​
Login / Signup
Wei Hu
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 41
Top Topics
Anomaly Detection
Hardware Designs
Information Flow
Multilevel Security
Top Venues
ICCAD
ATS
DATE
IEEE Access
</>
Publications
</>
Dina G. Mahmoud
,
Beatrice Shokry
,
Vincent Lenders
,
Wei Hu
,
Mirjana Stojilovic
X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don't-Care Hardware Trojans to Shared Cloud FPGAs.
IEEE Access
12 (2024)
Mingping Qi
,
Wei Hu
Provably Secure Asymmetric PAKE Protocol for Protecting IoT Access.
IEEE Internet Things J.
11 (4) (2024)
Mingping Qi
,
Wei Hu
,
Yu Tai
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server Model.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Maoyuan Qin
,
Jiacheng Zhu
,
Baolei Mao
,
Wei Hu
Hardware/software security co-verification and vulnerability detection: An information flow perspective.
Integr.
94 (2024)
Beibei Li
,
Wei Hu
,
Yiwei Li
Maximizing Network Reliability in Large Scale Infrastructure Networks: A Heat Conduction Model Perspective.
ICMLC
(2023)
Jinhui Liu
,
Tianyi Han
,
Maolin Tan
,
Bo Tang
,
Wei Hu
,
Yong Yu
A Publicly Verifiable E-Voting System Based on Biometrics.
Cryptogr.
7 (4) (2023)
Lingjuan Wu
,
Yifei Gao
,
Jiacheng Zhu
,
Yu Tai
,
Wei Hu
Security Verification of RISC-V System Based on ISA Level Information Flow Tracking.
ATS
(2023)
Lingjuan Wu
,
Hao Su
,
Xuelin Zhang
,
Yu Tai
,
Han Li
,
Wei Hu
Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks.
ICCAD
(2023)
Shibo Tang
,
Jiacheng Zhu
,
Yifei Gao
,
Jing Zhou
,
Dejun Mu
,
Wei Hu
Verifying RISC-V Privilege Transition Integrity Through Symbolic Execution.
ATS
(2023)
Wei Hu
,
Beibei Li
,
Lingjuan Wu
,
Yiwei Li
,
Xuefei Li
,
Liang Hong
Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs.
CoRR
(2023)
Xingxin Wang
,
Shibo Tang
,
Wei Hu
Towards Automatic Property Generation for SoC Security Verification.
ISOCC
(2022)
Xingxin Wang
,
Jian Zheng
,
Lingjuan Wu
,
Jiacheng Zhu
,
Wei Hu
A Correlation Fault Attack on Rotating S-Box Masking AES.
AsianHOST
(2021)
Lixiang Shen
,
Dejun Mu
,
Guo Cao
,
Maoyuan Qin
,
Jiacheng Zhu
,
Wei Hu
Accelerating hardware security verification and vulnerability detection through state space reduction.
Comput. Secur.
103 (2021)
Wei Hu
,
Armaiti Ardeshiricham
,
Ryan Kastner
Hardware Information Flow Tracking.
ACM Comput. Surv.
54 (4) (2021)
Wei Hu
,
Chip-Hong Chang
,
Anirban Sengupta
,
Swarup Bhunia
,
Ryan Kastner
,
Hai Li
An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
40 (6) (2021)
Wei Hu
,
Jing Tan
,
Lingjuan Wu
,
Yu Tai
,
Liang Hong
Developing Formal Models for Measuring Fault Effects Using Functional EDA Tools.
ITC-Asia
(2021)
Lingjuan Wu
,
Xuefei Li
,
Jiacheng Zhu
,
Jian Zheng
,
Wei Hu
Identifying Specious LUTs for Satisfiability Don't Care Trojan Detection.
SoCC
(2021)
Lu Zhang
,
Dejun Mu
,
Wei Hu
,
Yu Tai
Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis.
IEEE Netw.
34 (3) (2020)
Dina G. Mahmoud
,
Wei Hu
,
Mirjana Stojilovic
X-Attack: Remote Activation of Satisfiability Don't-Care Hardware Trojans on Shared FPGAs.
FPL
(2020)
Wei Hu
,
Lingjuan Wu
,
Yu Tai
,
Jing Tan
,
Jiliang Zhang
A Unified Formal Model for Proving Security and Reliability Properties.
ATS
(2020)
Tao Yang
,
Yibo Hu
,
Yang Li
,
Wei Hu
,
Quan Pan
A Standardized ICS Network Data Processing Flow With Generative Model in Anomaly Detection.
IEEE Access
8 (2020)
Lu Zhang
,
Dejun Mu
,
Wei Hu
,
Yu Tai
,
Jeremy Blackstone
,
Ryan Kastner
Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
39 (10) (2020)
Maoyuan Qin
,
Xinmu Wang
,
Baolei Mao
,
Dejun Mu
,
Wei Hu
A formal model for proving hardware timing properties and identifying timing channels.
Integr.
72 (2020)
Maoyuan Qin
,
Wei Hu
,
Xinmu Wang
,
Dejun Mu
,
Baolei Mao
Theorem proof based gate level information flow tracking for hardware security verification.
Comput. Secur.
85 (2019)
Wei Hu
,
Yixin Ma
,
Xinmu Wang
,
Xingxin Wang
Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks.
AsianHOST
(2019)
Baolei Mao
,
Wei Hu
,
Alric Althoff
,
Janarbek Matai
,
Yu Tai
,
Dejun Mu
,
Timothy Sherwood
,
Ryan Kastner
Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
37 (9) (2018)
Maoyuan Qin
,
Wei Hu
,
Dejun Mu
,
Yu Tai
Property Based Formal Security Verification for Hardware Trojan Detection.
