Publications

Patents

[P2] N.G. Tsoutsos, N. Gupta and M. Maniatakos. "Systems and Methods for Malware Detection in Additive Manufactured Parts." U.S. Patent 11,046,009 B2, 2021

[P1] M. Maniatakos and N.G. Tsoutsos. "Homomorphically Encrypted One Instruction Computation Systems and Methods." U.S. Patent 9619658 B2, 2017

Book Chapters

[B1] N.G. Tsoutsos and M. Maniatakos, "Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data," Security and Fault Tolerance in Internet of Things, Springer, 2019

Theses

[T1] N.G. Tsoutsos, "Private and Trustworthy Computation Using Additive Cryptographic Primitives," Ph.D. Dissertation, New York University

Articles

[J19] T. Kaewnukultorn, S. Sepulveda-Mora, R. Broadwater, D. Zhu, N.G. Tsoutsos and S. Hegedus, "Smart PV Inverter Cyberattack Detection using Hardware-in-the-Loop Test Facility," IEEE Access, 2023

[J18] L. Folkerts, N. Kater and N.G. Tsoutsos, "Coeus: A Universal Search Engine for Digital Manufacturing," IEEE Access, 2023

[J17] C. Gouert and N.G. Tsoutsos, "Dirty Metadata: Understanding A Threat to Online Privacy," Security & Privacy, IEEE, 2022

[J16] D. Mouris and N.G. Tsoutsos, "NFTs For 3D Models: Sustaining Ownership In Industry 4.0," Consumer Electronics Magazine, IEEE, 2022

[J15] D. Mouris, C. Gouert and N.G. Tsoutsos, "Privacy-Preserving IP Verification," Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2021

[J14] D. Mouris and N.G. Tsoutsos, "Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs," Transactions on Information Forensics and Security, IEEE, 2021

[J13] D. Mouris, C. Gouert, N. Goupta and N.G. Tsoutsos, "Peak your Frequency: Advanced Search of 3D CAD Files in the Fourier Domain," Access, IEEE, 2020

[J12] W. Li, G. Mac, N.G. Tsoutsos, N. Gupta and R. Karri, "Computer aided design (CAD) model search and retrieval using frequency domain file conversion," Additive Manufacturing, Elsevier, 2020

[J11] N.G. Tsoutsos, N. Gupta and R. Karri, "Cybersecurity Road Map for Digital Manufacturing," Computer, IEEE, 2020

[J10] O. Mazonka, E. Sarkar, E. Chielle, N.G. Tsoutsos, and M. Maniatakos, "Practical Data-in-Use Protection Using Binary Decision Diagrams," Access, IEEE, 2020

[J9] E. Chielle, N.G. Tsoutsos, O. Mazonka and M. Maniatakos, "Encrypt-Everything-Everywhere: ISA Extensions for Private Computation," Transactions on Dependable and Secure Computing, IEEE, 2020

[J8] N.G. Tsoutsos and M. Maniatakos, "Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation," Transactions on Computers, IEEE, 2018 [January 2018 spotlight paper]

[J7] N.G. Tsoutsos and M. Maniatakos, "Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems," Embedded System Letters, IEEE, 2018

[J6] D. Mouris, N.G. Tsoutsos and M. Maniatakos, "TERMinator Suite: Benchmarking Privacy-Preserving Architectures," Computer Architecture Letters, IEEE, 2018

[J5] F. Chen, Y. Luo, N.G. Tsoutsos, M. Maniatakos, K. Shahin, N. Gupta, "Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication," Advanced Engineering Materials, Wiley, 2018

[J4] O. Mazonka, N.G. Tsoutsos and M. Maniatakos, "Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation," Transactions on Information Forensics and Security, IEEE, 2016

[J3] S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, "Manufacturing and Security Challenges in 3D Printing," JOM, Springer, 2016 (Most-read engineering paper of 2016 at Springer Publishing)

[J2] N.G. Tsoutsos and M. Maniatakos, "The HEROIC Framework: Encrypted Computation without Shared Keys," Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2015

[J1] N.G. Tsoutsos and M. Maniatakos, "Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation," Transactions on Emerging Topics in Computing, IEEE, 2014

Proceedings

[C24] D. Mouris, P. Sarkar and N.G. Tsoutsos, "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries," PETS, 2024

[C23] D. Mouris, C. Gouert and N.G. Tsoutsos, "MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation," IEEE IOLTS, 2023

[C22] T. White, C. Yang, C. Gouert and N.G. Tsoutsos, "FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping Scheduling," IEEE HOST, 2023

[C21] L. Folkerts, C. Gouert and N.G. Tsoutsos, "REDsec: Running Encrypted Discretized Neural Networks in Seconds," NDSS, 2023

[C20] C. Gouert, D. Mouris and N.G. Tsoutsos, "SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks," PETS, 2023

[C19] D. Mouris, C. Gouert, N.G. Tsoutsos, "zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge," IEEE ISVLSI, 2022

[C18] I. Zografopoulos, C. Konstantinou, N.G. Tsoutsos, D. Zhu, and R. Broadwater, "Security assessment and impact analysis of cyberattacks in integrated T&D power systems," IEEE MSCPES, 2021

