default search action
Nader Sehatbakhsh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Hossein Khalili, Hao-Jen Chien, Amin Hass, Nader Sehatbakhsh:
Context-Aware Hybrid Encoding for Privacy-Preserving Computation in IoT Devices. IEEE Internet Things J. 11(1): 1054-1064 (2024) - [c21]Ebadollah Taheri, Pooya Aghanoury, Sudeep Pasricha, Mahdi Nikdast, Nader Sehatbakhsh:
SCRIPT: A Multi-Objective Routing Framework for Securing Chiplet Systems against Distributed DoS Attacks. ACM Great Lakes Symposium on VLSI 2024: 78-85 - [c20]Gaofeng Dong, Jason Wu, Julian de Gortari Briseno, Akash Deep Singh, Justin Feng, Ankur Sarker, Nader Sehatbakhsh, Mani Srivastava:
RefreshChannels: Exploiting Dynamic Refresh Rate Switching for Mobile Device Attacks. MobiSys 2024: 359-371 - [c19]Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh:
IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. NDSS 2024 - [c18]Fatemeh Arkannezhad, Pooya Aghanoury, Justin Feng, Hossein Khalili, Nader Sehatbakhsh:
SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels. SP (Workshops) 2024: 253-259 - [c17]Hossein Khalili, Alexander Chen, Theodoros Papaiakovou, Timothy Jacques, Hao-Jen Chien, Changwei Liu, Aolin Ding, Amin Hass, Saman A. Zonouz, Nader Sehatbakhsh:
Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels. SP (Workshops) 2024: 260-266 - [i4]Alexander Vilesov, Yuan Tian, Nader Sehatbakhsh, Achuta Kadambi:
Solutions to Deepfakes: Can Camera Hardware, Cryptography, and Deep Learning Verify Real Images? CoRR abs/2407.04169 (2024) - [i3]Hossein Khalili, Seongbin Park, Vincent Li, Brandan Bright, Ali Payani, Ramana Rao Kompella, Nader Sehatbakhsh:
LightPure: Realtime Adversarial Image Purification for Mobile Devices Using Diffusion Models. CoRR abs/2409.00340 (2024) - 2023
- [j8]Justin Feng, Fatemeh Arkannezhad, Christopher Ryu, Enoch Huang, Siddhant Gupta, Nader Sehatbakhsh:
Simulating Our Way to Safer Software: A Tale of Integrating Microarchitecture Simulation and Leakage Estimation Modeling. IEEE Comput. Archit. Lett. 22(2): 109-112 (2023) - [j7]Justin Feng, Tianyi Zhao, Shamik Sarkar, Dominic Konrad, Timothy Jacques, Danijela Cabric, Nader Sehatbakhsh:
Fingerprinting IoT Devices Using Latent Physical Side-Channels. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 54:1-54:26 (2023) - [c16]Yousef Safari, Pooya Aghanoury, Subramanian S. Iyer, Nader Sehatbakhsh, Boris Vaisband:
Hybrid Obfuscation of Chiplet-Based Systems. DAC 2023: 1-6 - [c15]Aolin Ding, Amin Hass, Matthew Chan, Nader Sehatbakhsh, Saman A. Zonouz:
Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems. ICONIP (5) 2023: 188-201 - [c14]Justin Feng, Timothy Jacques, Omid Abari, Nader Sehatbakhsh:
Everything has its Bad Side and Good Side: Turning Processors to Low Overhead Radios Using Side-Channels. IPSN 2023: 288-301 - [c13]Justin Feng, Timothy Jacques, Omid Abari, Nader Sehatbakhsh:
Demo Abstract: Leveraging Side-Channels to Turn Processors into Low Overhead Radios. IPSN 2023: 360-361 - [c12]Hao-Jen Chien, Hossein Khalili, Amin Hass, Nader Sehatbakhsh:
Enc2: Privacy-Preserving Inference for Tiny IoTs via Encoding and Encryption. MobiCom 2023: 35:1-35:16 - 2022
- [j6]Baki Berkay Yilmaz, Nader Sehatbakhsh, Moumita Dey, Chia-Lin Cheng, Milos Prvulovic, Alenka G. Zajic:
A generalized approach to estimation of memoryless covert channel information leakage capacity. Array 14: 100131 (2022) - 2021
- [j5]Haider Adnan Khan, Nader Sehatbakhsh, Luong N. Nguyen, Robert Locke Callan, Arie Yeredor, Milos Prvulovic, Alenka G. Zajic:
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1150-1163 (2021) - [i2]Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh:
SoK: A Study of the Security on Voice Processing Systems. CoRR abs/2112.13144 (2021) - 2020
- [b1]Nader Sehatbakhsh:
Leveraging Side-channel signals for Security and Trust. Georgia Institute of Technology, Atlanta, GA, USA, 2020 - [j4]Nader Sehatbakhsh, Alireza Nazari, Monjur Alam, Frank Werner, Yuanda Zhu, Alenka G. Zajic, Milos Prvulovic:
REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals. IEEE Trans. Computers 69(3): 312-326 (2020) - [j3]Baki Berkay Yilmaz, Nader Sehatbakhsh, Alenka G. Zajic, Milos Prvulovic:
Communication Model and Capacity Limits of Covert Channels Created by Software Activities. IEEE Trans. Inf. Forensics Secur. 15: 1891-1904 (2020) - [c11]Nader Sehatbakhsh, Baki Berkay Yilmaz, Alenka G. Zajic, Milos Prvulovic:
EMSim: A Microarchitecture-Level Simulation Tool for Modeling Electromagnetic Side-Channel Signals. HPCA 2020: 71-85 - [c10]Nader Sehatbakhsh, Baki Berkay Yilmaz, Alenka G. Zajic, Milos Prvulovic:
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit. HPCA 2020: 123-138 - [i1]Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh:
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper). CoRR abs/2010.05809 (2020)
2010 – 2019
- 2019
- [j2]Haider Adnan Khan, Nader Sehatbakhsh, Luong N. Nguyen, Milos Prvulovic, Alenka G. Zajic:
Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals. J. Hardw. Syst. Secur. 3(4): 305-318 (2019) - [c9]Nader Sehatbakhsh, Alireza Nazari, Haider Adnan Khan, Alenka G. Zajic, Milos Prvulovic:
EMMA: Hardware/Software Attestation Framework for Embedded Systems Using Electromagnetic Signals. MICRO 2019: 983-995 - 2018
- [c8]Nader Sehatbakhsh, Monjur Alam, Alireza Nazari, Alenka G. Zajic, Milos Prvulovic:
Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices. HOST 2018: 1-8 - 2017
- [c7]Alireza Nazari, Nader Sehatbakhsh, Monjur Alam, Alenka G. Zajic, Milos Prvulovic:
EDDIE: EM-Based Detection of Deviations in Program Execution. ISCA 2017: 333-346 - 2016
- [j1]Bahareh J. Farahani, Saeed Safari, Nader Sehatbakhsh:
PVTA-aware approximate custom instruction extension technique: A cross-layer approach. Microelectron. Reliab. 63: 267-277 (2016) - [c6]Nader Sehatbakhsh, Alireza Nazari, Alenka G. Zajic, Milos Prvulovic:
Spectral profiling: Observer-effect-free profiling by monitoring EM emanations. MICRO 2016: 59:1-59:11 - 2013
- [c5]Ahmad Rahati Belabad, Nasser Masoumi, Shahin Jafarabadi-Ashtiani, Nader Sehatbakhsh:
A fully integrated linear CMOS power amplifier with high output power and dynamic range for WiMAX application. DTIS 2013: 30-34 - [c4]Nader Sehatbakhsh, Mohammad Aliasgari, Seid Mehdi Fakhraie:
FPGA implementation of genetic algorithm for dynamic filter-bank-based multicarrier systems. DTIS 2013: 72-77 - [c3]Mohsen Jafari, Mohsen Imani, Mohammad Ansari, Morteza Fathipour, Nader Sehatbakhsh:
Design of an ultra-low power 32-bit adder operating at subthreshold voltages in 45-nm FinFET. DTIS 2013: 167-168 - [c2]Behzad Ebrahimi, Ali Afzali-Kusha, Nader Sehatbakhsh:
Robust polysilicon gate FinFET SRAM design using dynamic back-gate bias. DTIS 2013: 171-172 - [c1]Mohsen Jafari, Mohsen Imani, Morteza Fathipour, Nader Sehatbakhsh:
Bottom-up design of a high performance ultra-low power DFT utilizing multiple-VDD, multiple-Vth and gate sizing. DTIS 2013: 178-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint