Skip to main content

Showing 51–65 of 65 results for author: Karri, R

.
  1. ASSURE: RTL Locking Against an Untrusted Foundry

    Authors: Christian Pilato, Animesh Basak Chowdhury, Donatella Sciuto, Siddharth Garg, Ramesh Karri

    Abstract: Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (IC) and fabricate them in a third-party foundry. Unauthorized IC copies cost these companies billions of dollars annually. While several methods have been proposed for hardware IP obfuscation, they operate on the gate-level netlist, i.e., after the synthesis tools embed… ▽ More

    Submitted 18 April, 2021; v1 submitted 11 October, 2020; originally announced October 2020.

    Comments: Accepted for publication in IEEE Transactions on VLSI Systems on 06-Apr-2021

  2. arXiv:2009.01026  [pdf, other

    cs.SE cs.CL cs.LG stat.ML

    DAVE: Deriving Automatically Verilog from English

    Authors: Hammond Pearce, Benjamin Tan, Ramesh Karri

    Abstract: While specifications for digital systems are provided in natural language, engineers undertake significant efforts to translate them into the programming languages understood by compilers for digital systems. Automating this process allows designers to work with the language in which they are most comfortable --the original natural language -- and focus instead on other downstream design challenge… ▽ More

    Submitted 27 August, 2020; originally announced September 2020.

    Comments: 6 pages, 2 figures

  3. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  4. arXiv:2006.05042  [pdf, other

    cs.CR

    A Survey of Cybersecurity of Digital Manufacturing

    Authors: Priyanka Mahesh, Akash Tiwari, Chenglu **, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T. S. Bukkapatanam, Nikhil Gupta, Ramesh Karri

    Abstract: The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, that reduces inventory and the lead-time for delivering custom, batch-of-one products based on achieving convergence of Additive, Subtractive, and Hybrid manufacturing machines, Automation and Robotic Systems, Sensors, Computing, and Communication Networks, Artificial Intelligence, an… ▽ More

    Submitted 15 October, 2020; v1 submitted 9 June, 2020; originally announced June 2020.

  5. arXiv:2005.04867  [pdf, other

    cs.CR

    Security of Cloud FPGAs: A Survey

    Authors: Chenglu **, Vasudev Gohil, Ramesh Karri, Jeyavijayan Rajendran

    Abstract: Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a rapidly emerging trend on commercial cloud computing platforms such as Amazon Web Services (AWS), Huawei cloud, and Alibaba cloud. Cloud FPGAs allow cloud users to build hardware accelerators to speed up the computation in the cloud. However, since the cloud FPGA technology is still in its infancy, the security… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  6. arXiv:2005.04368  [pdf, other

    cs.CR

    HACK3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing

    Authors: Michael Linares, Nishant Aswani, Gary Mac, Chenglu **, Fei Chen, Nikhil Gupta, Ramesh Karri

    Abstract: Digital manufacturing (DM) cyber-physical system is vulnerable to both cyber and physical attacks. HACK3D is a series of crowdsourcing red-team-blue-team events hosted by the NYU Center for Cybersecurity to assess the strength of the security methods embedded in designs using DM. This study summarizes the lessons learned from the past three offerings of HACK3D, including ingenious ways in which sk… ▽ More

    Submitted 16 April, 2021; v1 submitted 9 May, 2020; originally announced May 2020.

  7. arXiv:2004.12492  [pdf, other

    cs.LG cs.CR stat.ML

    Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks

    Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri

    Abstract: Deep learning (DL) offers potential improvements throughout the CAD tool-flow, one promising application being lithographic hotspot detection. However, DL techniques have been shown to be especially vulnerable to inference and training time adversarial attacks. Recent work has demonstrated that a small fraction of malicious physical designers can stealthily "backdoor" a DL-based hotspot detector d… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  8. Hardware Trojan Detection Using Controlled Circuit Aging

    Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami

    Abstract: This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC. This increase in delay results in timing violations that reveal as timing errors at the output of the IC during its operation. We present experiments using aging-aware standard cell libraries to illus… ▽ More

    Submitted 20 April, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: 21 pages, 34 figures

  9. NNoculation: Catching BadNets in the Wild

    Authors: Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg

    Abstract: This paper proposes a novel two-stage defense (NNoculation) against backdoored neural networks (BadNets) that, repairs a BadNet both pre-deployment and online in response to backdoored test inputs encountered in the field. In the pre-deployment stage, NNoculation retrains the BadNet with random perturbations of clean validation inputs to partially reduce the adversarial impact of a backdoor. Post-… ▽ More

    Submitted 15 November, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

  10. arXiv:1907.08283  [pdf, other

    eess.SY

    Public Plug-in Electric Vehicles + Grid Data: Is a New Cyberattack Vector Viable?

    Authors: Samrat Acharya, Yury Dvorkin, Ramesh Karri

    Abstract: High-wattage demand-side appliances such as Plug-in Electric Vehicles (PEVs) are proliferating. As a result, information on the charging patterns of PEVs is becoming accessible via smartphone applications, which aggregate real-time availability and historical usage of public PEV charging stations. Moreover, information on the power grid infrastructure and operations has become increasingly availab… ▽ More

    Submitted 27 February, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

  11. arXiv:1906.10773  [pdf, other

    cs.LG cs.CR stat.ML

    Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection

    Authors: Kang Liu, Haoyu Yang, Yuzhe Ma, Benjamin Tan, Bei Yu, Evangeline F. Y. Young, Ramesh Karri, Siddharth Garg

    Abstract: There is substantial interest in the use of machine learning (ML) based techniques throughout the electronic computer-aided design (CAD) flow, particularly those based on deep learning. However, while deep learning methods have surpassed state-of-the-art performance in several applications, they have exhibited intrinsic susceptibility to adversarial perturbations --- small but deliberate alteratio… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Journal ref: ACM Trans. Des. Autom. Electron. Syst. 25, 5, Article 48 (August 2020)

  12. arXiv:1811.06012  [pdf, other

    cs.CR cond-mat.mes-hall cs.ET

    Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices

    Authors: Nikhil Rangarajan, Satwik Patnaik, Johann Knechtel, Ramesh Karri, Ozgur Sinanoglu, Shaloo Rakheja

    Abstract: The era of widespread globalization has led to the emergence of hardware-centric security threats throughout the IC supply chain. Prior defenses like logic locking, layout camouflaging, and split manufacturing have been researched extensively to protect against intellectual property (IP) piracy at different stages. In this work, we present dynamic camouflaging as a new technique to thwart IP rever… ▽ More

    Submitted 8 July, 2020; v1 submitted 14 November, 2018; originally announced November 2018.

    Comments: Published TETC version; original arxiv preprint found in v1

  13. arXiv:1711.01454  [pdf, other

    cs.DC

    Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

    Authors: Zahra Ghodsi, Siddharth Garg, Ramesh Karri

    Abstract: Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpo… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

    Comments: ICCAD 2017

  14. arXiv:1705.00767  [pdf, ps, other

    cs.CR

    On the Difficulty of Inserting Trojans in Reversible Computing Architectures

    Authors: Xiaotong Cui, Samah Saeed, Alwin Zulehner, Robert Wille, Rolf Drechsler, Kaijie Wu, Ramesh Karri

    Abstract: Fabrication-less design houses outsource their designs to 3rd party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to the system when triggered. Hardware Trojans in traditional CMOS-based circuits have been studied and Design-for-Trust (DFT) tec… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: This is a 10 pages paper with 12 figures. The paper is submitted to the International Test Conference 2017 and still under review

  15. arXiv:1704.08397  [pdf, ps, other

    cs.CR cs.ET

    Towards Reverse Engineering Reversible Logic

    Authors: Samah Mohamed Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, Ramesh Karri

    Abstract: Reversible logic has two main properties. First, the number of inputs is equal to the number of outputs. Second, it implements a one-to-one map**; i.e., one can reconstruct the inputs from the outputs. These properties enable its applications in building quantum computing architectures. In this paper, we study reverse engineering of reversible logic circuits, including reverse engineering of n… ▽ More

    Submitted 1 December, 2017; v1 submitted 26 April, 2017; originally announced April 2017.