Skip to main content

Showing 1–50 of 64 results for author: Shinde, S

.
  1. arXiv:2405.11821  [pdf

    cs.LG cs.AI

    A Three-Phase Analysis of Synergistic Effects During Co-pyrolysis of Algae and Wood for Biochar Yield Using Machine Learning

    Authors: Subhadeep Chakrabarti, Saish Shinde

    Abstract: Pyrolysis techniques have served to be a groundbreaking technique for effectively utilising natural and man-made biomass products like plastics, wood, crop residue, fruit peels etc. Recent advancements have shown a greater yield of essential products like biochar, bio-oil and other non-condensable gases by blending different biomasses in a certain ratio. This synergy effect of combining two pyroly… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 6 pages

  2. arXiv:2405.00138  [pdf, other

    cs.CR

    Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups

    Authors: Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde

    Abstract: The emergence of decentralized finance has transformed asset trading on the blockchain, making traditional financial instruments more accessible while also introducing a series of exploitative economic practices known as Maximal Extractable Value (MEV). Concurrently, decentralized finance has embraced rollup-based Layer-2 solutions to facilitate asset trading at reduced transaction costs compared… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  3. arXiv:2404.13998  [pdf, other

    cs.CR

    SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals

    Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde

    Abstract: User programs recover from hardware exceptions and respond to signals by executing custom handlers that they register specifically for such events. We present SIGY attack, which abuses this programming model on Intel SGX to break the confidentiality and integrity guarantees of enclaves. SIGY uses the untrusted OS to deliver fake hardware events and injects fake signals in an enclave at any point.… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  4. arXiv:2404.03526  [pdf, other

    cs.CR

    WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP

    Authors: Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde

    Abstract: AMD SEV-SNP offers VM-level trusted execution environments (TEEs) to protect the confidentiality and integrity for sensitive cloud workloads from untrusted hypervisor controlled by the cloud provider. AMD introduced a new exception, #VC, to facilitate the communication between the VM and the untrusted hypervisor. We present WeSee attack, where the hypervisor injects malicious #VC into a victim VM'… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Extended version of the IEEE S&P 2024 paper

  5. arXiv:2404.03387  [pdf, other

    cs.CR

    Heckler: Breaking Confidential VMs with Malicious Interrupts

    Authors: Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde

    Abstract: Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now available on popular cloud platforms. The untrusted hypervisor in these settings is in control of several resource management and configuration tasks, in… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Extended version of the Usenix Security 2024 paper

  6. arXiv:2401.10816  [pdf, other

    cs.HC cs.AI cs.LG

    Co-Pilot for Health: Personalized Algorithmic AI Nudging to Improve Health Outcomes

    Authors: Jodi Chiam, Aloysius Lim, Cheryl Nott, Nicholas Mark, Ankur Teredesai, Sunil Shinde

    Abstract: The ability to shape health behaviors of large populations automatically, across wearable types and disease conditions at scale has tremendous potential to improve global health outcomes. We designed and implemented an AI driven platform for digital algorithmic nudging, enabled by a Graph-Neural Network (GNN) based Recommendation System, and granular health behavior data from wearable fitness devi… ▽ More

    Submitted 8 February, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

    Comments: 20 pages, 2 figures

  7. arXiv:2401.01908  [pdf, ps, other

    physics.ins-det cond-mat.mes-hall cond-mat.mtrl-sci

    Graphene phase modulators operating in the transparency regime

    Authors: H. F. Y. Watson, A. Ruocco, M. Tiberi, J. E. Muench, O. Balci, S. M. Shinde, S. Mignuzzi, M. Pantouvaki, D. Van Thourhout, R. Sordan, A. Tomadin, M. Romagnoli, A. C. Ferrari

    Abstract: Next-generation data networks need to support Tb/s rates. In-phase and quadrature (IQ) modulation combine phase and intensity information to increase the density of encoded data, reduce overall power consumption by minimising the number of channels, and increase noise tolerance. To reduce errors when decoding the received signal, intersymbol interference must be minimised. This is achieved with pu… ▽ More

    Submitted 25 December, 2023; originally announced January 2024.