IVSW
(2018)
Yu Tai
,
Wei Hu
,
Dejun Mu
,
Baolei Mao
,
Lu Zhang
Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design.
IEEE Access
6 (2018)
Wei Hu
,
Xinmu Wang
,
Dejun Mu
Security Path Verification Through Joint Information Flow Analysis.
APCCAS
(2018)
Wei Hu
,
Armaiti Ardeshiricham
,
Mustafa S. Gobulukoglu
,
Xinmu Wang
,
Ryan Kastner
Property specific information flow analysis for hardware security verification.
ICCAD
(2018)
Lu Zhang
,
Wei Hu
,
Armaiti Ardeshiricham
,
Yu Tai
,
Jeremy Blackstone
,
Dejun Mu
,
Ryan Kastner
Examining the consequences of high-level synthesis optimizations on power side-channel.
DATE
(2018)
Armaiti Ardeshiricham
,
Wei Hu
,
Joshua Marxen
,
Ryan Kastner
Register transfer level information flow tracking for provably secure hardware design.
DATE
(2017)
Wei Hu
,
Lu Zhang
,
Armaiti Ardeshiricham
,
Jeremy Blackstone
,
Bochuan Hou
,
Yu Tai
,
Ryan Kastner
Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans.
ICCAD
(2017)
Armaiti Ardeshiricham
,
Wei Hu
,
Ryan Kastner
Clepsydra: Modeling timing flows in hardware designs.
ICCAD
(2017)
Andrew Becker
,
Wei Hu
,
Yu Tai
,
Philip Brisk
,
Ryan Kastner
,
Paolo Ienne
Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking.
DAC
(2017)
Yu Tai
,
Wei Hu
,
Dejun Mu
,
Baolei Mao
,
Lantian Guo
,
Maoyuan Qin
A Simplifying Logic Approach for Gate Level Information Flow Tracking.
ChinaCom (2)
(2017)
Yu Tai
,
Wei Hu
,
Huixiang Zhang
,
Dejun Mu
,
Xing-Li Huang
Generating optimized gate level information flow tracking logic for enforcing multilevel security.
Autom. Control. Comput. Sci.
50 (5) (2016)
Wei Hu
,
Baolei Mao
,
Jason Oberg
,
Ryan Kastner
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking.
Computer
49 (8) (2016)
Wei Hu
,
Andrew Becker
,
Armita Ardeshiricham
,
Yu Tai
,
Paolo Ienne
,
Dejun Mu
,
Ryan Kastner
Imprecise security: quality and complexity tradeoffs for hardware information flow tracking.
ICCAD
(2016)
Wei Hu
,
Alric Althoff
,
Armita Ardeshiricham
,
Ryan Kastner
Towards Property Driven Hardware Security.
MTV
(2016)
Ryan Kastner
,
Wei Hu
,
Alric Althoff
Quantifying hardware security using joint information flow analysis.
DATE
(2016)
Baolei Mao
,
Wei Hu
,
Alric Althoff
,
Janarbek Matai
,
Jason Oberg
,
Dejun Mu
,
Timothy Sherwood
,
Ryan Kastner
Quantifying Timing-Based Information Flow in Cryptographic Hardware.
ICCAD
(2015)
Wei Hu
,
Dejun Mu
,
Jason Oberg
,
Baolei Mao
,
Mohit Tiwari
,
Timothy Sherwood
,
Ryan Kastner
Gate-Level Information Flow Tracking for Security Lattices.
ACM Trans. Design Autom. Electr. Syst.
20 (1) (2014)
Dejun Mu
,
Wei Hu
,
Baolei Mao
,
Bo Ma
A bottom-up approach to verifiable embedded system information flow security.
IET Inf. Secur.
8 (1) (2014)
Tao Yang
,
Dejun Mu
,
Wei Hu
,
Huixiang Zhang
Energy-efficient border intrusion detection using wireless sensors network.
EURASIP J. Wirel. Commun. Netw.
2014 (2014)
Wei Hu
,
Jason Oberg
,
Janet Barrientos
,
Dejun Mu
,
Ryan Kastner
Expanding Gate Level Information Flow Tracking for Multilevel Security.
IEEE Embed. Syst. Lett.
5 (2) (2013)
Bo Ma
,
Dejun Mu
,
Wei Fan
,
Wei Hu
Improvements the Seccomp Sandbox Based on PBE Theory.
AINA Workshops
(2013)
Chunlei Chen
,
Dejun Mu
,
Huixiang Zhang
,
Wei Hu
Towards a Moderate-Granularity Incremental Clustering Algorithm for GPU.
CyberC
(2013)
Wei Hu
,
Jason Oberg
,
Dejun Mu
,
Ryan Kastner
Simultaneous information flow security and circuit redundancy in Boolean gates.
ICCAD
(2012)
Wei Hu
,
Jason Oberg
,
Ali Irturk
,
Mohit Tiwari
,
Timothy Sherwood
,
Dejun Mu
,
Ryan Kastner
On the Complexity of Generating Gate Level Information Flow Tracking Logic.
IEEE Trans. Inf. Forensics Secur.
7 (3) (2012)
Wei Hu
,
Jason Oberg
,
Ali Irturk
,
Mohit Tiwari
,
Timothy Sherwood
,
Dejun Mu
,
Ryan Kastner
Theoretical Fundamentals of Gate Level Information Flow Tracking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
30 (8) (2011)
Jason Oberg
,
Wei Hu
,
Ali Irturk
,
Mohit Tiwari
,
Timothy Sherwood
,
Ryan Kastner
Information flow isolation in I2C and USB.
DAC
(2011)
Jason Oberg
,
Wei Hu
,
Ali Irturk
,
Mohit Tiwari
,
Timothy Sherwood
,
Ryan Kastner
Theoretical analysis of gate level information flow tracking.
DAC
(2010)