nektarios tsoutsos

Nektarios Tsoutsos is a Computer Science PhD candidate with NYU Tandon School of Engineering. He holds academic degrees from Columbia University in NY as well as the National Technical University of Athens. His research interests include applied cryptography, hardware security, computer architecture, as well as private and trustworthy computation.

Journal Articles


N.G. Tsoutsos and M. Maniatakos, "Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation," IEEE Transactions on Computers

N.G. Tsoutsos and M. Maniatakos, "The HEROIC Framework: Encrypted Computation without Shared Keys," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

O. Mazonka, N.G. Tsoutsos and M. Maniatakos, "Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation," IEEE Transactions on Information Forensics and Security

N.G. Tsoutsos and M. Maniatakos, "Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation," Special Issue of IEEE Transactions on Emerging Topics in Computing on Emerging Nanoscale Architectures for Hardware Security, Trust, and Reliability

S.E. Zeltmann, N. Gupta, N.G. Tsoutsos, M. Maniatakos, J. Rajendran and R. Karri, "Manufacturing and Security Challenges in 3D Printing," JOM


Other Publications


N.G. Tsoutsos and M. Maniatakos, "HEROIC: Homomorphically EncRypted One Instruction Computer," Design, Automation and Test in Europe Conference and Exhibition (DATE) 2014

N.G. Tsoutsos and M. Maniatakos, "Extending Residue-based Fault Tolerance to Encrypted Computation," IEEE International Test Conference (ITC) 2015 

N.G. Tsoutsos , O. Mazonka and M. Maniatakos, "Memory-bounded Randomness for Hardware-constrained Encrypted Computation," IEEE International Conference on Computer Design (ICCD) 2017 

N.G. Tsoutsos and M. Maniatakos, "Cryptographic Vote-Stealing Attacks Against a Partially Homomorphic E-voting Architecture," IEEE International Conference on Computer Design (ICCD) 2016 

N. Gupta, F. Chen, N.G. Tsoutsos and M. Maniatakos, "ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting," ACM/EDAC/IEEE Design Automation Conference (DAC) 2017 

N.G. Tsoutsos, C. Konstantinou and M. Maniatakos, "Advanced Techniques for Designing Stealthy Hardware Trojans," Design Automation Conference (DAC) 2014

N.G. Tsoutsos and M. Maniatakos, "Obfuscating Branch Decisions based on Encrypted Data using MISR and Hash Digests," IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2017 

D. Tychalas, N.G. Tsoutsos and M. Maniatakos, "SGXCrypter: IP Protection for Portable Executables using Intel's SGX Technology," Asia and South Pacific Design Automation Conference (ASPDAC) 2017

N.G. Tsoutsos, H. Gamil and M. Maniatakos, "Secure 3D Printing: Reconstructing and Validating Solid Geometries Using Toolpath Reverse Engineering," ACM Cyber-Physical System Security Workshop (CPSS) 2017

N.G. Tsoutsos and M. Maniatakos, "Obfuscated arbitrary computation using cryptographic primitives," IEEE International Design & Test Symposium (IDT) 2015

A. Keliris, C. Konstantinou, N.G. Tsoutsos, R. Baiad and M. Maniatakos, "Enabling Multi-Layer Cyber-Security Assessment of Industrial Control Systems through Hardware-in-the-Loop Testbeds," Asia and South Pacific Design Automation Conference (ASPDAC) 2016

N.G. Tsoutsos and M. Maniatakos, "Trust no one: Thwarting 'heartbleed' attacks using privacy-preserving computation," IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2014

N.G. Tsoutsos and M. Maniatakos, "Investigating the Application of One Instruction Set Computing for Encrypted Data Computation," International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE) 2013