  8. arXiv:2312.17643  [pdf, other

    cs.RO

    b-it-bots RoboCup@Work Team Description Paper 2023

    Authors: Kevin Patel, Vamsi Kalagaturu, Vivek Mannava, Ravisankar Selvaraju, Shubham Shinde, Dharmin Bakaraniya, Deebul Nair, Mohammad Wasil, Santosh Thoduka, Iman Awaad, Sven Schneider, Nico Hochgeschwender, Paul G. Plöger

    Abstract: This paper presents the b-it-bots RoboCup@Work team and its current hardware and functional architecture for the KUKA youBot robot. We describe the underlying software framework and the developed capabilities required for operating in industrial environments including features such as reliable and precise navigation, flexible manipulation, robust object recognition and task planning. New developme… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  9. arXiv:2311.16036  [pdf, other

    quant-ph physics.optics

    A Tunable Transition Metal Dichalcogenide Entangled Photon-Pair Source

    Authors: Maximilian A. Weissflog, Anna Fedotova, Yilin Tang, Elkin A. Santos, Benjamin Laudert, Saniya Shinde, Fatemeh Abtahi, Mina Afsharnia, Inmaculada Pérez Pérez, Sebastian Ritter, Hao Qin, Jiri Janousek, Sai Shradha, Isabelle Staude, Sina Saravi, Thomas Pertsch, Frank Setzpfandt, Yuerui Lu, Falk Eilenberger

    Abstract: Entangled photon-pair sources are at the core of quantum applications like quantum key distribution, sensing, and imaging. Operation in space-limited and adverse environments such as in satellite-based and mobile communication requires robust entanglement sources with minimal size and weight requirements. Here, we meet this challenge by realizing a cubic micrometer scale entangled photon-pair sour… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  10. arXiv:2310.05899  [pdf, other

    cs.NI cs.AI cs.DC

    Enabling Intelligent Vehicular Networks Through Distributed Learning in the Non-Terrestrial Networks 6G Vision

    Authors: David Naseh, Swapnil Sadashiv Shinde, Daniele Tarchi

    Abstract: The forthcoming 6G-enabled Intelligent Transportation System (ITS) is set to redefine conventional transportation networks with advanced intelligent services and applications. These technologies, including edge computing, Machine Learning (ML), and network softwarization, pose stringent requirements for latency, energy efficiency, and user data security. Distributed Learning (DL), such as Federate… ▽ More

    Submitted 7 September, 2023; originally announced October 2023.

    Comments: 6 pages, 5 figures

    Journal ref: European Wireless 2023; 28th European Wireless Conference, Rome, Italy, 2023, pp. 136-141

  11. arXiv:2306.08170  [pdf, other

    cs.CR

    Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3

    Authors: Christof Ferreira Torres, Fiona Willi, Shweta Shinde

    Abstract: With the recent hype around the Metaverse and NFTs, Web3 is getting more and more popular. The goal of Web3 is to decentralize the web via decentralized applications. Wallets play a crucial role as they act as an interface between these applications and the user. Wallets such as MetaMask are being used by millions of users nowadays. Unfortunately, Web3 is often advertised as more secure and privat… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  12. arXiv:2305.15986  [pdf, other

    cs.CR

    ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

    Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde

    Abstract: Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as GPUs and FPGAs. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design, an upcoming TEE feature in Armv9-A, to address this gap. We observe that CCA offers the right abstraction a… ▽ More

    Submitted 25 October, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: Extended version of the Usenix Security 2024 paper

  13. arXiv:2305.01791  [pdf, ps, other

    cond-mat.mtrl-sci cond-mat.mes-hall

    Monolayer WS$_2$ electro- and photo-luminescence enhancement by TFSI treatment

    Authors: A. R. Cadore, B. L. T. Rosa, I. Paradisanos, S. Mignuzzi, D. De Fazio, E. M. Alexeev, J. E. Muench, G. Kakavelakis, S. M. Shinde, D. Yoon, S. Tongay, K. Watanabe, T. Taniguchi, E. Lidorikis, I. Goykhman, G. Soavi, A. C. Ferrari

