Michail (Mihalis) Maniatakos
Michail (Mihalis) Maniatakos
Associate Professor, New York University Abu Dhabi
Verified email at - Homepage
Cited by
Cited by
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
Security and privacy in cyber-physical systems: A survey of surveys
J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu
IEEE Design & Test 34 (4), 7-17, 2017
Manufacturing and security challenges in 3D printing
SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri
Jom 68 (7), 1872-1881, 2016
Systematic software-based self-test for pipelined processors
D Gizopoulos, M Psarakis, M Hatzimihail, M Maniatakos, A Paschalis, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 16 (11†…, 2008
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
Cyber-physical systems: A security perspective
C Konstantinou, M Maniatakos, F Saqib, S Hu, J Plusquellic, Y Jin
2015 20th IEEE European Test Symposium (ETS), 1-8, 2015
Machine learning-based defense against process-aware attacks on industrial control systems
A Keliris, H Salehghaffari, B Cairl, P Krishnamurthy, M Maniatakos, ...
2016 IEEE International Test Conference (ITC), 1-10, 2016
Instruction-level impact analysis of low-level faults in a modern microprocessor controller
M Maniatakos, N Karimi, C Tirumurti, A Jas, Y Makris
IEEE Transactions on Computers 60 (9), 1260-1273, 2010
ICSREF: A framework for automated reverse engineering of industrial control systems binaries
A Keliris, M Maniatakos
Network and Distributed System Security Symposium (NDSS), 2019, 2018
Impact of firmware modification attacks on power systems field devices
C Konstantinou, M Maniatakos
2015 IEEE International Conference on Smart Grid Communications†…, 2015
The HEROIC framework: Encrypted computation without shared keys
NG Tsoutsos, M Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and†…, 2015
GPS spoofing effect on phase angle monitoring and control in a real‐time digital simulator‐based hardware‐in‐the‐loop environment
C Konstantinou, M Sazos, AS Musleh, A Keliris, A Al‐Durra, M Maniatakos
IET Cyber‐Physical Systems: Theory & Applications 2 (4), 180-187, 2017
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation
NG Tsoutsos, M Maniatakos
IEEE Transactions on Emerging Topics in Computing 2 (1), 81-93, 2013
Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials 21 (4), 1800495, 2019
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems
Y Wang, E Sarkar, W Li, M Maniatakos, SE Jabari
IEEE Transactions on Information Forensics and Security 16, 4772-4787, 2021
E3: A framework for compiling C++ programs with encrypted operands
E Chielle, O Mazonka, H Gamil, NG Tsoutsos, M Maniatakos
Cryptology ePrint Archive, 2018
A case study on implementing false data injection attacks against nonlinear state estimation
C Konstantinou, M Maniatakos
Proceedings of the 2nd ACM workshop on cyber-physical systems security and†…, 2016
Advanced techniques for designing stealthy hardware trojans
NG Tsoutsos, C Konstantinou, M Maniatakos
Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014
Hardware-layer intelligence collection for smart grid embedded systems
C Konstantinou, M Maniatakos
Journal of Hardware and Systems Security 3, 132-146, 2019
The system can't perform the operation now. Try again later.
Articles 1–20