Yier Jin
University of Florida
H-index: 53
North America-United States
Top articles of Yier Jin
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team–Blue Team Practice | ACM Transactions on Design Automation of Electronic Systems | Md Moshiur Rahman Jim Geist Daniel Xing Yuntao Liu Ankur Srivastava | 2024 |
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger | Zihao Zhan Yirui Yang Haoqi Shan Hanqiu Wang Yier Jin | 2024/2 | |
Fast and efficient system and method for detecting and predicting rowhammer attacks | 2021/12/30 | ||
Hardware Phi-1.5 B: A Large Language Model Encodes Hardware Domain Specific Knowledge | arXiv preprint arXiv:2402.01728 | Weimin Fu Shijie Li Yifang Zhao Haocheng Ma Raj Dutta | 2024/1/27 |
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective | Zhaoxiang Liu Kejun Chen Dean Sullivan Orlando Arias Raj Dutta | 2024/1/22 | |
THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution | Yuntao Wei Xueyan Wang Song Bian Weisheng Zhao Yier Jin | 2023/10/28 | |
virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone | arXiv preprint arXiv:2306.11011 | Xiangyi Xu Wenhao Wang Yongzheng Wu Zhennan Min Zixuan Pang | 2023/6/19 |
PowerScout: Security-Oriented Power Delivery Network Modeling for Side-Channel Vulnerability Analysis | IEEE Transactions on Emerging Topics in Computing | Huifeng Zhu Xiaolong Guo Yier Jin Xuan Zhang | 2023/3/21 |
EMSim+: Accelerating Electromagnetic Security Evaluation with Generative Adversarial Network | Ya Gao Haocheng Ma Jindi Kong Jiaji He Yiqiang Zhao | 2023/10/28 | |
NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis | Ya Gao Haocheng Ma Mingkai Yan Jiaji He Yiqiang Zhao | 2023/12/13 | |
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network | IEEE Transactions on Information Forensics and Security | Huifeng Zhu Haoqi Shan Dean Sullivan Xiaolong Guo Yier Jin | 2023/6/15 |
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification | IEEE Transactions on Information Forensics and Security | Haocheng Ma Max Panoff Jiaji He Yiqiang Zhao Yier Jin | 2023/1/23 |
Improving FSM State Enumeration Performance for Hardware Security with RECUT and REFSM-SAT | arXiv preprint arXiv:2311.10273 | Jim Geist Travis Meade Shaojie Zhang Yier Jin | 2023/11/17 |
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight | Journal of Hardware and Systems Security | Haoqi Shan Moyao Huang Yujia Liu Sravani Nissankararao Yier Jin | 2023/9 |
Fairness-Guaranteed DER Coordination Under False Data Injection Attacks | IEEE Internet of Things Journal | Yaodan Hu Xiaochen Xian Yier Jin Shuo Wang | 2023/6/8 |
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation | Cryptology ePrint Archive | Song Bian Zian Zhao Zhou Zhang Ran Mao Kohei Suenaga | 2023 |
LightEMU: Hardware Assisted Fuzzing of Trusted Applications | arXiv preprint arXiv:2311.09532 | Haoqi Shan Sravani Nissankararao Yujia Liu Moyao Huang Shuo Wang | 2023/11/16 |
System and method for fast and accurate netlist to RTL reverse engineering | 2023/7/18 | ||
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis | Honggang Yu Shuo Wang Haoqi Shan Maximillian Panoff Michael Lee | 2023/5/1 | |
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption | Song Bian Zhou Zhang Haowen Pan Ran Mao Zian Zhao | 2023/11/15 |