    Abstract: Layered material heterostructures (LMHs) can be used to fabricate electroluminescent devices operating in the visible spectral region. A major advantage of LMH-light emitting diodes (LEDs) is that electroluminescence (EL) emission can be tuned across that of different exciton complexes (e.g. biexcitons, trions, quintons) by controlling the charge density. However, these devices have an EL quantum… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  14. arXiv:2301.09123  [pdf

    cs.CV cs.AI

    Face Generation from Textual Features using Conditionally Trained Inputs to Generative Adversarial Networks

    Authors: Sandeep Shinde, Tejas Pradhan, Aniket Ghorpade, Mihir Tale

    Abstract: Generative Networks have proved to be extremely effective in image restoration and reconstruction in the past few years. Generating faces from textual descriptions is one such application where the power of generative algorithms can be used. The task of generating faces can be useful for a number of applications such as finding missing persons, identifying criminals, etc. This paper discusses a no… ▽ More

    Submitted 22 January, 2023; originally announced January 2023.

  15. arXiv:2301.03898  [pdf

    physics.flu-dyn cond-mat.mtrl-sci cond-mat.soft

    Synergetic Effect of Wall-Slip and Compressibility During Startup Flow of Complex Fluids

    Authors: Aniruddha Sanyal, Sachin Balasaheb Shinde, Lalit Kumar

    Abstract: The present letter explains the synergetic effect of wall-slip, compressibility, and thixotropy in a pressurized flow startup operation of various structured fluids. Opposite to the intuition, experimental and numerical simulations suggest that the wall-slip (adhesive failure) is facilitating gel degradation (cohesive failure), revealing a new flow-startup mechanism. The thixotropic rheological mo… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

    Comments: submitted elsewhere also for publication, it contains 33 pages

  16. arXiv:2211.05206  [pdf, other

    cs.CR

    It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones

    Authors: Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun

    Abstract: Modern smartphones are complex systems in which control over phone resources is exercised by phone manufacturers, OS vendors, and users. These stakeholders have diverse and often competing interests. Barring some exceptions, users entrust their security and privacy to OS vendors (Android and iOS) and need to accept their constraints. Manufacturers protect their firmware and peripherals from the OS… ▽ More

    Submitted 28 June, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  17. arXiv:2211.00306  [pdf, other

    cs.CR cs.DC

    Empowering Data Centers for Next Generation Trusted Computing

    Authors: Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri

    Abstract: Modern data centers have grown beyond CPU nodes to provide domain-specific accelerators such as GPUs and FPGAs to their customers. From a security standpoint, cloud customers want to protect their data. They are willing to pay additional costs for trusted execution environments such as enclaves provided by Intel SGX and AMD SEV. Unfortunately, the customers have to make a critical choice -- either… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 23 pages, 12 figures

  18. arXiv:2206.13800  [pdf

    cond-mat.mes-hall physics.optics

    Terahertz photodetection in scalable single-layer-graphene and hexagonal boron nitride heterostructures

    Authors: M. Asgari, L. Viti, O. Balci, S. M. Shinde, J. Zhang, H. Ramezani, S. Sharma, A. Meersha, G. Menichetti, C. McAleese, B. Conran, X. Wang, A. Tomadin, A. C. Ferrari, M. S. Vitiello

    Abstract: The unique optoelectronic properties of single layer graphene (SLG) are ideal for the development of photonic devices across a broad range of frequencies, from X-rays to microwaves. In the terahertz (THz) range (0.1-10 THz frequency) this has led to the development of optical modulators, non-linear sources, and photodetectors, with state-of-the-art performances. A key challenge is the integration… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 15 pages, 4 Figures. The following article has been accepted by Applied Physics Letters. After it is published, it will be found at the link https://doi.org/10.1063/5.0097726

  19. arXiv:2205.12742  [pdf, other

    cs.CR cs.AR

    SoK: Hardware-supported Trusted Execution Environments

    Authors: Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez

    Abstract: The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast. More generally, existing TEEs have not been subject to a holistic… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  20. SmashEx: Smashing SGX Enclaves Using Exceptions

    Authors: **hua Cui, Jason Zhi**gcheng Yu, Shweta Shinde, Prateek Saxena, Zhi** Cai

