Michael Zuzak

Profile Picture of Michael Zuzak
Title
Assistant Professor
Department
Department of Computer Engineering
Institution
Rochester Institute of Technology

Education

  • PhD, Electrical Engineering, University of Maryland, College Park

Research Interests

Logic Obfuscation   Hardware Security   Object Detection  

  View all research interests

Biography

I am an Assistant Professor in the Department of Computer Engineering at the Rochester Institute of Technology (RIT). My research centers on hardware security with an emphasis on provably secure system design and design automation algorithms. Prior to my academic career, I researched high-frequency, wide-band digital signal processing system architecture at the U.S. Naval Research Laboratory where I served as the lead digital designer for a currently-fielded naval system. I have published more than 20 peer-reviewed publications, two of which have been nominated for Best Paper, including most recently at the 2021 Design Automation Conference (DAC). I have been recognized as an ARCS Scholar, a Future Faculty Fellow, and an Edison Memorial Graduate Fellow. I received my PhD in Electrical Engineering from the University of Maryland, College Park in 2022.

Homepages

Contact Information

  (585) 475-2312

Research
Not mentioned yet. (?)
List of Publications (33)
In 2024
33

Complementing Vehicle Trajectories Using Two Camera Viewpoints. K Nakano, M Nakazawa, M Zuzak 2024 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2024.

Found on Publication Page
32

Low Overhead Logic Locking for System-Level Security: A Design Space Modeling Approach. L Lam, M Melnyk, M Zuzak .

Found on Publication Page
31

Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality. I McDaniel, M Zuzak, A Srivastava ACM Transactions on Design Automation of Electronic Systems 29 (4), 1-23, 2024.

Found on Publication Page
In 2023
30

Low overhead system-level obfuscation through hardware resource sharing. D Xing, M Zuzak, A Srivastava 2023 24th International Symposium on Quality Electronic Design (ISQED), 1-8, 2023.

Found on Publication Page
29

Fusion is Not Enough: Single Modal Attack on Fusion Models for 3D Object Detection. Z Cheng, H Choi, S Feng, JC Liang, G Tao, D Liu, M Zuzak, X Zhang The Twelfth International Conference on Learning Representations, 2023.

Found on Publication Page
28

Security-Aware Resource Binding to Enhance Logic Obfuscation. M Zuzak, Y Liu, A Srivastava IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023.

Found on Publication Page
27

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators. H Xu, D Liu, C Merkel, M Zuzak arXiv preprint arXiv:2304.06017, 2023.

Found on Publication Page
In 2022
26

A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks. Y Liu, M Zuzak, D Xing, I McDaniel, P Mittu, O Ozbay, A Akib, A Srivastava 2022 IEEE 4th International Conference on Artificial Intelligence Circuits ..., 2022.

Found on Publication Page
25

A combined logical and physical attack on logic obfuscation. M Zuzak, Y Liu, I McDaniel, A Srivastava Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided ..., 2022.

Found on Publication Page
24

A black-box sensitization attack on SAT-hard instances in logic obfuscation. I McDaniel, M Zuzak, A Srivastava 2022 IEEE 40th International Conference on Computer Design (ICCD), 239-246, 2022.

Found on Publication Page
23

Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries. MJ Zuzak University of Maryland, College Park, 2022.

Found on Publication Page
In 2021
22

A Resource Binding Approach to Logic Obfuscation. M Zuzak, Y Liu, A Srivastava 2021 58th ACM/IEEE Design Automation Conference (DAC), 1-6, 2021.

Found on Publication Page
21

Independent Verification and Validation of Security-Aware EDA Tools and IP. B Tan, S Garg, R Karri, Y Liu, M Zuzak, A Chakraborty, A Srivastava, ... 2021 58th ACM/IEEE Design Automation Conference (DAC), 1299-1302, 2021.

Found on Publication Page
20

Neural Trojans. Y Liu, A Mondal, A Chakraborty, M Zuzak, N Jacobsen, D Xing, ... Encyclopedia of Cryptography, Security and Privacy, 2021.

