-
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices
Authors:
Prakhar Sah,
Matthew Hicks
Abstract:
Internet of Things (IoT) devices sit at the intersection of unwieldy software complexity and unprecedented attacker access. This unique position comes with a daunting security challenge: how can I protect both proprietary code and confidential data on a device that the attacker has unfettered access to? Trusted Execution Environments (TEEs) promise to solve this challenge through hardware-based se…
▽ More
Internet of Things (IoT) devices sit at the intersection of unwieldy software complexity and unprecedented attacker access. This unique position comes with a daunting security challenge: how can I protect both proprietary code and confidential data on a device that the attacker has unfettered access to? Trusted Execution Environments (TEEs) promise to solve this challenge through hardware-based separation of trusted and untrusted computation and data. While TEEs do an adequate job of protecting secrets on desktop-class devices, we reveal that trade-offs made in one of the most widely-used commercial IoT devices undermine their TEE's security.
This paper uncovers two fundamental weaknesses in IP Encapsulation (IPE), the TEE deployed by Texas Instruments for MSP430 and MSP432 devices. We observe that lack of call site enforcement and residual state after unexpected TEE exits enable an attacker to reveal all proprietary code and secret data within the IPE. We design and implement an attack called RIPencapsulation, which systematically executes portions of code within the IPE and uses the partial state revealed through the register file to exfiltrate secret data and to identify gadget instructions. The attack then uses gadget instructions to reveal all proprietary code within the IPE. Our evaluation with commodity devices and a production compiler and settings shows that -- even after following all manufacturer-recommended secure coding practices -- RIPencapsultaion reveals, within minutes, both the code and keys from third-party cryptographic implementations protected by the IPE.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
The effect of extended closure of red-light areas on COVID-19 transmission in India
Authors:
Abhishek Pandey,
Sudhakar V. Nuti,
Pratha Sah,
Chad R. Wells,
Alison P. Galvani,
Jeffrey P. Townsend
Abstract:
The novel coronavirus disease (COVID-19) pandemic has resulted in over 200,000 cases in India. Thus far, India has implemented lockdown measures to curb disease transmission. However, commercial sex work in red-light areas (RLAs) has potential to lead to COVID-19 resurgence after lockdown. We developed a model of COVID-19 transmission in RLAs, evaluating the impact of extended RLA closure compared…
▽ More
The novel coronavirus disease (COVID-19) pandemic has resulted in over 200,000 cases in India. Thus far, India has implemented lockdown measures to curb disease transmission. However, commercial sex work in red-light areas (RLAs) has potential to lead to COVID-19 resurgence after lockdown. We developed a model of COVID-19 transmission in RLAs, evaluating the impact of extended RLA closure compared with RLA reopening on cases, hospitalizations, and mortality rates within the RLAs of five major Indian cities, within the cities, and across India. Closure lowered transmission at all scales. More than 90% of cumulative cases and deaths among RLA residents of Kolkata, Pune, and Nagpur could be averted by the time the epidemic would peak under a re-opening scenario. Across India, extended closure of RLAs would benefit the population at large, delaying the peak of COVID-19 cases by 8 to 23 days, and avert 32% to 60.2% of cumulative cases and 43% to 67.6% of cumulative deaths at the peak of the epidemic. Extended closure of RLAs until better prevention and treatment strategies are developed would benefit public health in India.
△ Less
Submitted 12 June, 2020;
originally announced June 2020.
-
What do Asian Religions Have in Common? An Unsupervised Text Analytics Exploration
Authors:
Preeti Sah,
Ernest Fokoué
Abstract:
The main source of various religious teachings is their sacred texts which vary from religion to religion based on different factors like the geographical location or time of the birth of a particular religion. Despite these differences, there could be similarities between the sacred texts based on what lessons it teaches to its followers. This paper attempts to find the similarity using text mini…
▽ More
The main source of various religious teachings is their sacred texts which vary from religion to religion based on different factors like the geographical location or time of the birth of a particular religion. Despite these differences, there could be similarities between the sacred texts based on what lessons it teaches to its followers. This paper attempts to find the similarity using text mining techniques. The corpus consisting of Asian (Tao Te Ching, Buddhism, Yogasutra, Upanishad) and non-Asian (four Bible texts) is used to explore findings of similarity measures like Euclidean, Manhattan, Jaccard and Cosine on raw Document Term Frequency [DTM], normalized DTM which reveals similarity based on word usage. The performance of Supervised learning algorithms like K-Nearest Neighbor [KNN], Support Vector Machine [SVM] and Random Forest is measured based on its accuracy to predict correct scared text for any given chapter in the corpus. The K-means clustering visualizations on Euclidean distances of raw DTM reveals that there exists a pattern of similarity among these sacred texts with Upanishads and Tao Te Ching is the most similar text in the corpus.