    Abstract: Exceptions are a commodity hardware functionality which is central to multi-tasking OSes as well as event-driven user applications. Normally, the OS assists the user application by lifting the semantics of exceptions received from hardware to program-friendly user signals and exception handling interfaces. However, can exception handlers work securely in user enclaves, such as those enabled by Int… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

    Comments: Accepted to ACM CCS 2021

  21. arXiv:2104.11349  [pdf

    cs.DC cs.LG

    Scalable Predictive Time-Series Analysis of COVID-19: Cases and Fatalities

    Authors: Shradha Shinde, Jay Joshi, Sowmya Mareedu, Yeon Pyo Kim, Jongwook Woo

    Abstract: COVID 19 is an acute disease that started spreading throughout the world, beginning in December 2019. It has spread worldwide and has affected more than 7 million people, and 200 thousand people have died due to this infection as of Oct 2020. In this paper, we have forecasted the number of deaths and the confirmed cases in Los Angeles and New York of the United States using the traditional and Big… ▽ More

    Submitted 22 April, 2021; originally announced April 2021.

    Comments: 8 pages, 7 figures, 4 tables

  22. arXiv:2103.15289  [pdf

    cs.CR

    Dynamic Binary Translation for SGX Enclaves

    Authors: **hua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, **hai Yuan

    Abstract: Enclaves, such as those enabled by Intel SGX, offer a hardware primitive for shielding user-level applications from the OS. While enclaves are a useful starting point, code running in the enclave requires additional checks whenever control or data is transferred to/from the untrusted OS. The enclave-OS interface on SGX, however, can be extremely large if we wish to run existing unmodified binaries… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

    Comments: 24 pages, 11 figures, 10 tables. arXiv admin note: substantial text overlap with arXiv:2009.01144

  23. arXiv:2102.02743  [pdf, other

    cs.CR

    Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

    Authors: Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun

    Abstract: The majority of smartphones either run iOS or Android operating systems. This has created two distinct ecosystems largely controlled by Apple and Google - they dictate which applications can run, how they run, and what kind of phone resources they can access. Barring some exceptions in Android where different phone manufacturers may have influence, users, developers, and governments are left with… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  24. arXiv:2012.03777  [pdf

    physics.app-ph cond-mat.mtrl-sci physics.optics

    Tunable, grating-gated, graphene-on-polyimide terahertz modulators

    Authors: Alessandra Di Gaspare, Eva A. A. Pogna, Luca Salemi, Osman Balci, Alisson R. Cadore, Sachin M. Shinde, Lianhe Li, Cinzia di Franco, A. Giles Davies, Edmund Linfield, Andrea C. Ferrari, Gaetano Scamarcio, Miriam S. Vitiello

    Abstract: We present an electrically switchable graphene terahertz (THz) modulator with a tunable-by-design optical bandwidth and we exploit it to compensate the cavity dispersion of a quantum cascade laser (QCL). Electrostatic gating is achieved by a metal-grating used as a gate electrode, with an HfO2/AlOx gate dielectric on top. This is patterned on a polyimide layer, which acts as a quarter wave resonan… ▽ More

    Submitted 22 November, 2020; originally announced December 2020.

    Comments: 22 pages, 6 figures

  25. arXiv:2010.08440  [pdf, other

    cs.CR cs.AR

    Elasticlave: An Efficient Memory Model for Enclaves

    Authors: Zhi**gcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena

    Abstract: Trusted-execution environments (TEE), like Intel SGX, isolate user-space applications into secure enclaves without trusting the OS. Thus, TEEs reduce the trusted computing base, but add one to two orders of magnitude slow-down. The performance cost stems from a strict memory model, which we call the spatial isolation model, where enclaves cannot share memory regions with each other. In this work,… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  26. arXiv:2009.01144  [pdf, other

    cs.CR

    Binary Compatibility For SGX Enclaves

    Authors: Shweta Shinde, **hua Cui, Satyaki Sen, **hai Yuan, Prateek Saxena

    Abstract: Enclaves, such as those enabled by Intel SGX, offer a powerful hardware isolation primitive for application partitioning. To become universally usable on future commodity OSes, enclave designs should offer compatibility with existing software. In this paper, we draw attention to 5 design decisions in SGX that create incompatibility with existing software. These represent concrete starting points,… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

