri
Hammond Pearce
2024
journals/tifs
(Security) Assertions by Large Language Models.
Rahul Kande
Hammond Pearce
Benjamin Tan
Brendan Dolan-Gavitt
Shailja Thakur
Ramesh Karri
Jeyavijayan Rajendran
2024
conf/acns
Physically Unclonable Fingerprints for Authentication.
Navajit Singh Baban
Jiarui Zhou
Sarani Bhattacharya
Urbi Chatterjee
Sukanta Bhattacharjee
Sanjairaj Vijayavenkataraman
Yong-Ak Song
Debdeep Mukhopadhyay
Krishnendu Chakrabarty
Ramesh Karri
2024
conf/dsn
Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems.
Jason Blocklove
Md Raz
Prithwish Basu Roy
Hammond Pearce
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
2023
conf/uss
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants.
Gustavo Sandoval
Hammond Pearce
Teo Nys
Ramesh Karri
Siddharth Garg
Brendan Dolan-Gavitt
2023
conf/sp
Examining Zero-Shot Vulnerability Repair with Large Language Models.
Hammond Pearce
Benjamin Tan
Baleegh Ahmad
Ramesh Karri
Brendan Dolan-Gavitt
2023
conf/sp
Examining Zero-Shot Vulnerability Repair with Large Language Models.
Hammond Pearce
Benjamin Tan
Baleegh Ahmad
Ramesh Karri
Brendan Dolan-Gavitt
2022
conf/sp
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions.
Hammond Pearce
Baleegh Ahmad
Benjamin Tan
Brendan Dolan-Gavitt
Ramesh Karri
2021
journals/tifs
Thwarting Bio-IP Theft Through Dummy-Valve-Based Obfuscation.
Mohammed Shayan
Sukanta Bhattacharjee
Ajymurat Orozaliev
Yong-Ak Song
Krishnendu Chakrabarty
Ramesh Karri
2021
conf/ccs
NNoculation: Catching BadNets in the Wild.
Akshaj Kumar Veldanda
Kang Liu
Benjamin Tan
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
Brendan Dolan-Gavitt
Siddharth Garg
2021
conf/ccs
Protection against Counterfeiting Attacks in 3D Printing by Streaming Signature-embedded Manufacturing Process Instructions.
Akash Tiwari
Eduardo Jose Villasenor
Nikhil Gupta
A. L. Narasimha Reddy
Ramesh Karri
Satish T. S. Bukkapatnam
2020
journals/tifs
A Theoretical Study of Hardware Performance Counters-Based Malware Detection.
Kanad Basu
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
2020
journals/tifs
Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics.
Mohamed Ibrahim
Tung-Che Liang
Kristin Scott
Krishnendu Chakrabarty
Ramesh Karri
2020
journals/tifs
Anomaly Detection in Real-Time Multi-Threaded Processes Using Hardware Performance Counters.
Prashanth Krishnamurthy
Ramesh Karri
Farshad Khorrami
2020
journals/tifs
COPPTCHA: COPPA Tracking by Checking Hardware-Level Activity.
Kanad Basu
Suha Sabi Hussain
Ujjwal Gupta
Ramesh Karri
2019
journals/tifs
Bio-Protocol Watermarking on Digital Microfluidic Biochips.
Mohammed Shayan
Sukanta Bhattacharjee
Jack Tang
Krishnendu Chakrabarty
Ramesh Karri
2018
journals/tifs
Process-Aware Covert Channels Using Physical Instrumentation in Cyber-Physical Systems.
Prashanth Krishnamurthy
Farshad Khorrami
Ramesh Karri
David Paul-Pena
Hossein Salehghaffari
2017
conf/ccs
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Giovanni Di Crescenzo
Jeyavijayan Rajendran
Ramesh Karri
Nasir D. Memon
2016
conf/host
Controlling your control flow graph.
Arun K. Kanuparthi
Jeyavijayan Rajendran
Ramesh Karri
2015
conf/host
Simulation and analysis of negative-bias temperature instability aging on power analysis attacks.
Xiaofei Guo
Naghmeh Karimi
Francesco Regazzoni
Chenglu Jin
Ramesh Karri
2014
conf/host
New scan attacks against state-of-the-art countermeasures and DFT.
Sk Subidh Ali
Ozgur Sinanoglu
Samah Mohamed Saeed
Ramesh Karri
2014
conf/host
NREPO: Normal basis Recomputing with Permuted Operands.
Xiaofei Guo
Debdeep Mukhopadhyay
Chenglu Jin
Ramesh Karri
2013
conf/ccs
Security analysis of integrated circuit camouflaging.
Jeyavijayan Rajendran
Michael Sam
Ozgur Sinanoglu
Ramesh Karri
2013
conf/ccs
Hardware and embedded security in the context of internet of things.
Arun K. Kanuparthi
Ramesh Karri
Sateesh Addepalli
2012
journals/tifs
Guest Editorial Integrated Circuit and System Security.