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
Stabilizing spatially structured populations through Adaptive Limiter Control
Authors:
Pratha Sah,
Sutirth Dey
Abstract:
Stabilizing the dynamics of complex, non-linear systems is a major concern across several scientific disciplines including ecology and conservation biology. Unfortunately, most methods proposed to reduce the fluctuations in chaotic systems are not applicable for real, biological populations. This is because such methods typically require detailed knowledge of system specific parameters and the abi…
▽ More
Stabilizing the dynamics of complex, non-linear systems is a major concern across several scientific disciplines including ecology and conservation biology. Unfortunately, most methods proposed to reduce the fluctuations in chaotic systems are not applicable for real, biological populations. This is because such methods typically require detailed knowledge of system specific parameters and the ability to manipulate them in real time; conditions often not met by most real populations. Moreover, real populations are often noisy and extinction-prone, which can sometimes render such methods ineffective. Here we investigate a control strategy, which works by perturbing the population size, and is robust to reasonable amounts of noise and extinction probability. This strategy, called the Adaptive Limiter Control (ALC), has been previously shown to increase constancy and persistence of laboratory populations and metapopulations of Drosophila melanogaster. Here we present a detailed numerical investigation of the effects of ALC on the fluctuations and persistence of metapopulations. We show that at high migration rates, application of ALC does not require a priori information about the population growth rates. We also show that ALC can stabilize metapopulations even when applied to as low as one-tenth of the total number of subpopulations. Moreover, ALC is effective even when the subpopulations have high extinction rates: conditions under which one other control algorithm has previously failed to attain stability. Importantly, ALC not only reduces the fluctuation in metapopulation sizes, but also the global extinction probability. Finally, the method is robust to moderate levels of noise in the dynamics and the carrying capacity of the environment. These results, coupled with our earlier empirical findings, establish ALC to be a strong candidate for stabilizing real biological metapopulations.
△ Less
Submitted 7 July, 2013;
originally announced July 2013.
-
Stabilizing biological populations and metapopulations by Adaptive Limiter Control
Authors:
Pratha Sah,
Joseph Paul Salve,
Sutirth Dey
Abstract:
Despite great interest in techniques for stabilizing the dynamics of biological populations and metapopulations, very few practicable methods have been developed. We propose an easily implementable method, Adaptive Limiter Control (ALC), for reducing extinction frequencies and the magnitude of fluctuation in population sizes and demonstrate its efficacy in stabilizing laboratory populations and me…
▽ More
Despite great interest in techniques for stabilizing the dynamics of biological populations and metapopulations, very few practicable methods have been developed. We propose an easily implementable method, Adaptive Limiter Control (ALC), for reducing extinction frequencies and the magnitude of fluctuation in population sizes and demonstrate its efficacy in stabilizing laboratory populations and metapopulations of Drosophila melanogaster. Metapopulation stability was attained through a combination of reduced size fluctuations and synchrony at the subpopulation level. Simulations indicated that ALC was effective over a wide range of maximal population growth rates, migration rates and population dynamics models. Since simulations using widely applicable, nonspecies-specific models of population dynamics were able to capture most features of the experimental data, we expect our results to be applicable to a wide range of species.
△ Less
Submitted 24 December, 2012; v1 submitted 18 May, 2012;
originally announced May 2012.
-
Pinched Hysteresis Loops is the Fingerprint of Memristive Devices
Authors:
Hyongsuk Kim,
Maheshwar Pd. Sah,
Shyam Prasad Adhikari
Abstract:
This short note clarifies that the "pinched hysteresis loop" fingerprint of a memristor, or a memristive device, must hold for all amplitudes, for all frequencies, and for all initial conditions, of any periodic testing waveform, such as sinusoidal or triangular signals, which assumes both positive and negative values over each period of the waveform. We proved that the systems presented in [1] ar…
▽ More
This short note clarifies that the "pinched hysteresis loop" fingerprint of a memristor, or a memristive device, must hold for all amplitudes, for all frequencies, and for all initial conditions, of any periodic testing waveform, such as sinusoidal or triangular signals, which assumes both positive and negative values over each period of the waveform. We proved that the systems presented in [1] are not memristive devices because their hysteresis loops are not pinched at the origin for all amplitudes, and for all initial conditions.
△ Less
Submitted 29 February, 2012; v1 submitted 11 February, 2012;
originally announced February 2012.