I'm a Research Scientist @ Facebook. Prior to joining FB, I was a Grad Terp in the Electrical and Computer Engineering department of the University of Maryland, College Park. My advisor was Prof. Ankur Srivastava.
[Google Scholar] [Github] [Linkedin]
[NEWS]
I joined Facebook Marketplace Integrity team. Social network + E-commerce + Security/integrity, what an interesting combination!
[B3] Bao, Chongxi, Yang Xie, Yuntao Liu, and Ankur Srivastava. “Reverse Engineering-Based Hardware Trojan Detection.” In The Hardware Trojan War, pp. 269-288. Springer, Cham, 2018.
[B2] Yuntao Liu, Yang Xie, and Ankur Srivastava. “Security in Emerging Fabrication Technologies” In Security Opportunities in Nano Devices and Emerging Technologies (Chapter 11), CRC Press, 2017
[B1] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “3D/2.5 D IC-Based Obfuscation.” In Hardware Protection through Obfuscation, pp. 291-314. Springer International Publishing, 2017.
[J4] Xie, Yang and Ankur Srivastava. “Anti-SAT: Mitigating SAT Attack on Logic Locking.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2018
[J3] Liu, Yuntao, Yang Xie, Chongxi Bao, and Ankur Srivastava. “A Combined Optimization-Theoretic and Side-Channel Approach for Attacking Strong Physical Unclonable Functions.” IEEE Transactions on Very Large Scale Integration (TVLSI) Systems (2017).
[J2] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “Security-Aware 2.5 D Integrated Circuit Design Flow Against Hardware IP Piracy.” Computer 50, no. 5 (2017): 62-71.
[J1] Xie, Yang, Chongxi Bao, Caleb Serafy, Tiantao Lu, Ankur Srivastava, and Mark Tehranipoor. “Security and vulnerability implications of 3D ICs.” IEEE Transactions on Multi-Scale Computing Systems (TMSCS) 2, no. 2 (2016): 108-122.
[C10] Chakraborty, Abhishek, Yang Xie, and Ankur Srivastava. “GPU Obfuscation: Attack and Defense Strategies.” In Proceedings of the 55th Annual Design Automation Conference (DAC) 2018 (accepted).
[C9] Liu, Yuntao, Yang Xie, and Ankur Srivastava. “Neural trojans.” In Computer Design (ICCD), 2017 IEEE International Conference on, pp. 45-48. IEEE, 2017.
[C8] Chakraborty, Abhishek, Yang Xie, and Ankur Srivastava. “Template Attack Based Deobfuscation of Integrated Circuits.” In Computer Design (ICCD), 2017 IEEE International Conference on, pp. 41-44. IEEE, 2017.
[C7] Liu, Yuntao, Chongxi Bao, Yang Xie, and Ankur Srivastava. “Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security.” In Circuits and Systems (ISCAS), 2017 IEEE International Symposium on, pp. 1-4. IEEE, 2017.
[C6] Xie, Yang, and Ankur Srivastava. “Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction.” In Proceedings of the 54th Annual Design Automation Conference (DAC) 2017, p. 9. ACM, 2017.
[C5] Xie, Yang, and Ankur Srivastava. “Mitigating sat attack on logic locking.” In International Conference on Cryptographic Hardware and Embedded Systems (CHES), pp. 127-146. Springer Berlin Heidelberg, 2016.
[C4] Xie, Yang, Chongxi Bao, Yuntao Liu, and Ankur Srivastava. “2.5 D/3D Integration Technologies for Circuit Obfuscation.” In Microprocessor and SOC Test and Verification (MTV), 2016 17th International Workshop on, pp. 39-44. IEEE, 2016.
[C3] Liu, Yuntao, Yang Xie, Chongxi Bao, and Ankur Srivastava. “An optimization-theoretic approach for attacking physical unclonable functions.” In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on, pp. 1-6. IEEE, 2016.
[C2] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “Security-aware design flow for 2.5 D IC technology.” In Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (TRUSTED), pp. 31-38. ACM, 2015.
[C1] Bao, Chongxi, Yang Xie, and Ankur Srivastava. “A security-aware design scheme for better hardware Trojan detection sensitivity.” In Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on, pp. 52-55. IEEE, 2015.