Follow
Nektarios Georgios Tsoutsos
Nektarios Georgios Tsoutsos
Assistant Professor, University of Delaware
Verified email at udel.edu - Homepage
Title
Cited by
Cited by
Year
Manufacturing and Security Challenges in 3D Printing
SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri
JOM, 1-10, 2016
2952016
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation
NG Tsoutsos, M Maniatakos
Emerging Topics in Computing, IEEE Transactions on, 1-1, 2013
652013
Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials 21 (4), 1800495, 2019
642019
The HEROIC framework: Encrypted computation without shared keys
NG Tsoutsos, M Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
632015
E 3: A Framework for Compiling C++ Programs with Encrypted Operands
E Chielle, O Mazonka, NG Tsoutsos, M Maniatakos
482018
Advanced techniques for designing stealthy hardware trojans
NG Tsoutsos, C Konstantinou, M Maniatakos
Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014
402014
ObfusCADe: Obfuscating additive manufacturing cad models against counterfeiting
N Gupta, F Chen, NG Tsoutsos, M Maniatakos
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
332017
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering
NG Tsoutsos, H Gamil, M Maniatakos
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 15-20, 2017
302017
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
O Mazonka, NG Tsoutsos, M Maniatakos
IEEE Transactions on Information Forensics and Security, 1-16, 2016
302016
HEROIC: Homomorphically EncRypted One Instruction Computer
NG Tsoutsos, M Maniatakos
Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 …, 2014
272014
Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs
D Mouris, NG Tsoutsos
IEEE Transactions on Information Forensics and Security, 1-16, 2021
262021
Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds
A Keliris, C Konstantinou, NG Tsoutsos, R Baiad, M Maniatakos
Asia and South Pacific Design Automation Conference (ASPDAC), 511-518, 2016
222016
REDsec: Running Encrypted Discretized Neural Networks in Seconds
L Folkerts, C Gouert, NG Tsoutsos
Network and Distributed System Security Symposium (NDSS), 1-17, 2023
21*2023
Investigating the application of one instruction set computing for encrypted data computation
NG Tsoutsos, M Maniatakos
International Conference on Security, Privacy, and Applied Cryptography …, 2013
212013
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
C Gouert, D Mouris, NG Tsoutsos
Privacy Enhancing Technologies Symposium (PETS) 2023 (3), 154-172, 2023
202023
Security assessment and impact analysis of cyberattacks in integrated T&D power systems
I Zografopoulos, C Konstantinou, NG Tsoutsos, D Zhu, R Broadwater
Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical …, 2021
172021
SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology
D Tychalas, NG Tsoutsos, M Maniatakos
Asia and South Pacific Design Automation Conference (ASPDAC) 2017, 1-6, 2017
172017
NFTs For 3D Models: Sustaining Ownership In Industry 4.0
D Mouris, NG Tsoutsos
IEEE Consumer Electronics Magazine, 2022
162022
TERMinator Suite: Benchmarking Privacy-Preserving Architectures
D Mouris, NG Tsoutsos, M Maniatakos
Cryptology ePrint Archive 2017 (1218), 1-12, 2017
162017
Computer aided design (CAD) model search and retrieval using frequency domain file conversion
W Li, G Mac, NG Tsoutsos, N Gupta, R Karri
Additive Manufacturing 36, 101554, 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20