Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures AP Fournaris, C Dimopoulos, A Moschos, O Koufopavlou Microprocessors and microsystems 64, 73-87, 2019 | 16 | 2019 |
A flexible leakage trace collection setup for arbitrary cryptographic ip cores A Moschos, AP Fournaris, O Koufopavlou 2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018 | 8 | 2018 |
Harnessing the Power of General-Purpose LLMs in Hardware Trojan Design G Kokolakis, A Moschos, AD Keromytis Artificial Intelligence in Hardware Security, Applied Cryptography and …, 2024 | 4 | 2024 |
On the feasibility of remotely triggered automotive hardware trojans A Moschos, K Valakuzhy, AD Keromytis 2022 International Conference on Electrical, Computer, Communications and …, 2022 | 3 | 2022 |
Side Channel Assessment Platforms and Tools for Ubiquitous Systems AP Fournaris, A Moschos, N Sklavos Security of Ubiquitous Computing Systems, 147-163, 2021 | 1 | 2021 |
Towards Practical Fabrication Stage Attacks Using Interrupt-Resilient Hardware Trojans A Moschos, F Monrose, AD Keromytis 2024 IEEE International Symposium on Hardware Oriented Security and Trust …, 2024 | | 2024 |
60th ACM/IEEE Design Automation Conference, Young DAC Fellows poster session: Considering the Future of Hardware Trojan Attacks A Moschos, A Keromytis https://coeus-center.com/articles/DAC60Poster.pdf, 2023 | | 2023 |
Cryptographic Hardware and Embedded Systems-CHES 2022 poster session: The Design and Implementation of an Open-Source Hardware Trojan for a 64-bit RISC-V CPU Design A Moschos, A Keromytis https://ches.iacr.org/2022/posters/The%20Design%20and%20Implementation%20of …, 2022 | | 2022 |