Skip to main content

Showing 1–6 of 6 results for author: Rafatirad, S

.
  1. arXiv:2312.13530  [pdf, other

    cs.CR cs.AI cs.LG

    HW-V2W-Map: Hardware Vulnerability to Weakness Map** Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

    Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi

    Abstract: The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 22 pages, 10 pages appendix, 10 figures, Submitted to ACM TODAES

  2. A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

    Authors: Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Logic obfuscation is introduced as a pivotal defense against multiple hardware threats on Integrated Circuits (ICs), including reverse engineering (RE) and intellectual property (IP) theft. The effectiveness of logic obfuscation is challenged by the recently introduced Boolean satisfiability (SAT) attack and its variants. A plethora of countermeasures has also been proposed to thwart the SAT attac… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Early Access ) 2021 1-1

  3. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

    Authors: Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun

    Abstract: Cloud computing paradigms have emerged as a major facility to store and process the massive data produced by various business units, public organizations, Internet-of-Things, and cyber-physical systems. To meet users' performance requirements while maximizing resource utilization to achieve cost-efficiency, cloud administrators leverage schedulers to orchestrate tasks to different physical nodes a… ▽ More

    Submitted 15 November, 2021; v1 submitted 2 October, 2021; originally announced October 2021.

  4. arXiv:2003.09945  [pdf, other

    cs.LG cs.SI stat.ML

    Deep Multi-attributed Graph Translation with Node-Edge Co-evolution

    Authors: Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Generalized from image and language translation, graph translation aims to generate a graph in the target domain by conditioning an input graph in the source domain. This promising topic has attracted fast-increasing attention recently. Existing works are limited to either merely predicting the node attributes of graphs with fixed topology or predicting only the graph topology without considering… ▽ More

    Submitted 15 June, 2020; v1 submitted 22 March, 2020; originally announced March 2020.

    Comments: This paper has won the Best Paper Award in International Conference on Data Mining (ICDM), Bei**g, China, 2019

    Journal ref: International Conference on Data Mining (ICDM), Bei**g, China, 2019, pp. 250-259

  5. arXiv:1907.12952  [pdf, other

    cs.AR cs.LG

    Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

    Authors: Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad

    Abstract: The emergence of High-Level Synthesis (HLS) tools shifted the paradigm of hardware design by making the process of map** high-level programming languages to hardware design such as C to VHDL/Verilog feasible. HLS tools offer a plethora of techniques to optimize designs for both area and performance, but resource usage and timing reports of HLS tools mostly deviate from the post-implementation re… ▽ More

    Submitted 28 July, 2019; originally announced July 2019.

    Comments: This paper has been accepted in The International Conference on Field-Programmable Logic and Applications 2019 (FPL'19)

  6. arXiv:1902.05357  [pdf, other

    cs.CR cs.AI cs.CG cs.LG

    Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

    Authors: Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu

    Abstract: Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation… ▽ More

    Submitted 21 March, 2020; v1 submitted 14 February, 2019; originally announced February 2019.

    Comments: Design, Automation and Test in Europe (DATE) 2020