Found on Publication Page
19

Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design. M Zuzak, A Srivastava Cryptology ePrint Archive, 2021.

Found on Publication Page
18

Evaluating the Security of Logic-Locked Probabilistic Circuits. M Zuzak, A Mondal, A Srivastava IEEE Transactions on Computer-Aided Design of Integrated Circuits and ..., 2021.

Found on Publication Page
17

Robust and attack resilient logic locking with a high application-level impact. Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021.

Found on Publication Page
In 2020
16

Provable Detection and Location of Hardware Trojans with Linear Hybrid Cellular Automata. M Zuzak, M Fitelson, S Montano, A Srivastava Government Microcircuit Applications and Critical Technology Conference ..., 2020.

Found on Publication Page
15

Strong anti-SAT: Secure and effective logic locking. Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava 2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020.

Found on Publication Page
14

Obfusgem: Enhancing processor design obfuscation through security-aware on-chip memory and data path design. M Zuzak, A Srivastava Proceedings of the International Symposium on Memory Systems, 260-271, 2020.

Found on Publication Page
13

StatSAT: A Boolean satisfiability based attack on logic-locked probabilistic circuits. A Mondal, M Zuzak, A Srivastava 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020.

Found on Publication Page
12

A survey on neural trojans. Y Liu, A Mondal, A Chakraborty, M Zuzak, N Jacobsen, D Xing, ... 2020 21st International Symposium on Quality Electronic Design (ISQED), 33-39, 2020.

Found on Publication Page
11

Benchmarking at the frontier of hardware security: Lessons from logic locking. B Tan, R Karri, N Limaye, A Sengupta, O Sinanoglu, MM Rahman, ... arXiv preprint arXiv:2006.06806, 2020.

Found on Publication Page
10

Trace logic locking: Improving the parametric space of logic locking. M Zuzak, Y Liu, A Srivastava IEEE Transactions on Computer-Aided Design of Integrated Circuits and ..., 2020.

Found on Publication Page
In 2019
9

Keynote: A disquisition on logic locking. A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and ..., 2019.

Found on Publication Page
8

Memory locking: An automated approach to processor design obfuscation. M Zuzak, A Srivastava 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 541-546, 2019.

Found on Publication Page
7

Nested mimd-simd parallelization for heterogeneous microprocessors. D Gerzhoy, X Sun, M Zuzak, D Yeung ACM Transactions on Architecture and Code Optimization (TACO) 16 (4), 1-27, 2019.

Found on Publication Page
In 2018
6

HMCTherm: A cycle-accurate HMC simulator integrated with detailed power and thermal simulation. Z Yang, M Zuzak, A Srivastava Proceedings of the International Symposium on Memory Systems, 209-117, 2018.

Found on Publication Page
In 2017
5

Exploiting multi-loop parallelism on heterogeneous microprocessors. M Zuzak, D Yeung Proceedings of the 10th International Workshop on Programmability and ..., 2017.

Found on Publication Page
In 2016
4

Exploiting Nested Parallelism on Heterogeneous Processors. M Zuzak .

Found on Publication Page
3

Exploiting nested parallelism in heterogeneous computing systems. MJ Zuzak University of Maryland, College Park, 2016.

Found on Publication Page
Unspecified
2

Trustworthy and Robust Machine Learning for Multimedia: Challenges and Perspectives. K Nakano, M Zuzak, C Merkel, AC Loui .

Found on Publication Page
1

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking. MM Rahman, S Bhunia, A Orailoglu, Z Han, A Benedetti, L Brignone, ... .

Found on Publication Page
Search Profiles
Colleagues
Profile Picture of Hwan Shim
Rochester Institute of Technology
Profile Picture of Elise Adams
Rochester Institute of Technology
Profile Picture of Elliot Reza Emadian
Rochester Institute of Technology
People Also Viewed
Profile Picture of Kevin Chang
University of Illinois Urbana-Champaign
Profile Picture of Jiaqi Ma
University of Illinois Urbana-Champaign
Profile Picture of Fadi Abu-Amara
Shenandoah University
Recommended Grants