Miodrag Potkonjak
Ramesh Karri
Ingrid Verbauwhede
Kouichi Itoh
2012
journals/tifs
Architecture Support for Dynamic Integrity Checking.
Arun K. Kanuparthi
Mohamed Zahran
Ramesh Karri
2011
conf/ccs
Are hardware performance counters a cost effective way for integrity checking of programs.
Corey Malone
Mohamed Zahran
Ramesh Karri
2010
conf/host
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers.
Jeyavijayan Rajendran
Hetal Borad
Shyam Mantravadi
Ramesh Karri
2010
conf/host
Sensor Physical Unclonable Functions.
Kurt Rosenfeld
Efstratios Gavas
Ramesh Karri
2007
conf/dsn
Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays.
Wenjing Rao
Alex Orailoglu
Ramesh Karri
2007
conf/fdtc
Register Transfer Level Concurrent Error Detection in Elliptic Curve Crypto Implementations.
Richard Stern
Nikhil Joshi
Kaijie Wu
Ramesh Karri
2004
conf/ches
Concurrent Error Detection Schemes for Involution Ciphers.
Nikhil Joshi
Kaijie Wu
Ramesh Karri
2003
conf/ches
Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers.
Ramesh Karri
Grigori Kuznetsov
Michael Gössel
Coauthors
A. L. Narasimha Reddy
(1)
Ajymurat Orozaliev
(1)
Akash Tiwari
(1)
Akshaj Kumar Veldanda
(1)
Alex Orailoglu
(1)
Anthony W. H. Lau
(1)
Arun K. Kanuparthi
(3)
Baleegh Ahmad
(4)
Bangqi Fu
(1)
Benchao Zhu
(1)
Benjamin Tan
(6)
Binggang Qiu
(1)
Brendan Dolan-Gavitt
(6)
Chenglu Jin
(2)
Chia-Hsiu Ou
(1)
Chun-Wei Chiu
(1)
Cong Li
(1)
Corey Malone
(1)
David Paul-Pena
(1)
Debdeep Mukhopadhyay
(2)
Eduardo Jose Villasenor
(1)
Efstratios Gavas
(1)
Evangeline F. Y. Young
(1)
Fangzhou Wang
(1)
Farshad Khorrami
(5)
Francesco Regazzoni
(1)
Giovanni Di Crescenzo
(1)
Grigori Kuznetsov
(1)
Guangxin Guo
(1)
Guohao Chen
(1)
Gustavo Sandoval
(1)
Hailong You
(1)
Hammond Pearce
(7)
Haonan Wu
(1)
Hetal Borad
(1)
Hossein Salehghaffari
(1)
Ingrid Verbauwhede
(1)
Jack Tang
(1)
Jason Blocklove
(1)
Jayanth Gopinath
(1)
Jeyavijayan Rajendran
(5)
Jianli Chen
(1)
Jiarui Zhou
(1)
Jiawei Li
(1)
Jitendra Bhandari
(1)
Johann Knechtel
(2)
Jun Yu
(1)
Kaijie Wu
(2)
Kanad Basu
(2)
Kang Liu
(1)
Kouichi Itoh
(1)
Krishnendu Chakrabarty
(4)
Kristin Scott
(1)
Kurt Rosenfeld
(1)
Md Raz
(1)
Michael Gössel
(1)
Michael Sam
(1)
Min Wei
(1)
Min-Feng Hsieh
(1)
Miodrag Potkonjak
(1)
Mohamed Ibrahim
(1)
Mohamed Zahran
(2)
Mohammad Eslami
(1)
Mohammed Ashraf
(1)
Mohammed Shayan
(2)
Naghmeh Karimi
(1)
Nasir D. Memon
(1)
Navajit Singh Baban
(1)
Nikhil Gupta
(1)
Nikhil Joshi
(2)
Ozgur Sinanoglu
(4)
Peng Zou
(1)
Prashanth Krishnamurthy
(5)
Prithwish Basu Roy
(1)
Qijing Wang
(1)
Qin Luo
(1)
Rahul Kande
(1)
Ramesh Karri
(35)
Richard Stern
(1)
Samah Mohamed Saeed
(1)
Samuel Pagliarini
(1)
Sanjairaj Vijayavenkataraman
(1)
Sarani Bhattacharya
(1)
Sateesh Addepalli
(1)
Satish T. S. Bukkapatnam
(1)
Shailja Thakur
(2)
Shunyang Bi
(1)
Shyam Mantravadi
(1)
Siddharth Garg
(2)
Sk Subidh Ali
(1)
Suha Sabi Hussain
(1)
Sukanta Bhattacharjee
(3)
Teo Nys
(1)
Ting-Chi Wang
(1)
Tung-Che Liang
(1)
Ujjwal Gupta
(1)
Urbi Chatterjee
(1)
Wenjing Rao
(1)
Xiaofei Guo
(2)
Xingyu Tong
(1)
Yang Sun
(1)
Yong-Ak Song
(2)
Zhengguang Tang
(1)
Zhijie Cai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to