  27. arXiv:2002.06201  [pdf, other

    physics.flu-dyn

    Turbulent Jet: A DNS Study

    Authors: Sachin Y. Shinde, Prasanth Prabhakaran, Roddam Narasimha

    Abstract: The entrainment of ambient fluid into a turbulent shear flow has been a topic of wide interest for several decades. To estimate the entrainment of ambient fluid into turbulent jet, it is essential to define the boundary of the jet. The question arises as to what should be the appropriate criterion to determine the edge of the turbulent jet. From the present DNS simulations, we observe that there i… ▽ More

    Submitted 14 February, 2020; originally announced February 2020.

    Comments: arXiv admin note: text overlap with arXiv:1907.05421

  28. arXiv:1909.12919  [pdf

    cs.CV

    HR-CAM: Precise Localization of Pathology Using Multi-level Learning in CNNs

    Authors: Sumeet Shinde, Tanay Chougule, Jitender Saini, Madhura Ingalhalikar

    Abstract: We propose a CNN based technique that aggregates feature maps from its multiple layers that can localize abnormalities with greater details as well as predict pathology under consideration. Existing class activation map** (CAM) techniques extract feature maps from either the final layer or a single intermediate layer to create the discriminative maps and then interpolate to upsample to the origi… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: Medical Image Computing and Computer Assisted Intervention, 2019

  29. arXiv:1907.10119  [pdf, other

    cs.CR cs.OS

    Keystone: An Open Framework for Architecting TEEs

    Authors: Dayeol Lee, David Kohlbrenner, Shweta Shinde, Dawn Song, Krste Asanović

    Abstract: Trusted execution environments (TEEs) are being used in all the devices from embedded sensors to cloud servers and encompass a range of cost, power constraints, and security threat model choices. On the other hand, each of the current vendor-specific TEEs makes a fixed set of trade-offs with little room for customization. We present Keystone -- the first open-source framework for building customiz… ▽ More

    Submitted 7 September, 2019; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: 18 pages

  30. arXiv:1907.05458  [pdf, ps, other

    stat.AP cs.DB

    Scalable Panel Fusion Using Distributed Min Cost Flow

    Authors: Swapnil Shinde, Jukka Ranta, Paul Deitrick, Matthew Malloy

    Abstract: Modern audience measurement requires combining observations from disparate panel datasets. Connecting and relating such panel datasets is a process termed panel fusion. This paper formalizes the panel fusion problem and presents a novel approach to solve it. We cast the panel fusion as a network flow problem, allowing the application of a rich body of research. In the context of digital audience m… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  31. arXiv:1907.05421  [pdf, ps, other

    physics.flu-dyn

    A DNS Study of entrainment in an axisymmetric turbulent jet as an episodic process

    Authors: Prasanth Prabhakaran, Sachin Shinde, Roddam Narasimha

    Abstract: This investigation is based on a DNS of a steady self-preserving incompressible axisymmetric turbulent jet at a Reynolds number of 2400. The DNS data enable accurate maps of the outer irrotational flow field, and also the vorticity field in the turbulent core of the jet. It is found necessary to define two separate boundaries of the jet. The first is an inner boundary (turbulent/nonturbulent, T/NT… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

    Comments: 25 pages, 18 figures

  32. arXiv:1906.10395  [pdf, other

    cs.CR cs.AI cs.LG cs.LO

    Quantitative Verification of Neural Networks And its Security Applications

    Authors: Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena

    Abstract: Neural networks are increasingly employed in safety-critical domains. This has prompted interest in verifying or certifying logically encoded properties of neural networks. Prior work has largely focused on checking existential properties, wherein the goal is to check whether there exists any input that violates a given property of interest. However, neural network training is a stochastic process… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

  33. arXiv:1901.00955  [pdf, other

    cs.CR

    Practical Verifiable In-network Filtering for DDoS defense

    Authors: Deli Gong, Muoi Tran, Shweta Shinde, Hao **, Vyas Sekar, Prateek Saxena, Min Suk Kang

    Abstract: In light of ever-increasing scale and sophistication of modern DDoS attacks, it is time to revisit in-network filtering or the idea of empowering DDoS victims to install in-network traffic filters in the upstream transit networks. Recent proposals show that filtering DDoS traffic at a handful of large transit networks can handle volumetric DDoS attacks effectively. However, the innetwork filtering… ▽ More

    Submitted 14 January, 2019; v1 submitted 3 January, 2019; originally announced January 2019.

