Adam Waksman

Ph.D. Student, Columbia University

Free for educational use. Copyright restrictions may apply otherwise.


Conference Publications

Adam Waksman, Jeyavijayan Rajendran, Matthew Suozzo and Simha Sethumadhavan. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification. In Proceedings of the 51st Design Automation Conference, San Francisco, California, 2014.

Adam Waksman, Matthew Suozzo and Simha Sethumadhavan. FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis. In Proceedings of the 20th ACM Conference on Computer and Communications Security, Berlin, Germany, 2013. (Best Student Paper Award Winner)
Full PDF / Conference / Slides

John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan and Salvatore Stolfo. On the Feasibility of Online Malware Detection With Performance Counters. In Proceedings of the International Symposium on Computer Architecture, Tel Aviv, Israel, 2013.
Full PDF / Conference / Slides

John Demme, Robert Martin, Adam Waksman and Simha Sethumadhavan. Side-Channel Vulnerability Factor: A Metric for Measuring Information Leakage. In Proceedings of the International Symposium on Computer Architecture, Portland, Oregon, 2012.
Full PDF / Conference / Slides / Cited By

Adam Waksman and Simha Sethumadhavan. Silencing Hardware Backdoors. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 2011.
Full PDF / Conference / Slides / Cited By

Adam Waksman and Simha Sethumadhavan. Tamper Evident Microprocessors. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, 2010.
Full PDF / Conference / Slides / Handouts / Cited By


Journal Publications

John Demme, Robert Martin, Adam Waksman and Simha Sethumadhavan. A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security. IEEE Micro Magazine, Top Picks Special Issue, May 2013. Full PDF

Adam Waksman, Julianna Eum and Simha Sethumadhavan. Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property. IEEE Design & Test, 2013, Volume 30, Issue 2.
Abstract / Full PDF

Sakurai T, Gil OG, Whittard JD, Gazdoiu M, Joseph T, Wu J, Waksman A, Benson DL, Salton SR, Felsenfeld DP. Interactions between L1 cell adhesion molecule and ezrin support traction-force generation and can be regulated by tyrosine phosphorylation. Journal of Neuroscience Research, 2008, Volume 86, Issue 12: Pages 2602-2614.
Abstract / Full PDF / Cited By