Skip to main content

Showing 1–6 of 6 results for author: Acharya, R Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06571  [pdf, other

    cs.CE

    SPERO: Simultaneous Power/EM Side-channel Dataset Using Real-time and Oscilloscope Setups

    Authors: Yunkai Bai, Rabin Yu Acharya, Domenic Forte

    Abstract: Cryptosystem implementations often disclose information regarding a secret key due to correlations with side channels such as power consumption, timing variations, and electromagnetic emissions. Since power and EM channels can leak distinct information, the combination of EM and power channels could increase side-channel attack efficiency. In this paper, we develop a miniature dual-channel side-ch… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  2. arXiv:2311.04194  [pdf, other

    cs.CR

    Quantization-aware Neural Architectural Search for Intrusion Detection

    Authors: Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte

    Abstract: Deploying machine learning-based intrusion detection systems (IDSs) on hardware devices is challenging due to their limited computational resources, power consumption, and network connectivity. Hence, there is a significant need for robust, deep learning models specifically designed with such constraints in mind. In this paper, we present a design methodology that automatically trains and evolves… ▽ More

    Submitted 1 March, 2024; v1 submitted 7 November, 2023; originally announced November 2023.

  3. arXiv:2204.09579  [pdf, other

    cs.LG cs.AI cs.CR

    A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

    Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte

    Abstract: Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analo… ▽ More

    Submitted 20 April, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  4. arXiv:2105.00117  [pdf, other

    cs.CR

    InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis

    Authors: Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte

    Abstract: Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to be protected against SCA. Despite the rise in the number of studies devoted to NN-based SCA, a range of questions has remained unanswered, namely: ho… ▽ More

    Submitted 14 October, 2022; v1 submitted 30 April, 2021; originally announced May 2021.

  5. arXiv:2005.04344  [pdf, other

    cs.CR

    Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions

    Authors: Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte

    Abstract: Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers. Traditionally, this trend has been primarily seen as a serious risk for cryptography; however, a positive aspect of quantum technology should also be stressed. In this regard, viewing this technology as a resource for honest parties rather than adversaries, it… ▽ More

    Submitted 8 February, 2021; v1 submitted 8 May, 2020; originally announced May 2020.

  6. arXiv:2003.13904  [pdf, other

    cs.CR cs.NE

    Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

    Authors: Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte

    Abstract: Hardware intellectual property (IP) theft is a major issue in today's globalized supply chain. To address it, numerous logic locking and obfuscation techniques have been proposed. While locking initially focused on digital integrated circuits (ICs), there have been recent attempts to extend it to analog ICs, which are easier to reverse engineer and to copy than digital ICs. In this paper, we use a… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.