Yang Xie

ME

I'm a Research Scientist @ Facebook. Prior to joining FB, I was a Grad Terp in the Electrical and Computer Engineering department of the University of Maryland, College Park. My advisor was Prof. Ankur Srivastava.

View My GitHub Profile

WELCOME TO YANG XIE’S WEBSITE

[Google Scholar] [Github] [Linkedin]

[NEWS] I joined Facebook Marketplace Integrity team. Social network + E-commerce + Security/integrity, what an interesting combination!

WORK

Facebook

University of Maryland, College Park

Facebook

University of Maryland, College Park

EDUCATION

University of Maryland, College Park

Zhejiang University

Univeristy of California, Davis

Hong Kong University of Science and Technology

PUBLICATION

Book Chapter:

[B3] Bao, Chongxi, Yang Xie, Yuntao Liu, and Ankur Srivastava. “Reverse Engineering-Based Hardware Trojan Detection.” In The Hardware Trojan War, pp. 269-288. Springer, Cham, 2018.

[B2] Yuntao Liu, Yang Xie, and Ankur Srivastava. “Security in Emerging Fabrication Technologies” In Security Opportunities in Nano Devices and Emerging Technologies (Chapter 11), CRC Press, 2017

[B1] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “3D/2.5 D IC-Based Obfuscation.” In Hardware Protection through Obfuscation, pp. 291-314. Springer International Publishing, 2017.

Journal:

[J4] Xie, Yang and Ankur Srivastava. “Anti-SAT: Mitigating SAT Attack on Logic Locking.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2018

[J3] Liu, Yuntao, Yang Xie, Chongxi Bao, and Ankur Srivastava. “A Combined Optimization-Theoretic and Side-Channel Approach for Attacking Strong Physical Unclonable Functions.” IEEE Transactions on Very Large Scale Integration (TVLSI) Systems (2017).

[J2] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “Security-Aware 2.5 D Integrated Circuit Design Flow Against Hardware IP Piracy.” Computer 50, no. 5 (2017): 62-71.

[J1] Xie, Yang, Chongxi Bao, Caleb Serafy, Tiantao Lu, Ankur Srivastava, and Mark Tehranipoor. “Security and vulnerability implications of 3D ICs.” IEEE Transactions on Multi-Scale Computing Systems (TMSCS) 2, no. 2 (2016): 108-122.

Conference/workshop:

[C10] Chakraborty, Abhishek, Yang Xie, and Ankur Srivastava. “GPU Obfuscation: Attack and Defense Strategies.” In Proceedings of the 55th Annual Design Automation Conference (DAC) 2018 (accepted).

[C9] Liu, Yuntao, Yang Xie, and Ankur Srivastava. “Neural trojans.” In Computer Design (ICCD), 2017 IEEE International Conference on, pp. 45-48. IEEE, 2017.

[C8] Chakraborty, Abhishek, Yang Xie, and Ankur Srivastava. “Template Attack Based Deobfuscation of Integrated Circuits.” In Computer Design (ICCD), 2017 IEEE International Conference on, pp. 41-44. IEEE, 2017.

[C7] Liu, Yuntao, Chongxi Bao, Yang Xie, and Ankur Srivastava. “Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security.” In Circuits and Systems (ISCAS), 2017 IEEE International Symposium on, pp. 1-4. IEEE, 2017.

[C6] Xie, Yang, and Ankur Srivastava. “Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction.” In Proceedings of the 54th Annual Design Automation Conference (DAC) 2017, p. 9. ACM, 2017.

[C5] Xie, Yang, and Ankur Srivastava. “Mitigating sat attack on logic locking.” In International Conference on Cryptographic Hardware and Embedded Systems (CHES), pp. 127-146. Springer Berlin Heidelberg, 2016.

[C4] Xie, Yang, Chongxi Bao, Yuntao Liu, and Ankur Srivastava. “2.5 D/3D Integration Technologies for Circuit Obfuscation.” In Microprocessor and SOC Test and Verification (MTV), 2016 17th International Workshop on, pp. 39-44. IEEE, 2016.

[C3] Liu, Yuntao, Yang Xie, Chongxi Bao, and Ankur Srivastava. “An optimization-theoretic approach for attacking physical unclonable functions.” In Computer-Aided Design (ICCAD), 2016 IEEE/ACM International Conference on, pp. 1-6. IEEE, 2016.

[C2] Xie, Yang, Chongxi Bao, and Ankur Srivastava. “Security-aware design flow for 2.5 D IC technology.” In Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (TRUSTED), pp. 31-38. ACM, 2015.

[C1] Bao, Chongxi, Yang Xie, and Ankur Srivastava. “A security-aware design scheme for better hardware Trojan detection sensitivity.” In Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on, pp. 52-55. IEEE, 2015.

ACADEMIC SERVICES

Journal Reviewer:

Conference Reviewer:

MY GROUP @ UMD