Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Arun K. Kanuparthi"'
Autor:
Mohammed Ashraf, Christian Wachsmann, Ozgur Sinanoglu, Nimisha Limaye, Arun K. Kanuparthi, Mohammed Nabeel
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 10:1507-1518
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:466-477
This paper presents RTL-ConTest, a Register Transfer Level (RTL) security vulnerability detection algorithm, that extracts critical process flows from a RTL design and executes RTL-level concolic testing to generate security test cases for identifyin
Publikováno v:
DAC
We present an effective methodology for formally verifying security-critical flows in a commercial System-on-Chip (SoC) which involve extensive interaction between firmware (FW) and hardware (HW). We describe several HW-FW interaction scenarios that
Autor:
Arun K. Kanuparthi, Ramesh Karri
Publikováno v:
ACM Transactions on Architecture and Code Optimization. 12:1-23
Security and reliability have become important concerns in the design of computer systems. On one hand, microarchitectural enhancements for security (such as for dynamic integrity checking of code at runtime) have been proposed. On the other hand, in
Publikováno v:
ACM Transactions on Architecture and Code Optimization. 12:1-25
The performance of an IC degrades over its lifetime, ultimately resulting in IC failure. In this article, we present a hardware attack (called MAGIC) to maliciously accelerate NBTI aging effects in cores. In this attack, we identify the input pattern
Autor:
Sateesh Addepalli, Arun K. Kanuparthi, Ramesh Karri, Jeyavijayan Rajendran, Mohamed Zahran, Gaston Ormazabal
Publikováno v:
IEEE Design & Test. 30:35-44
Modification to traditional SoC design flow can enable effective protection against maliciously inserted rogue functionality during design and fabrication. This article presents a joint circuit-architecture-level design approach that helps in prevent
Publikováno v:
HOST
Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program control flow through existing code without injecting malicious code to achieve his objective. In this paper, we propose Dynamic Sequence Checker (DSC), a framework t
Publikováno v:
IEEE Transactions on Information Forensics and Security. 7:321-332
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot time. Security can often be compromised due to the presence of vulnerabilities in the trusted software that is executed o
Publikováno v:
CyCAR@CCS
Internet of Things (IoT) is the interconnection of a large number of resource-constrained devices such as sensors, actuators, and nodes that generate large volumes of data which are then processed into useful actions in areas such as home and buildin
Publikováno v:
ICCD
High performance and low power consumption have traditionally been the primary design goals for computer architects. With computer systems facing a wave of attacks that disrupt their normal execution or leak sensitive data, computer security is no lo