Michail (Mihalis) Maniatakos
Michail (Mihalis) Maniatakos
Other namesMichail Maniatakos
Associate Professor, New York University Abu Dhabi
Verified email at - Homepage
Cited by
Cited by
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
Security and privacy in cyber-physical systems: A survey of surveys
J Giraldo, E Sarkar, AA Cardenas, M Maniatakos, M Kantarcioglu
IEEE Design & Test 34 (4), 7-17, 2017
Manufacturing and security challenges in 3D printing
SE Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, R Karri
Jom 68 (7), 1872-1881, 2016
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
Systematic software-based self-test for pipelined processors
D Gizopoulos, M Psarakis, M Hatzimihail, M Maniatakos, A Paschalis, ...
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 16 (11 …, 2008
Cyber-physical systems: A security perspective
C Konstantinou, M Maniatakos, F Saqib, S Hu, J Plusquellic, Y Jin
2015 20th IEEE European Test Symposium (ETS), 1-8, 2015
ICSREF: A framework for automated reverse engineering of industrial control systems binaries
A Keliris, M Maniatakos
Network and Distributed System Security Symposium (NDSS), 2019, 2018
Machine learning-based defense against process-aware attacks on industrial control systems
A Keliris, H Salehghaffari, B Cairl, P Krishnamurthy, M Maniatakos, ...
2016 IEEE International Test Conference (ITC), 1-10, 2016
Instruction-level impact analysis of low-level faults in a modern microprocessor controller
M Maniatakos, N Karimi, C Tirumurti, A Jas, Y Makris
IEEE Transactions on Computers 60 (9), 1260-1273, 2010
Impact of firmware modification attacks on power systems field devices
C Konstantinou, M Maniatakos
2015 IEEE International Conference on Smart Grid Communications …, 2015
Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems
Y Wang, E Sarkar, W Li, M Maniatakos, SE Jabari
IEEE Transactions on Information Forensics and Security 16, 4772-4787, 2021
Embedding tracking codes in additive manufactured parts for product authentication
F Chen, Y Luo, NG Tsoutsos, M Maniatakos, K Shahin, N Gupta
Advanced Engineering Materials 21 (4), 1800495, 2019
Perception, performance, and detectability of conversational artificial intelligence across 32 university courses
H Ibrahim, F Liu, R Asim, B Battu, S Benabderrahmane, B Alhafni, ...
Scientific Reports 13 (1), 12187, 2023
Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation
NG Tsoutsos, M Maniatakos
IEEE Transactions on Emerging Topics in Computing 2 (1), 81-93, 2013
GPS spoofing effect on phase angle monitoring and control in a real‐time digital simulator‐based hardware‐in‐the‐loop environment
C Konstantinou, M Sazos, AS Musleh, A Keliris, A Al‐Durra, M Maniatakos
IET Cyber‐Physical Systems: Theory & Applications 2 (4), 180-187, 2017
The HEROIC framework: Encrypted computation without shared keys
NG Tsoutsos, M Maniatakos
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
E3: A framework for compiling C++ programs with encrypted operands
E Chielle, O Mazonka, H Gamil, NG Tsoutsos, M Maniatakos
Cryptology ePrint Archive, 2018
Facehack: Attacking facial recognition systems using malicious facial characteristics
E Sarkar, H Benkraouda, G Krishnan, H Gamil, M Maniatakos
IEEE Transactions on Biometrics, Behavior, and Identity Science 4 (3), 361-372, 2021
A case study on implementing false data injection attacks against nonlinear state estimation
C Konstantinou, M Maniatakos
Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20