What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jeyavijayan Rajendran
Google Scholar
ORCID:
0000-0003-3687-3746
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
LLMPirate: LLMs for Black-box Hardware IP Piracy.
Vasudev Gohil
Matthew DeLorenzo
Veera Vishwa Achuta Sai Venkat Nallam
Joey See
Jeyavijayan Rajendran
2025
conf/uss
GenHuzz: An Efficient Generative Hardware Fuzzer.
Lichao Wu
Mohamadreza Rostami
Huimin Li
Jeyavijayan Rajendran
Ahmad-Reza Sadeghi
2024
journals/tifs
(Security) Assertions by Large Language Models.
Rahul Kande
Hammond Pearce
Benjamin Tan
Brendan Dolan-Gavitt
Shailja Thakur
Ramesh Karri
Jeyavijayan Rajendran
2024
conf/uss
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning.
Vasudev Gohil
Satwik Patnaik
Dileep Kalathil
Jeyavijayan Rajendran
2024
conf/uss
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Pallavi Borkar
Chen Chen
Mohamadreza Rostami
Nikhilesh Singh
Rahul Kande
Ahmad-Reza Sadeghi
Chester Rebeiro
Jeyavijayan Rajendran
2023
conf/uss
HyPFuzz: Formal-Assisted Processor Fuzzing.
Chen Chen
Rahul Kande
Nathan Nguyen
Flemming Andersen
Aakash Tyagi
Ahmad-Reza Sadeghi
Jeyavijayan Rajendran
2023
conf/uss
FuncTeller: How Well Does eFPGA Hide Functionality?
Zhaokun Han
Mohammed Shayan
Aneesh Dixit
Mustafa M. Shihab
Yiorgos Makris
Jeyavijayan Rajendran
2022
conf/ccs
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning.
Vasudev Gohil
Hao Guo
Satwik Patnaik
Jeyavijayan Rajendran
2022
conf/uss
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Rahul Kande
Addison Crump
Garrett Persyn
Patrick Jauernig
Ahmad-Reza Sadeghi
Aakash Tyagi
Jeyavijayan Rajendran
2021
journals/tifs
Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing.
Vasudev Gohil
Mark Tressler
Kevin Sipple
Satwik Patnaik
Jeyavijayan Rajendran
2019
conf/uss
HardFails: Insights into Software-Exploitable Hardware Bugs.
Ghada Dessouky
David Gens
Patrick Haney
Garrett Persyn
Arun K. Kanuparthi
Hareesh Khattri
Jason M. Fung
Ahmad-Reza Sadeghi
Jeyavijayan Rajendran
2017
journals/tifs
Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging.
Muhammad Yasin
Ozgur Sinanoglu
Jeyavijayan Rajendran
2017
conf/ccs
Boolean Circuit Camouflage: Cryptographic Models, Limitations, Provable Results and a Random Oracle Realization.
Giovanni Di Crescenzo
Jeyavijayan Rajendran
Ramesh Karri
Nasir D. Memon
2017
conf/ccs
Provably-Secure Logic Locking: From Theory To Practice.
Muhammad Yasin
Abhrajit Sengupta
Mohammed Thari Nabeel
Mohammed Ashraf
Jeyavijayan Rajendran
Ozgur Sinanoglu
2016
conf/host
Sneak path enabled authentication for memristive crossbar memories.
Md. Badruddoja Majumder
Mesbah Uddin
Garrett S. Rose
Jeyavijayan Rajendran
2016
conf/host
Controlling your control flow graph.
Arun K. Kanuparthi
Jeyavijayan Rajendran
Ramesh Karri
2013
conf/ccs
Security analysis of integrated circuit camouflaging.
Jeyavijayan Rajendran
Michael Sam
Ozgur Sinanoglu
Ramesh Karri
2010
conf/host
SLICED: Slide-based Concurrent Error Detection Technique for Symmetric Block Ciphers.
Jeyavijayan Rajendran
Hetal Borad
Shyam Mantravadi
Ramesh Karri
Coauthors
Aakash Tyagi
(2)
Abhrajit Sengupta
(1)
Addison Crump
(1)
Ahmad-Reza Sadeghi
(5)
Aneesh Dixit
(1)
Arun K. Kanuparthi
(2)
Benjamin Tan
(1)
Brendan Dolan-Gavitt
(1)
Chen Chen
(2)
Chester Rebeiro
(1)
David Gens
(1)
Dileep Kalathil
(1)
Flemming Andersen
(1)
Garrett Persyn
(2)
Garrett S. Rose
(1)
Ghada Dessouky
(1)
Giovanni Di Crescenzo
(1)
Hammond Pearce
(1)
Hao Guo
(1)
Hareesh Khattri
(1)
Hetal Borad
(1)
Huimin Li
(1)
Jason M. Fung
(1)
Jeyavijayan Rajendran
(18)
Joey See
(1)
Kevin Sipple
(1)
Lichao Wu
(1)
Mark Tressler
(1)
Matthew DeLorenzo
(1)
Md. Badruddoja Majumder
(1)
Mesbah Uddin
(1)
Michael Sam
(1)
Mohamadreza Rostami
(2)
Mohammed Ashraf
(1)
Mohammed Shayan
(1)
Mohammed Thari Nabeel
(1)
Muhammad Yasin
(2)
Mustafa M. Shihab
(1)
Nasir D. Memon
(1)
Nathan Nguyen
(1)
Nikhilesh Singh
(1)
Ozgur Sinanoglu
(3)
Pallavi Borkar
(1)
Patrick Haney
(1)
Patrick Jauernig
(1)
Rahul Kande
(4)
Ramesh Karri
(5)
Satwik Patnaik
(3)
Shailja Thakur
(1)
Shyam Mantravadi
(1)
Vasudev Gohil
(4)
Veera Vishwa Achuta Sai Venkat Nallam
(1)
Yiorgos Makris
(1)
Zhaokun Han
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to