Skip to main content

Showing 1–2 of 2 results for author: Omidi, B

.
  1. arXiv:2401.02342  [pdf, other

    cs.CR cs.AR cs.LG

    Evasive Hardware Trojan through Adversarial Power Trace

    Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

    Abstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In thi… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  2. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

    Authors: Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun

    Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes a… ▽ More

    Submitted 15 November, 2021; v1 submitted 2 October, 2021; originally announced October 2021.