-
Unleashing OpenTitan's Potential: a Silicon-Ready Embedded Secure Element for Root of Trust and Cryptographic Offloading
Authors:
Maicol Ciani,
Emanuele Parisi,
Alberto Musa,
Francesco Barchi,
Andrea Bartolini,
Ari Kulmala,
Rafail Psiakis,
Angelo Garofalo,
Andrea Acquaviva,
Davide Rossi
Abstract:
The rapid advancement and exploration of open-hardware RISC-V platforms are driving significant changes in sectors like autonomous vehicles, smart-city infrastructure, and medical devices. OpenTitan stands out as a groundbreaking open-source RISC-V design with a comprehensive security toolkit as a standalone system-on-chip (SoC). OpenTitan includes Earl Grey, a fully implemented and silicon-proven…
▽ More
The rapid advancement and exploration of open-hardware RISC-V platforms are driving significant changes in sectors like autonomous vehicles, smart-city infrastructure, and medical devices. OpenTitan stands out as a groundbreaking open-source RISC-V design with a comprehensive security toolkit as a standalone system-on-chip (SoC). OpenTitan includes Earl Grey, a fully implemented and silicon-proven SoC, and Darjeeling, announced but not yet fully implemented. Earl Grey targets standalone SoC implementations, while Darjeeling is for integrable implementations. The literature lacks a silicon-ready embedded implementation of an open-source Root of Trust, despite lowRISC's efforts on Darjeeling. We address the limitations of existing implementations by optimizing data transfer latency between memory and cryptographic accelerators to prevent under-utilization and ensure efficient task acceleration. Our contributions include a comprehensive methodology for integrating custom extensions and IPs into the Earl Grey architecture, architectural enhancements for system-level integration, support for varied boot modes, and improved data movement across the platform. These advancements facilitate deploying OpenTitan in broader SoCs, even without specific technology-dependent IPs, providing a deployment-ready research vehicle for the community. We integrated the extended Earl Grey architecture into a reference architecture in a 22nm FDX technology node, benchmarking the enhanced architecture's performance. The results show significant improvements in cryptographic processing speed, achieving up to 2.7x speedup for SHA-256/HMAC and 1.6x for AES accelerators compared to the baseline Earl Grey architecture.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
A Deep Convolutional Neural Network-based Model for Aspect and Polarity Classification in Hausa Movie Reviews
Authors:
Umar Ibrahim,
Abubakar Yakubu Zandam,
Fatima Muhammad Adam,
Aminu Musa
Abstract:
Aspect-based Sentiment Analysis (ABSA) is crucial for understanding sentiment nuances in text, especially across diverse languages and cultures. This paper introduces a novel Deep Convolutional Neural Network (CNN)-based model tailored for aspect and polarity classification in Hausa movie reviews, an underrepresented language in sentiment analysis research. A comprehensive Hausa ABSA dataset is cr…
▽ More
Aspect-based Sentiment Analysis (ABSA) is crucial for understanding sentiment nuances in text, especially across diverse languages and cultures. This paper introduces a novel Deep Convolutional Neural Network (CNN)-based model tailored for aspect and polarity classification in Hausa movie reviews, an underrepresented language in sentiment analysis research. A comprehensive Hausa ABSA dataset is created, filling a significant gap in resource availability. The dataset, preprocessed using sci-kit-learn for TF-IDF transformation, includes manually annotated aspect-level feature ontology words and sentiment polarity assignments. The proposed model combines CNNs with attention mechanisms for aspect-word prediction, leveraging contextual information and sentiment polarities. With 91% accuracy on aspect term extraction and 92% on sentiment polarity classification, the model outperforms traditional machine models, offering insights into specific aspects and sentiments. This study advances ABSA research, particularly in underrepresented languages, with implications for cross-cultural linguistic research.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Assessing the Performance of OpenTitan as Cryptographic Accelerator in Secure Open-Hardware System-on-Chips
Authors:
Emanuele Parisi,
Alberto Musa,
Maicol Ciani,
Francesco Barchi,
Davide Rossi,
Andrea Bartolini,
Andrea Acquaviva
Abstract:
RISC-V open-source systems are emerging in deployment scenarios where safety and security are critical. OpenTitan is an open-source silicon root-of-trust designed to be deployed in a wide range of systems, from high-end to deeply embedded secure environments. Despite the availability of various cryptographic hardware accelerators that make OpenTitan suitable for offloading cryptographic workloads…
▽ More
RISC-V open-source systems are emerging in deployment scenarios where safety and security are critical. OpenTitan is an open-source silicon root-of-trust designed to be deployed in a wide range of systems, from high-end to deeply embedded secure environments. Despite the availability of various cryptographic hardware accelerators that make OpenTitan suitable for offloading cryptographic workloads from the main processor, there has been no accurate and quantitative establishment of the benefits derived from using OpenTitan as a secure accelerator. This paper addresses this gap by thoroughly analysing strengths and inefficiencies when offloading cryptographic workloads to OpenTitan. The focus is on three key IPs - HMAC, AES, and OpenTitan Big Number accelerator (OTBN) - which can accelerate four security workloads: Secure Hash Functions, Message Authentication Codes, Symmetric cryptography, and Asymmetric cryptography. For every workload, we develop a bare-metal driver for the OpenTitan accelerator and analyze its efficiency when computation is offloaded from a RISC-V application core within a System-on-Chip designed for secure Cyber-Physical Systems applications. Finally, we assess it against a software implementation on the application core. The characterization was conducted on a cycle-accurate RTL simulator of the System-on-Chip (SoC). Our study demonstrates that OpenTitan significantly outperforms software implementations, with speedups ranging from 4.3x to 12.5x. However, there is potential for even greater gains as the current OpenTitan utilizes a fraction of the accelerator bandwidths, which ranges from 16% to 61%, depending on the memory being accessed and the accelerator used. Our results open the way to the optimization of OpenTitan-based secure platforms, providing design guidelines to unlock the full potential of its accelerators in secure applications.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
TitanCFI: Toward Enforcing Control-Flow Integrity in the Root-of-Trust
Authors:
Emanuele Parisi,
Alberto Musa,
Simone Manoni,
Maicol Ciani,
Davide Rossi,
Francesco Barchi,
Andrea Bartolini,
Andrea Acquaviva
Abstract:
Modern RISC-V platforms control and monitor security-critical systems such as industrial controllers and autonomous vehicles. While these platforms feature a Root-of-Trust (RoT) to store authentication secrets and enable secure boot technologies, they often lack Control-Flow Integrity (CFI) enforcement and are vulnerable to cyber-attacks which divert the control flow of an application to trigger m…
▽ More
Modern RISC-V platforms control and monitor security-critical systems such as industrial controllers and autonomous vehicles. While these platforms feature a Root-of-Trust (RoT) to store authentication secrets and enable secure boot technologies, they often lack Control-Flow Integrity (CFI) enforcement and are vulnerable to cyber-attacks which divert the control flow of an application to trigger malicious behaviours. Recent techniques to enforce CFI in RISC-V systems include ISA modifications or custom hardware IPs, all requiring ad-hoc binary toolchains or design of CFI primitives in hardware. This paper proposes TitanCFI, a novel approach to enforce CFI in the RoT. TitanCFI modifies the commit stage of the protected core to stream control flow instructions to the RoT and it integrates the CFI enforcement policy in the RoT firmware. Our approach enables maximum reuse of the hardware resource present in the System-on-Chip (SoC), and it avoids the design of custom IPs and the modification of the compilation toolchain, while exploiting the RoT tamper-proof storage and cryptographic accelerators to secure CFI metadata. We implemented the proposed architecture on a modern RISC-V SoC along with a return address protection policy in the RoT, and benchmarked area and runtime overhead. Experimental results show that TitanCFI achieves overhead comparable to SoA hardware CFI solutions for most benchmarks, with lower area overhead, resulting in 1% of additional area occupation.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
The Emergence of Anisotropic Superconductivity in the Nodal-line Semi-metal TlTaSe2
Authors:
Mukhtar Lawan Adam,
Ibrahim Buba Garba,
Sulaiman Muhammad Gana,
Bala Ismail Adamu,
Abba Alhaji Bala,
Abdulsalam Aji Suleiman,
Ahmad Hamisu,
Tijjani Hassan Darma,
Auwal Musa,
Abdulkadir S. Gidado
Abstract:
TlTaSe2 is a non-centrosymmetric quasi-2D crystal semi-metal hosting nodal-line topological features protected by mirror-reflection symmetry. Here, we investigated the superconducting properties of TlTaSe2 using the first-principles anisotropic Migdal-Eliashberg theory. The Fermi surface hosts well gapped multiband features contributed by the Ta 5d and Tl 6p orbitals. Moreso, anisotropic supercond…
▽ More
TlTaSe2 is a non-centrosymmetric quasi-2D crystal semi-metal hosting nodal-line topological features protected by mirror-reflection symmetry. Here, we investigated the superconducting properties of TlTaSe2 using the first-principles anisotropic Migdal-Eliashberg theory. The Fermi surface hosts well gapped multiband features contributed by the Ta 5d and Tl 6p orbitals. Moreso, anisotropic superconducting gaps were found to exist at 2.15 and 4.5 meV around the in-plane orbitals, coupling effectively with the in-plane phonons of the Ta and Tl atoms. Using the Allen-Dynes-modified McMillan formula, we found a superconducting transition temperature of 6.67 K, accompanied by a robust electron-phonon coupling constant λ of 0.970. This investigation provides valuable insights into the mechanisms underlying anisotropic superconductivity in TlTaSe2.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Investigation of the aptness of newly developed epoxy-based equivalent tissues for newborn and 5-years old in paediatric radiology
Authors:
Nabeel Ibrahim Ashour,
Muhammad Fahmi Rizal Abdul Hadi,
Nurul Ab. Aziz Hashikin,
Mohammed Ali Dheyab,
Ahmed Sadeq Musa,
Nik Noor Ashikin Nik Ab Razak,
Mohd Zahri Abdul Aziz
Abstract:
The varied radiological applications of tissue equivalent (TE) materials encompass quality checks, diagnostic imaging and dose evaluations. Nevertheless, the availability of compounds representative of paediatric patient tissues for scientific use in lower diagnostic photon energy spectra is limited. In this study, several TE substitutes were developed which replicate the radiographic characterist…
▽ More
The varied radiological applications of tissue equivalent (TE) materials encompass quality checks, diagnostic imaging and dose evaluations. Nevertheless, the availability of compounds representative of paediatric patient tissues for scientific use in lower diagnostic photon energy spectra is limited. In this study, several TE substitutes were developed which replicate the radiographic characteristics of human tissue within these energy ranges, i.e. TE materials for neonatal soft tissue (ESST-NB), neonatal skeletal tissue (ESTB-NB), and the equivalent tissue types representative of a 5 year old child (ESST and ESBT, respectively). The ORNL stylised computational model series was used as a source for the desired elemental proportions. The density, effective atomic number, CT numbers and electron densities calculated for the developed tissue substitutes approximated those of the phantom system used as a reference. Additionally, in kee** with the material choice and production limitations, as close correlations as possible were achieved for all the materials in relation to the reference data for mass densities, mass attenuation coefficients and mass energy-absorption coefficients. The TE substitutes for the newborn over an energy range of 47 keV to 66 keV exhibited maximum discrepancies for μ/\r{ho} of 1.6% to -3.01%, and for μ_en/\r{ho} of 1.15% to -1.4% in relation to the ORNL reference samples. The respective equivalent data ranges were 1.09 % to -3.02% and 1.92% to -2.53% for the TE materials representative of a 5-year-old. Given the excellent concordance achieved between the newly constructed TE materials and the reference data, these compounds can subsequently be utilised to create physical phantoms representative of tissue types in neonates and children aged 5 years.
△ Less
Submitted 25 December, 2022;
originally announced December 2022.
-
Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method
Authors:
Arbena Musa,
Kamer Vishi,
Blerim Rexha
Abstract:
Biometric authentication methods, representing the "something you are" scheme, are considered the most secure approach for gaining access to protected resources. Recent attacks using Machine Learning techniques demand a serious systematic reevaluation of biometric authentication. This paper analyzes and presents the Fast Gradient Sign Method (FGSM) attack using face recognition for biometric authe…
▽ More
Biometric authentication methods, representing the "something you are" scheme, are considered the most secure approach for gaining access to protected resources. Recent attacks using Machine Learning techniques demand a serious systematic reevaluation of biometric authentication. This paper analyzes and presents the Fast Gradient Sign Method (FGSM) attack using face recognition for biometric authentication. Machine Learning techniques have been used to train and test the model, which can classify and identify different people's faces and which will be used as a target for carrying out the attack. Furthermore, the case study will analyze the implementation of the FGSM and the level of performance reduction that the model will have by applying this method in attacking. The test results were performed with the change of parameters both in terms of training and attacking the model, thus showing the efficiency of applying the FGSM.
△ Less
Submitted 10 March, 2022;
originally announced March 2022.
-
Effects of withdrawal speeds on the structural, morphological, electrical, and optical properties of CuO thin films synthesized by dip-coating for CO2 gas sensing
Authors:
A. M. M. Musa,
S. F. U. Farhad,
M. A. Gafur,
A. T. M. K. Jamil
Abstract:
Copper oxide (CuO) thin films have been deposited on glass substrates by a facile sol-gel dip-coating technique with varying withdrawal speeds from 0.73 to 4.17 mm/s. The variation of film thickness manifested by dip-coating withdrawal speeds was investigated in detail to investigate its effect on the structural, morphological, optoelectrical, and wettability properties of CuO thin films for carbo…
▽ More
Copper oxide (CuO) thin films have been deposited on glass substrates by a facile sol-gel dip-coating technique with varying withdrawal speeds from 0.73 to 4.17 mm/s. The variation of film thickness manifested by dip-coating withdrawal speeds was investigated in detail to investigate its effect on the structural, morphological, optoelectrical, and wettability properties of CuO thin films for carbon dioxide (CO2) gas-sensing applications. The crystallinity, as well as phase purity of dip-coated CuO, were confirmed by both X-ray diffraction (XRD) and Raman spectral analyses. The surface morphology of the films characterized by the scanning electron microscopy (SEM) revealed that pore density decreases with the increase of withdrawal speeds and grain size is found to increase with the increase of film thickness corroborating the XRD results. The optical bandgap of dip-coated CuO films was estimated in the range of 1.47 - 1.52 eV from the UV-VIS-NIR transmission data and it is found to decrease with the increment of Urbach tail states accompanied by the increase of film thickness. The ratio of the electrical and optical conductivity of CuO films is found to decrease with increasing withdrawal speeds due to the variation of carrier concentration. Among all the studied films, the sample deposited to a 0.73 mm/s withdrawal speed exhibited the highest crystallinity, porous morphology, highest pore density, optoelectrical conductivity as well as water contact angle, and therefore maximum gas sensing response of CO2 vapor in the air recorded at room temperature.
△ Less
Submitted 6 July, 2021; v1 submitted 19 June, 2021;
originally announced June 2021.
-
NaijaNER : Comprehensive Named Entity Recognition for 5 Nigerian Languages
Authors:
Wuraola Fisayo Oyewusi,
Olubayo Adekanmbi,
Ifeoma Okoh,
Vitus Onuigwe,
Mary Idera Salami,
Opeyemi Osakuade,
Sharon Ibejih,
Usman Abdullahi Musa
Abstract:
Most of the common applications of Named Entity Recognition (NER) is on English and other highly available languages. In this work, we present our findings on Named Entity Recognition for 5 Nigerian Languages (Nigerian English, Nigerian Pidgin English, Igbo, Yoruba and Hausa). These languages are considered low-resourced, and very little openly available Natural Language Processing work has been d…
▽ More
Most of the common applications of Named Entity Recognition (NER) is on English and other highly available languages. In this work, we present our findings on Named Entity Recognition for 5 Nigerian Languages (Nigerian English, Nigerian Pidgin English, Igbo, Yoruba and Hausa). These languages are considered low-resourced, and very little openly available Natural Language Processing work has been done in most of them. In this work, individual NER models were trained and metrics recorded for each of the languages. We also worked on a combined model that can handle Named Entity Recognition (NER) for any of the five languages. The combined model works well for Named Entity Recognition(NER) on each of the languages and with better performance compared to individual NER models trained specifically on annotated data for the specific language. The aim of this work is to share our learning on how information extraction using Named Entity Recognition can be optimized for the listed Nigerian Languages for inclusion, ease of deployment in production and reusability of models. Models developed during this project are available on GitHub https://git.io/JY0kk and an interactive web app https://nigner.herokuapp.com/.
△ Less
Submitted 30 March, 2021;
originally announced May 2021.
-
The Language of Food during the Pandemic: Hints about the Dietary Effects of Covid-19
Authors:
Hoang Van,
Ahmad Musa,
Mihai Surdeanu,
Stephen Kobourov
Abstract:
We study the language of food on Twitter during the pandemic lockdown in the United States, focusing on the two month period of March 15 to May 15, 2020. Specifically, we analyze over770,000 tweets published during the lockdown and the equivalent period in the five previous years and highlight several worrying trends. First, we observe that during the lockdown there was a notable shift from mentio…
▽ More
We study the language of food on Twitter during the pandemic lockdown in the United States, focusing on the two month period of March 15 to May 15, 2020. Specifically, we analyze over770,000 tweets published during the lockdown and the equivalent period in the five previous years and highlight several worrying trends. First, we observe that during the lockdown there was a notable shift from mentions of healthy foods to unhealthy foods. Second, we show an increased pointwise mutual information of depression hashtags with food-related tweets posted during the lockdown and an increased association between depression hashtags and unhealthy foods, tobacco, and alcohol during the lockdown.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
Feasibility of Video-based Sub-meter Localization on Resource-constrained Platforms
Authors:
Abm Musa,
Jakob Eriksson
Abstract:
While the satellite-based Global Positioning System (GPS) is adequate for some outdoor applications, many other applications are held back by its multi-meter positioning errors and poor indoor coverage. In this paper, we study the feasibility of real-time video-based localization on resource-constrained platforms. Before commencing a localization task, a video-based localization system downloads a…
▽ More
While the satellite-based Global Positioning System (GPS) is adequate for some outdoor applications, many other applications are held back by its multi-meter positioning errors and poor indoor coverage. In this paper, we study the feasibility of real-time video-based localization on resource-constrained platforms. Before commencing a localization task, a video-based localization system downloads an offline model of a restricted target environment, such as a set of city streets, or an indoor shop** mall. The system is then able to localize the user within the model, using only video as input.
To enable such a system to run on resource-constrained embedded systems or smartphones, we (a) propose techniques for efficiently building a 3D model of a surveyed path, through frame selection and efficient feature matching, (b) substantially reduce model size by multiple compression techniques, without sacrificing localization accuracy, (c) propose efficient and concurrent techniques for feature extraction and matching to enable online localization, (d) propose a method with interleaved feature matching and optical flow based tracking to reduce the feature extraction and matching time in online localization.
Based on an extensive set of both indoor and outdoor videos, manually annotated with location ground truth, we demonstrate that sub-meter accuracy, at real-time rates, is achievable on smart-phone type platforms, despite challenging video conditions.
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
Computational Analysis of the structural properties of Economic and Financial Networks
Authors:
Frank Emmert-Streib,
Aliyu Musa,
Kestutis Baltakys,
Juho Kanniainen,
Shailesh Tripathi,
Olli Yli-Harja,
Herbert Jodlbauer,
Matthias Dehmer
Abstract:
In recent years, methods from network science are gaining rapidly interest in economics and finance. A reason for this is that in a globalized world the interconnectedness among economic and financial entities are crucial to understand and networks provide a natural framework for representing and studying such systems. In this paper, we are surveying the use of networks and network-based methods f…
▽ More
In recent years, methods from network science are gaining rapidly interest in economics and finance. A reason for this is that in a globalized world the interconnectedness among economic and financial entities are crucial to understand and networks provide a natural framework for representing and studying such systems. In this paper, we are surveying the use of networks and network-based methods for studying economy related questions. We start with a brief overview of graph theory and basic definitions. Then we discuss descriptive network measures and network complexity measures for quantifying structural properties of economic networks. Finally, we discuss different network and tree structures as relevant for applications.
△ Less
Submitted 12 October, 2017;
originally announced October 2017.