Blackstone, J. and Patterson, W., 2022 "Isolating key phrases to identify ransomware attackers" in 2022 International Conference on Applied Human Factors and Ergonomics(AHFE)
Patterson, W. and Blackstone, J., 2022 "A metric to assist in detecting international phishing or ransomware cyberattacks" In 2022 International Conference on Applied Human Factors and Ergonomics (AHFE)
Blackstone, J., Das, D., Althoff, A., Sen, S., & Kastner, R., 2021, November. “iSTELLAR: intermittent Signature aTtenuation Embedded CRYPTO with Low-Level metAl Routing”. In 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (pp. 1-9). IEEE.
Blackstone, J., Hu, W., Althoff, A., Ardeshiricham, A., Zhang, L. and Kastner, R., 2020. A unified model for gate level propagation analysis. arXiv preprint arXiv:2012.02791.
Althoff, A., Blackstone, J. and Kastner, R., 2019, November. Holistic power side-channel leakage assessment: Towards a robust multidimensional metric. In 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)(pp. 1-8). IEEE.
Zhang, L., Hu, W., Ardeshiricham, A., Tai, Y., Blackstone, J., Mu, D. and Kastner, R., 2018, March. “Examining the consequences of high-level synthesis optimizations on power side-channel”. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 1167-1170). IEEE.
Shen, L., Mu, D., Cao, G., Qin, M., Blackstone, J. and Kastner, R., 2018. Symbolic execution based test-patterns generation algorithm for hardware Trojan detection. computers & security, 78, pp.267-280.
Hu, W., Zhang, L., Ardeshiricham, A., Blackstone, J., Hou, B., Tai, Y. and Kastner, R., 2017, November. “Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans”. In 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (pp. 707-713). IEEE.
Richmond, D., Blackstone, J., Hogains, M., Thai, K. and Kastner, R., 2016, May. Tinker: Generating Custom Memory Architectures for Altera's OpenCL Compiler. In 2016 IEEE 24th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM) (pp. 21-24). IEEE.
Murray, A., Begna, G., Nwafor, E., Blackstone, J. and Patterson, W., 2015, April. “Cloud service security & application vulnerability”. In SoutheastCon 2015 (pp. 1-8). IEEE.
Banks, K., Blackstone, J., Perry, S., Patterson, W., des Valle, P., Mujica, S., Aedo, C., Sanchez, A., Andrade, J. and Stuardo, J., 2012, March. “DDoS and other anomalous web traffic behavior in selected countries”. In Southeastcon, 2012 Proceedings of IEEE (pp. 1-5). IEEE.