  34. arXiv:1810.00602  [pdf, other

    cs.CR cs.AI cs.CV

    Privado: Practical and Secure DNN Inference with Enclaves

    Authors: Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, Ramachandran Ramjee

    Abstract: Cloud providers are extending support for trusted hardware primitives such as Intel SGX. Simultaneously, the field of deep learning is seeing enormous innovation as well as an increase in adoption. In this paper, we ask a timely question: "Can third-party cloud services use Intel SGX enclaves to provide practical, yet secure DNN Inference-as-a-service?" We first demonstrate that DNN models executi… ▽ More

    Submitted 5 September, 2019; v1 submitted 1 October, 2018; originally announced October 2018.

    Comments: 13 pages, 5 figures

  35. arXiv:1807.00575  [pdf, other

    cs.PL

    Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution

    Authors: Shiqi Shen, Soundarya Ramesh, Shweta Shinde, Abhik Roychoudhury, Prateek Saxena

    Abstract: Symbolic execution is a powerful technique for program analysis. However, it has many limitations in practical applicability: the path explosion problem encumbers scalability, the need for language-specific implementation, the inability to handle complex dependencies, and the limited expressiveness of theories supported by underlying satisfiability checkers. Often, relationships between variables… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

  36. arXiv:1807.00477  [pdf, other

    cs.CR

    BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof

    Authors: Shweta Shinde, Shengyi Wang, **hai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena

    Abstract: New trusted computing primitives such as Intel SGX have shown the feasibility of running user-level applications in enclaves on a commodity trusted processor without trusting a large OS. However, the OS can still compromise the integrity of an enclave by tampering with the system call return values. In fact, it has been shown that a subclass of these attacks, called Iago attacks, enables arbitrary… ▽ More

    Submitted 19 September, 2019; v1 submitted 2 July, 2018; originally announced July 2018.

    Comments: Camera-ready version of the paper to appear at USENIX Security Symposium 2020

  37. arXiv:1806.10399  [pdf

    cond-mat.mtrl-sci

    First principles study on small ZrAln and HfAln clusters: structural, stability, electronic states and CO2 adsorption

    Authors: Hardik L. Kagdada, Shweta D. Dabhi, Venu Mankad, Satyam M. Shinde, Prafulla K. Jha

    Abstract: We report a first principles study based on density functional theory on the structural and electronic properties of transition metal Zr and Hf doped small aluminum clusters with 1 to 7 aluminum atoms. We have used B3PW91 with LANL2DZ basis set in Gaussian 09 package. The stability analysis reveals that the ZrAl4 and HfAl4 structures with C2v symmetry and square pyramid geometry are lowest energy… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

    Comments: 22 pages, 6 figures, 3 tables

  38. Recent advances in content based video copy detection

    Authors: Sanket Shinde, Girija Chiddarwar

    Abstract: With the immense number of videos being uploaded to the video sharing sites, issue of copyright infringement arises with uploading of illicit copies or transformed versions of original video. Thus safeguarding copyright of digital media has become matter of concern. To address this concern, it is obliged to have a video copy detection system which is sufficiently robust to detect these transformed… ▽ More

    Submitted 28 October, 2016; originally announced October 2016.

  39. Deep Residual Networks with Exponential Linear Unit

    Authors: Anish Shah, Eashan Kadam, Hena Shah, Sameer Shinde, Sandip Shingade

    Abstract: Very deep convolutional neural networks introduced new problems like vanishing gradient and degradation. The recent successful contributions towards solving these problems are Residual and Highway Networks. These networks introduce skip connections that allow the information (from the input or those learned in earlier layers) to flow more into the deeper layers. These very deep models have lead to… ▽ More

    Submitted 5 October, 2016; v1 submitted 14 April, 2016; originally announced April 2016.