[C17] D. Mouris, N.G. Tsoutsos, "Pythia: Intellectual Property Verification in Zero-Knowledge," ACM/EDAC/IEEE DAC, 2020

[C16] C. Gouert, N.G. Tsoutsos, "ROMEO: Conversion and Evaluation of HDL Designs in the Encrypted Domain," ACM/EDAC/IEEE DAC, 2020

[C15] P. Cronin, C. Gouert, D. Mouris, N.G. Tsoutsos, C. Yang, “Covert Data Exfiltration Using Light and Power Channels,” IEEE ICCD, 2019

[C14] M. Nabeel, M. Ashraf, E. Chielle, N.G. Tsoutsos and M. Maniatakos, "CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution," IEEE HOST 2019

[C13] N.G. Tsoutsos, O. Mazonka and M. Maniatakos, "Memory-bounded Randomness for Hardware-constrained Encrypted Computation," IEEE ICCD 2017

[C12] N.G. Tsoutsos and M. Maniatakos, "Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests," IEEE AsianHOST 2017

[C11] N.G. Tsoutsos, H. Gamil and M. Maniatakos, "Secure 3D Printing: Reconstructing and Validating Solid Geometries Using Toolpath Reverse Engineering," ACM CPSS 2017

[C10] D. Tychalas, N.G. Tsoutsos and M. Maniatakos, "SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology," ASPDAC 2017

[C9] N. Gupta, F. Chen, N.G. Tsoutsos and M. Maniatakos, "ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting," ACM/EDAC/IEEE DAC 2017

[C8] N.G. Tsoutsos and M. Maniatakos, "Cryptographic Vote-Stealing Attacks Against a Partially Homomorphic E-voting Architecture," IEEE ICCD 2016

[C7] A. Keliris, C. Konstantinou, N.G. Tsoutsos, R. Baiad, and M. Maniatakos, "Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds," ASPDAC 2016

[C6] N.G. Tsoutsos and M. Maniatakos, "Extending Residue-based Fault Tolerance to Encrypted Computation," IEEE ITC 2015

[C5] N.G. Tsoutsos and M. Maniatakos, "Obfuscated arbitrary computation using cryptographic primitives," IEEE IDT 2015

[C4] N.G. Tsoutsos and M. Maniatakos, "HEROIC: Homomorphically EncRypted One Instruction Computer," DATE 2014

[C3] N.G. Tsoutsos, C. Konstantinou and M. Maniatakos, "Advanced Techniques for Designing Stealthy Hardware Trojans," ACM/EDAC/IEEE DAC 2014

[C2] N.G. Tsoutsos and M. Maniatakos, "Trust no one: Thwarting 'heartbleed' attacks using privacy-preserving computation," IEEE ISVLSI 2014

[C1] N.G. Tsoutsos and M. Maniatakos, "Investigating the Application of One Instruction Set Computing for Encrypted Data Computation," SPACE 2013

Internet Drafts

[D1] H. Davis, D. Mouris, C. Patton, P. Sarkar and N.G. Tsoutsos, "The Mastic VDAF," IETF Crypto Forum Research Group, 2023

Technical Reports

[T14] C. Gouert, and N.G. Tsoutsos, "Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption," Cryptology ePrint Archive, Report 2024/118

[T13] L. Folkerts, and N.G. Tsoutsos, "Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models," 2023

[T12] R. Shokri, C. Gouert and N.G. Tsoutsos, "MatcHEd: Privacy-Preserving Set Similarity based on MinHash," 2023

[T11] O. Ahmed, C. Gouert and N.G. Tsoutsos, "PEEV: Parse Encrypt Execute Verify - A Verifiable FHE Framework," 2023

[T10] L. Folkerts, and N.G. Tsoutsos, "FHE-MENNs: Accelerating Fully Homomorphic Inference through Multi-Exit Neural Networks," 2023

[T9] C. Gouert, D. Mouris, and N.G. Tsoutsos, "HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables," Cryptology ePrint Archive, Report 2023/1382

[T8] C. Gouert, V. Joseph, S. Dalton, C. Augonnet, M. Garland and N.G. Tsoutsos, "Accelerated Encrypted Execution of General-Purpose Applications," Cryptology ePrint Archive, Report 2023/641

[T7] D. Mouris, P. Sarkar and N.G. Tsoutsos, "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security," Cryptology ePrint Archive, Report 2023/080

[T6] C. Gouert, D. Mouris and N.G. Tsoutsos, "New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks," Cryptology ePrint Archive, Report 2022/425

[T5] C. Gouert, R. Khan and N.G. Tsoutsos, "Optimizing Homomorphic Encryption Parameters for Arbitrary Applications," Cryptology ePrint Archive, Report 2022/575

[T4] D. Mouris and N.G. Tsoutsos, "Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments," Cryptology ePrint Archive, Report 2021/1370

[T3] L. Folkerts, C. Gouert and N.G. Tsoutsos, "REDsec: Running Encrypted Discretized Neural Networks in Seconds," Cryptology ePrint Archive, Report 2021/1100

