Person

Kaveh Shamsi

Assistant Professor

Electrical and Computer Engineering Department
University of Texas at Dallas

Home Publications Teaching Students Code Contact

Journal Papers

  1. Rajesh K. Datta, Guangwei Zhao, Kanad Basu, and Kaveh Shamsi. "A Security Analysis of Circuit Clock Obfuscation" MDPI Cryptography 6, no. 3: 43 (2022) [PDF].
  2. Kaveh Shamsi, Yier Jin. "In Praise of Exact-Functional-Secrecy in Circuit Locking", IEEE Transactions on Information Forensics and Security 16, p. 5225-5238, (2021) [PDF].
  3. Kaveh Shamsi, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, and Yier Jin. "IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview", ACM Transactions on Design Automation of Electronic Systems (TODAES) 24, no. 6, p. 65, (2019) [PDF].
  4. Kaveh Shamsi, Travis Meade, Meng Li, David Z. Pan, and Yier Jin. "On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes", IEEE Transactions on Information Forensics and Security (TIFS) 14, no. 2, p. 347-359, (2019) [PDF].
  5. Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan. "Provably Secure Camouflaging Strategy for IC Protection", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD) 38, no. 8, p. 1399-1412, (2019) [PDF].
  6. Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, and Huaqiang Wu. "On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD) 30, no. 10, p.1820-1830, (2018) [PDF].
  7. Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, and Yier Jin. "The Old Frontier of Reverse Engineering: Netlist Partitioning", Journal of Hardware and Systems Security (HASS) 2, no. 3, p. 201-213, (2018) [PDF].
  8. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier, and Yier Jin. "Emerging Technology-based Design of Primitives for Hardware Security", ACM Journal on Emerging Technologies in Computing Systems (JETC) 13, no. 1, p. 3, (2016) [PDF].
  9. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin, Michael Niemier, and Xiaobo Sharon Hu. "Tunnel FET Current Mode Logic for DPA-resilient Circuit Designs", IEEE Transactions on Emerging Topics in Computing (TETC) 5, no. 3, p. 340-352, (2016) [PDF].

Conference Papers

  1. Kaveh Shamsi, and Guangwei Zhao, "An Oracle-Less Machine-Learning Attack against Lookup-Table-based Logic Locking". ACM Great Lakes Symposium on VLSI (GLSVLSI) (2022) [PDF].
  2. Guangwei Zhao, and Kaveh Shamsi, "Graph Neural Network based Netlist Operator Detection under Circuit Rewriting". ACM Great Lakes Symposium on VLSI (GLSVLSI) (2022) [PDF].
  3. Kaveh Shamsi, and Yier Jin, "Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT". IEEE/ACM International Conference On Computer Aided Design (ICCAD) (2021) [PDF].
  4. Kaveh Shamsi, David Z. Pan, and Yier Jin, "IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits". IEEE/ACM International Conference On Computer Aided Design (ICCAD), p. 1-7, (2019) [PDF].
  5. Kaveh Shamsi, David Z. Pan, and Yier Jin. "On the Impossibility of Approximation-Resilient Circuit Lock- ing". IEEE International Symposium on Hardware Oriented Security and Trust (HOST), p. 161-170, (2019) [PDF].
  6. Kaveh Shamsi, Meng Li, David Z. Pan, and Yier Jin. "KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation", IEEE Design, Automation and Test in Europe Conference and Exhibition (DATE), p. 534-539, (2019), (best paper candidate) [PDF].
  7. Kaveh Shamsi, Meng Li, David Z. Pan, and Yier Jin. "Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures", ACM Great Lakes Symposium on VLSI (GLSVLSI), p. 147-152, (2018), (best paper) [PDF].
  8. Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, and Huaqiang Wu. "R2D2: Runtime Reassurance and Detection of A2 Trojan", IEEE International Symposium on Hardware Oriented Security and Trust (HOST), p. 195-200, (2018) [PDF].
  9. Meng Li, Kaveh Shamsi, Yier Jin, and David Z. Pan. "TimingSAT: Decamouflaging Timing-based Logic Obfuscation", IEEE International Test Conference (ITC), p. 1-10, (2018).
  10. Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin. "AppSAT: Approximately Deobfuscating Integrated Circuits", IEEE Symposium on Hardware Oriented Security and Trust (HOST), p. 95-100, (2017), (best paper) [PDF].
  11. Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin. "Cyclic Obfuscation for Creating SAT-Unresolvable Circuits", ACM Great Lakes Symposium on VLSI (GLSVLSI), p. 173-178, (2017) [PDF].
  12. Meng Li, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu, Yier Jin, and David Z. Pan. "Provably Secure Camouflaging Strategy for IC Protection." IEEE/ACM International Conference on Computer-Aided Design (ICCAD), p. 28., (2016) [PDF].
  13. Kelvin Ly, Orlando Arias, Jacob Wurm, Khoa Hoang, Kaveh Shamsi, and Yier Jin. "Voting System Design Pitfalls: Vulnerability Analysis and Exploitation of a Model Platform." IEEE International Conference on Computer Design (ICCD), p. 149-152, (2016) [PDF].
  14. Kaveh Shamsi, Wujie Wen, and Yier Jin. "Hardware Security Challenges Beyond CMOS: Attacks and Remedies", IEEE Computer Society Annual Symposium on VLSI (ISVLSI), p. 200-205, (2016) [PDF].
  15. Yu Bi, X. Sharon Hu, Yier Jin, Michael Niemier, Kaveh Shamsi, and Xunzhao Yin. "Enhancing Hardware Security with Emerging Transistor Technologies" ACM Great Lakes Symposium on VLSI (GLSVLSI), p. 305- 310, (2016) [PDF].
  16. Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, and Yier Jin. "Circuit Obfuscation and Oracle-Guided Attacks: Who Can Prevail?", ACM Great Lakes Symposium on VLSI (GLSVLSI), p. 357-362, (2017) [PDF].
  17. Kaveh Shamsi, and Yier Jin. "Security of Emerging Non-Volatile Memories: Attacks and Defenses", IEEE VLSI Test Symposium (VTS), p. 1-4, (2016). 15. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Francois-Xavier Standaert, and Yier Jin. "Leverage Emerging Technologies for DPA-resilient Block Cipher Design", IEEE Conference on Design, Automation and Test in Europe (DATE), p. 1538-1543, (2016) [PDF].
  18. Kaveh Shamsi, Yu Bi, Yier Jin, Pierre-Emmanuel Gaillardon, Michael Niemier, and X. Sharon Hu. "Reliable and High Performance STT-MRAM Architectures based on Controllable-Polarity Devices", IEEE International Conference on Computer Design (ICCD), p. 343-350, (2015) [PDF].
  19. Kaveh Shamsi and Yier Jin, "Programmable-Via-based Layout-Level Design Obfuscation for Circuit Protec- tion", Government Microcircuit Applications and Critical Technology Conference (GOMACTech-19), (2019).
  20. Kaveh Shamsi, Pierre-Emmanuel Gaillardon, and Yier Jin. "Hardware Platform Protection Using Emerging Memory Technologies." Government Microcircuit Applications and Critical Technology Conference (GOMACTech- 16), p. 21-24, (2016).
  21. Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, and Yier Jin. "More Than Moore in Security: Emerging Device based Low-Power Differentiate Power Analysis Countermeasures", Government Microcircuit Applications and Critical Technology Conference (GOMACTech-16), p. 467-470, (2016).