    Comments: submitted in Vision Net 2016, Jaipur, India

  40. arXiv:1602.08262  [pdf

    cond-mat.mtrl-sci

    Investigating the Temperature Effects on Resistive Random Access Memory (RRAM) Devices

    Authors: T. D. Dongale, K. V. Khot, S. V. Mohite, S. S. Khandagale, S. S. Shinde, A. V. Moholkar, K. Y. Rajpure, P. N. Bhosale, P. S. Patil, P. K. Gaikwad, R. K. Kamat

    Abstract: In this paper, we report the effect of filament radius and filament resistivity on the saturated temperature of ZnO, TiO2, WO3 and HfO2 Resistive Random Access Memory (RRAM) devices. We resort to the thermal reaction model of RRAM for the present analysis. The results substantiate decrease in saturated temperature with increase in the radius and resistivity of filament for the investigated RRAM de… ▽ More

    Submitted 26 February, 2016; originally announced February 2016.

    Comments: 10 Pages, 3 figures and 3 tables

  41. arXiv:1602.01947  [pdf

    cs.ET

    Investigating Reliability Aspects of Memristor based RRAM with Reference to Write Voltage and Frequency

    Authors: T. D. Dongale, K. V. Khot, S. V. Mohite, N. K. Desai, S. S. Shinde, A. V. Moholkar, K. Y. Rajpure, P. N. Bhosale, P. S. Patil, P. K. Gaikwad, R. K. Kamat

    Abstract: In this paper, we report the effect of write voltage and frequency on memristor based Resistive Random Access Memory (RRAM). The above said parameters have been investigated on the linear drift model of memristor. With a variation of write voltage from 0.2V to 1.2V and a subsequent frequency modulation from 1, 2, 4, 10, 100 and 200 Hz the corresponding effects on memory window, Low Resistance Stat… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: Pages-11, figures-6

    MSC Class: 00A72; 68M1 ACM Class: B.3.4

  42. arXiv:1506.04832  [pdf, other

    cs.CR

    Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks

    Authors: Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena

    Abstract: New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel. In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptograph… ▽ More

    Submitted 12 January, 2016; v1 submitted 16 June, 2015; originally announced June 2015.

  43. arXiv:1401.0092  [pdf

    cs.CV

    A Novel Approach For Generating Face Template Using Bda

    Authors: Shraddha S. Shinde, Prof. Anagha P. Khedkar

    Abstract: In identity management system, commonly used biometric recognition system needs attention towards issue of biometric template protection as far as more reliable solution is concerned. In view of this biometric template protection algorithm should satisfy security, discriminability and cancelability. As no single template protection method is capable of satisfying the basic requirements, a novel te… ▽ More

    Submitted 30 December, 2013; originally announced January 2014.

    Comments: 11 pages, ITCSE 2013 conference

  44. arXiv:1312.7511  [pdf

    cs.CV cs.CR

    A Novel Scheme for Generating Secure Face Templates Using BDA

    Authors: Shraddha S. Shinde, Prof. Anagha P. Khedkar

    Abstract: In identity management system, frequently used biometric recognition system needs awareness towards issue of protecting biometric template as far as more reliable solution is apprehensive. In sight of this biometric template protection algorithm should gratify the basic requirements viz. security, discriminability and cancelability. As no single template protection method is capable of satisfying… ▽ More

    Submitted 29 December, 2013; originally announced December 2013.

    Comments: 07 pages,IJASCSE

  45. arXiv:1010.3577  [pdf, other

    physics.flu-dyn

    A Pitching Foil with a Flexible flap Creates an Orderly Jet

    Authors: Sachin Y. Shinde, Jaywant H. Arakeri

    Abstract: We experimentally studied the effect of flexibility on the flow produced by sinusoidally pitching foil in quiescent fluid. The rigid foil produces a weak, divergent and meandering jet. On the contrary, the foil with a flexible flap produces an orderly, narrow, coherent jet. It has been observed that such orderly jet is produced when the flap has appropriate flexibility. The jet produced in quiesce… ▽ More

    Submitted 18 October, 2010; originally announced October 2010.

