Skip to main content

Showing 1–10 of 10 results for author: Rebeiro, C

.
  1. arXiv:2402.03704  [pdf, other

    cs.CR

    WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

    Authors: Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran

    Abstract: Timing vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing techniques, traditionally used for detecting software vulnerabilities, have shown promising results for uncovering vulnerabilities in large-scale hardware designs, such as processors. Researchers have adapted black-b… ▽ More

    Submitted 14 March, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted to USENIX Sec'24

  2. A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution

    Authors: Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro

    Abstract: In the last two decades, the evolving cyber-threat landscape has brought to center stage the contentious tradeoffs between the security and performance of modern microprocessors. The guarantees provided by the hardware to ensure no violation of process boundaries have been shown to be breached in several real-world scenarios. While modern CPU features such as superscalar, out-of-order, simultaneou… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  3. arXiv:2211.06153  [pdf, other

    cs.CR

    SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware

    Authors: Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V

    Abstract: Malware programs are diverse, with varying objectives, functionalities, and threat levels ranging from mere pop-ups to financial losses. Consequently, their run-time footprints across the system differ, impacting the optimal data source (Network, Operating system (OS), Hardware) and features that are instrumental to malware detection. Further, the variations in threat levels of malware classes aff… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  4. arXiv:2111.15259  [pdf, other

    cs.CR cs.DC

    Privacy-Preserving Decentralized Exchange Marketplaces

    Authors: Kavya Govindarajan, Dhinakaran Vinayagamurthy, Praveen Jayachandran, Chester Rebeiro

    Abstract: Decentralized exchange markets leveraging blockchain have been proposed recently to provide open and equal access to traders, improve transparency and reduce systemic risk of centralized exchanges. However, they compromise on the privacy of traders with respect to their asset ownership, account balance, order details and their identity. In this paper, we present Rialto, a fully decentralized priva… ▽ More

    Submitted 20 December, 2021; v1 submitted 30 November, 2021; originally announced November 2021.

    Comments: 17 pages, 7 figures

  5. arXiv:2109.03998  [pdf, other

    cs.CR

    LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler

    Authors: Nikhilesh Singh, Chester Rebeiro

    Abstract: Micro-architectural attacks use information leaked through shared resources to break hardware-enforced isolation. These attacks have been used to steal private information ranging from cryptographic keys to privileged Operating System (OS) data in devices ranging from mobile phones to cloud servers. Most existing software countermeasures either have unacceptable overheads or considerable false pos… ▽ More

    Submitted 20 September, 2021; v1 submitted 8 September, 2021; originally announced September 2021.

  6. arXiv:2010.05209  [pdf, ps, other

    cs.CR

    SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

    Authors: Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia

    Abstract: The emergence of distributed manufacturing ecosystems for electronic hardware involving untrusted parties has given rise to diverse trust issues. In particular, IP piracy, overproduction, and hardware Trojan attacks pose significant threats to digital design manufacturers. Watermarking has been one of the solutions employed by the semiconductor industry to overcome many of the trust issues. Howeve… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Comments: 5 page version

  7. arXiv:2008.01742  [pdf, other

    cs.DC cs.CR

    SISSLE in consensus-based Ripple: Some Improvements in Speed, Security and Last Mile Connectivity

    Authors: Mayank Mundhra, Chester Rebeiro

    Abstract: Cryptocurrencies are rapidly finding application in areas such as Real Time Gross Settlements and Payments. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General's Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called the Unique Node List (UNL), that represents the network… ▽ More

    Submitted 15 May, 2021; v1 submitted 4 August, 2020; originally announced August 2020.

    Comments: 11 Pages

  8. PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance

    Authors: Muhammad Arsath K F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro

    Abstract: The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover cryptographic keys from embedded devices, other applications such as mobile app fingerprinting, reverse engineering of firmware, and password recovery are growing threats. Countermeasures proposed so far are tuned to specific applications, such as c… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

    Comments: 10 pages, 13 figures, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2020

  9. arXiv:1908.01466  [pdf, other

    cs.AR

    PERI: A Posit Enabled RISC-V Core

    Authors: Sugandha Tiwari, Neel Gala, Chester Rebeiro, V. Kamakoti

    Abstract: Owing to the failure of Dennard's scaling the last decade has seen a steep growth of prominent new paradigms leveraging opportunities in computer architecture. Two technologies of interest are Posit and RISC-V. Posit was introduced in mid-2017 as a viable alternative to IEEE 754-2008. Posit promises more accuracy, higher dynamic range, and fewer unused states along with simpler hardware designs as… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  10. arXiv:1702.07223  [pdf, ps, other

    cs.CR

    GANDALF: A fine-grained hardware-software co-design for preventing memory attacks

    Authors: Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro

    Abstract: Reading or writing outside the bounds of a buffer is a serious security vulnerability that has been exploited in numerous occasions. These attacks can be prevented by ensuring that every buffer is only accessed within its specified bounds. In this paper we present Gandalf, a compiler-assisted hardware extension for the OpenRISC processor that thwarts all forms of memory based attacks including buf… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

    Comments: 5 Pages, 2 figures, Winning entry of CSAW Embedded Security Challenge 2016, Not published elsewhere

    MSC Class: 68M15 ACM Class: B.4.5; K.6.5