[T2] M. Nabeel, M. Ashraf, E. Chielle, N.G. Tsoutsos and M. Maniatakos, "Technical report: CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution," Cryptology ePrint Archive, Report 2021/659

[T1] E. Chielle, O. Mazonka, N.G. Tsoutsos and M. Maniatakos, "E3: A Framework for Compiling C Programs with Encrypted Operands," Cryptology ePrint Archive, Report 2018/1013

Selected Posters

[S1] D. Mouris, P. Sarkar, and N.G. Tsoutsos, "PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security," RSA Conference, 2023

Open-access Tutorials

[W1] D. Mouris, and N.G. Tsoutsos, "Transparent Zero-Knowledge Proofs With Zilch," Medium.com, 2021

GitHub Repositories

[R31] The Walrus Library for Parameterizing of Homomorphic Evaluation (maintained by: C. Gouert, N.G. Tsoutsos)

[R30] Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics (maintained by: D. Mouris, C. Patton, N.G. Tsoutsos)

[R29] MatcHEd: Privacy-Preserving Set Similarity based on MinHash (maintained by: R. Shokri, C. Gouert, N.G. Tsoutsos)

[R28] FHE-MENNs: Accelerating Fully Homomorphic Private Inference with Multi-Exit Neural Networks (maintained by: L. Folkerts, N.G. Tsoutsos)

[R27] Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models (maintained by: L. Folkerts, N.G. Tsoutsos)

[R26] PEEV: Parse Encrypt Execute Verify - A Verifiable FHE Framework (maintained by: O. Ahmed, C. Gouert, N.G. Tsoutsos)

[R25] YAP: Yet Another Parser (maintained by: O. Ahmed, N.G. Tsoutsos)

[R24] FHE Playgrounds: Get started with Homomorphic Encryption (maintained by: D. Mouris, N.G. Tsoutsos)

[R23] HELM: Navigating Homomorphic Evaluation through Gates and Lookups (maintained by: C. Gouert, D. Mouris, N.G. Tsoutsos)

[R22] CSAW Embedded Security Challenge 2023 (maintained by: L. Folkerts, C. Gouert, N.G. Tsoutsos)

[R21] PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security (maintained by: D. Mouris, N.G. Tsoutsos)

[R20] HDL Benchmarks: Verilog designs and their synthesized netlists (maintained by: C. Gouert, D. Mouris, N.G. Tsoutsos)

[R19] MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation (maintained by: D. Mouris, C. Gouert, N.G. Tsoutsos)

[R18] Coeus: A Universal Search Engine for Additive Manufacturing (maintained by: L. Folkerts, N.G. Tsoutsos)

[R17] T2: A cross compiler and standardized benchmarks for FHE computation (maintained by: C. Gouert, D. Mouris, N.G. Tsoutsos)

[R16] REDsec: Running Encrypted Discretized Neural Networks in Seconds (maintained by: L. Folkerts, C. Gouert, N.G. Tsoutsos)

[R15] CSAW Embedded Security Challenge 2022 (maintained by: L. Folkerts, C. Gouert, D. Mouris, N.G. Tsoutsos)

[R14] Evolution of FHE Acceleration for Multi-GPUs (maintained by: C. Gouert, N.G. Tsoutsos)

[R13] Zilch: A Framework for Deploying Transparent Zero Knowledge Proofs (maintained by: D. Mouris, N.G. Tsoutsos)

[R12] ZeroJava to zMIPS compiler (maintained by: D. Mouris, N.G. Tsoutsos)

[R11] CSAW Embedded Security Challenge 2021 (maintained by: C. Gouert, D. Mouris, L. Folkerts, N.G. Tsoutsos)

[R10] Fourier-Fingerprint-Search: Advanced Search of 3D CAD Files in the Fourier Domain (maintained by: D. Mouris, C. Gouert, N.G. Tsoutsos)

[R9] Romeo: A framework for translating Verilog program to fully homomorphic circuits (maintained by: C. Gouert, N.G. Tsoutsos)

[R8] CSAW Embedded Security Challenge 2020 (maintained by: C. Gouert, D. Mouris, L. Folkerts, N.G. Tsoutsos)

[R7] CSAW Embedded Security Challenge 2019 (maintained by: P. Cronin, C. Gouert, N.G. Tsoutsos)

[R6] TERMinator Suite: A collection of benchmarks for privacy-preserving architectures (maintained by: D. Mouris, N.G. Tsoutsos, M. Maniatakos)

[R5] SGXCrypter: A crypter for IP Protection of Windows Portable Executables using Intel's Software Guard Extensions (maintained by: D. Tychalas, N.G. Tsoutsos, M. Maniatakos)

[R4] Cryptoleq: A compiler and abstract machine emulator for encrypted and unencrypted computation (maintained by: O. Mazonka, N.G. Tsoutsos, M. Maniatakos)

[R3] CSAW Embedded Security Challenge 2017 (maintained by: A. Keliris, N.G. Tsoutsos, M. Maniatakos)

[R2] CSAW Embedded Security Challenge 2016 (maintained by: N.G. Tsoutsos)

[R1] CSAW Embedded Security Challenge 2015 (maintained by: N.G. Tsoutsos)