Skip to main content

Showing 1–3 of 3 results for author: Althoff, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.17881  [pdf, other

    cs.CR cs.AR

    Pentimento: Data Remanence in Cloud FPGAs

    Authors: Colin Drewes, Olivia Weng, Andres Meza, Alric Althoff, David Kohlbrenner, Ryan Kastner, Dustin Richmond

    Abstract: Cloud FPGAs strike an alluring balance between computational efficiency, energy efficiency, and cost. It is the flexibility of the FPGA architecture that enables these benefits, but that very same flexibility that exposes new security vulnerabilities. We show that a remote attacker can recover "FPGA pentimenti" - long-removed secret data belonging to a prior user of a cloud FPGA. The sensitive dat… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 17 Pages, 8 Figures

  2. arXiv:2012.02791  [pdf, other

    cs.AR

    A Unified Model for Gate Level Propagation Analysis

    Authors: Jeremy Blackstone, Wei Hu, Alric Althoff, Armaiti Ardeshiricham, Lu Zhang, Ryan Kastner

    Abstract: Classic hardware verification techniques (e.g., X-propagation and fault-propagation) and more recent hardware security verification techniques based on information flow tracking (IFT) aim to understand how information passes, affects, and otherwise modifies a circuit. These techniques all have separate usage scenarios, but when dissected into their core functionality, they relate in a fundamental… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  3. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.