    Comments: Two videos are uploaded: 1) "FLEXIBLE_FOIL_JET" in MPEG1 format 2) "FLEXIBLE_FOIL_JET_long" in MPEG4 format for APS-DFD conference - Gallery of fluid motion

  46. arXiv:1004.4758  [pdf, ps, other

    cs.IT

    A Design of Paraunitary Polyphase Matrices of Rational Filter Banks Based on (P,Q) Shift-Invariant Systems

    Authors: Sudarshan Shinde

    Abstract: In this paper we present a method to design paraunitary polyphase matrices of critically sampled rational filter banks. The method is based on (P,Q) shift-invariant systems, and so any kind of rational splitting of the frequency spectrum can be achieved using this method. Ideal (P,Q) shift-invariant system with smallest P and Q that map of a band of input spectrum to the output spectrum are obtain… ▽ More

    Submitted 27 April, 2010; originally announced April 2010.

  47. arXiv:1001.3823  [pdf, ps, other

    astro-ph.SR

    Linear magnetosonic waves in solar wind flow tubes

    Authors: Suresh Chandra, S. V. Shinde, P. G. Musrif, Monika Sharma

    Abstract: Nakariakov et al. (1996) investigated the linear magnetosonic waves trapped within solar wind flow tubes, where they accounted for a slab having boundaries at $x = \pm d$ and extended up to infinity in the $y$ and $z$ directions. Srivastava and Dwivedi (2006) claimed to extend that work by considering a two-dimensional slab. We find that the work of Srivastava and Dwivedi (2006) is not for a two… ▽ More

    Submitted 21 January, 2010; originally announced January 2010.

    Comments: 4 pages

  48. Two channel paraunitary filter banks based on linear canonical transform

    Authors: Sudarshan Shinde

    Abstract: In this paper a two channel paraunitary filter bank is proposed, which is based on linear canonical transform, instead of discrete Fourier transform. Input-output relation for such a filter bank are derived in terms of polyphase matrices and modulation matrices. It is shown that like conventional filter banks, the LCT based paraunitary filter banks need only one filter to be designed and rest of… ▽ More

    Submitted 9 September, 2009; originally announced September 2009.

    Comments: 10 pages, IEEE format

  49. Large Second Harmonic Kerr rotation in GaFeO3 thin films on YSZ buffered Silicon

    Authors: Darshan C. Kundaliya, S. B. Ogale, S. Dhar, K. F. McDonald, E. Knoesel, T. Osedach, S. E. Lofland, S. R. Shinde, T. Venkatesan

    Abstract: Epitaxial thin films of gallium iron oxide (GaFeO3) are grown on (001) silicon by pulsed laser deposition (PLD) using yttrium-stabilized zirconia (YSZ) buffer layer. The crystalline template buffer layer is in-situ PLD grown through the step of high temperature strip** of the intrinsic silicon surface oxide. The X-ray diffraction pattern shows c-axis orientation of YSZ and b-axis orientation o… ▽ More

    Submitted 5 August, 2005; originally announced August 2005.

    Comments: 16 pages, 4 figures, To be published in J. Magn. Magn. Mat

  50. arXiv:cond-mat/0505265  [pdf

    cond-mat.mtrl-sci

    Percolative Ferromagnetism in Anatase Co:TiO2

    Authors: S. R. Shinde, S. B. Ogale, Abhijit S. Ogale, S. J. Welz, A. Lussier, Darshan C. Kundaliya, H. Zheng, S. Dhar, M. S. R. Rao, R. Ramesh, Y. U. Idzerda, N. D. Browning, T. Venkatesan

    Abstract: We revisit the most widely investigated and controversial oxide diluted magnetic semiconductor (DMS), Co:TiO2, with a new high temperature film growth, and show that the corresponding material is not only an intrinsic DMS ferromagnet, but also supports a percolative mechanism of ferromagnetism. We establish the uniformity of dopant distribution across the film cross section by Z-contrast imaging… ▽ More

    Submitted 10 May, 2005; originally announced May 2005.

    Comments: 21 pages, 5 figures