Skip to main content

Showing 1–14 of 14 results for author: Badawy, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15184  [pdf, other

    cs.CR cs.AR cs.LG

    TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: The Hardware Trojan (HT) problem can be thought of as a continuous game between attackers and defenders, each striving to outsmart the other by leveraging any available means for an advantage. Machine Learning (ML) has recently been key in advancing HT research. Various novel techniques, such as Reinforcement Learning (RL) and Graph Neural Networks (GNNs), have shown HT insertion and detection cap… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    ACM Class: B.8.1

  2. arXiv:2405.08100  [pdf, other

    quant-ph cs.LG

    Graph Neural Networks for Parameterized Quantum Circuits Expressibility Estimation

    Authors: Shamminuj Aktar, Andreas Bärtschi, Diane Oyen, Stephan Eidenbenz, Abdel-Hameed A. Badawy

    Abstract: Parameterized quantum circuits (PQCs) are fundamental to quantum machine learning (QML), quantum optimization, and variational quantum algorithms (VQAs). The expressibility of PQCs is a measure that determines their capability to harness the full potential of the quantum state space. It is thus a crucial guidepost to know when selecting a particular PQC ansatz. However, the existing technique for… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  3. arXiv:2402.17918  [pdf, other

    cs.CR cs.AR cs.LG

    The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson

    Abstract: This work focuses on advancing security research in the hardware design space by formally defining the realistic problem of Hardware Trojan (HT) detection. The goal is to model HT detection more closely to the real world, i.e., describing the problem as "The Seeker's Dilemma" (an extension of Hide&Seek on a graph), where a detecting agent is unaware of whether circuits are infected by HTs or not.… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    ACM Class: B.8.1

  4. arXiv:2311.12883  [pdf, other

    cs.SE cs.PF cs.PL

    LLVM Static Analysis for Program Characterization and Memory Reuse Profile Estimation

    Authors: Atanu Barai, Nandakishore Santhi, Abdur Razzak, Stephan Eidenbenz, Abdel-Hameed A. Badawy

    Abstract: Profiling various application characteristics, including the number of different arithmetic operations performed, memory footprint, etc., dynamically is time- and space-consuming. On the other hand, static analysis methods, although fast, can be less accurate. This paper presents an LLVM-based probabilistic static analysis method that accurately predicts different program characteristics and estim… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: This paper was accepted at the MEMSYS '23 conference, The International Symposium on Memory Systems, October 02, 2023 - October 05, 2023, Alexandria, VA

  5. Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: Current Hardware Trojan (HT) detection techniques are mostly developed based on a limited set of HT benchmarks. Existing HT benchmark circuits are generated with multiple shortcomings, i.e., i) they are heavily biased by the designers' mindset when created, and ii) they are created through a one-dimensional lens, mainly the signal activity of nets. We introduce the first automated Reinforcement Le… ▽ More

    Submitted 20 March, 2024; v1 submitted 16 May, 2023; originally announced May 2023.

    Comments: This paper appears in the Journal of Supercomputing: https://doi.org/10.1007/s11227-024-05963-8

    ACM Class: B.8.1

  6. arXiv:2304.13232  [pdf, other

    cs.AR cs.CR cs.LG

    Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

    Authors: Amin Sarihi, Peter Jamieson, Ahmad Patooghy, Abdel-Hameed A. Badawy

    Abstract: Hardware Trojans (HTs) are undesired design or manufacturing modifications that can severely alter the security and functionality of digital integrated circuits. HTs can be inserted according to various design criteria, e.g., nets switching activity, observability, controllability, etc. However, to our knowledge, most HT detection methods are only based on a single criterion, i.e., nets switching… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    ACM Class: B.8.1

  7. Scalable Experimental Bounds for Dicke and GHZ States Fidelities

    Authors: Shamminuj Aktar, Andreas Bärtschi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: Estimating the state preparation fidelity of highly entangled states on noisy intermediate-scale quantum (NISQ) devices is an important task for benchmarking and application considerations. Unfortunately, exact fidelity measurements quickly become prohibitively expensive, as they scale exponentially as $O(3^N)$ for $N$-qubit states, using full state tomography with measurements in all Pauli bases… ▽ More

    Submitted 31 August, 2023; v1 submitted 6 October, 2022; originally announced October 2022.

    Report number: LA-UR-22-30105

    Journal ref: Proceedings of the 20th ACM International Conference on Computing Frontiers, pp. 176-184. 2023

  8. arXiv:2204.04350  [pdf, other

    cs.LG cs.AR cs.CR

    Hardware Trojan Insertion Using Reinforcement Learning

    Authors: Amin Sarihi, Ahmad Patooghy, Peter Jamieson, Abdel-Hameed A. Badawy

    Abstract: This paper utilizes Reinforcement Learning (RL) as a means to automate the Hardware Trojan (HT) insertion process to eliminate the inherent human biases that limit the development of robust HT detection methods. An RL agent explores the design space and finds circuit locations that are best for kee** inserted HTs hidden. To achieve this, a digital circuit is converted to an environment in which… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: This paper was accepted for publication in GLSVLSI'22

    ACM Class: B.8.1

  9. A Divide-and-Conquer Approach to Dicke State Preparation

    Authors: Shamminuj Aktar, Andreas Bärtschi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: We present a divide-and-conquer approach to deterministically prepare Dicke states $\lvert D_k^n\rangle$ (i.e., equal-weight superpositions of all $n$-qubit states with Hamming Weight $k$) on quantum computers. In an experimental evaluation for up to $n=6$ qubits on IBM Quantum Sydney and Montreal devices, we achieve significantly higher state fidelity compared to previous results [Mukherjee and o… ▽ More

    Submitted 9 June, 2022; v1 submitted 23 December, 2021; originally announced December 2021.

    Report number: LA-UR-21-31138

    Journal ref: IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-16, 2022, Art no. 3101816

  10. arXiv:1907.12666  [pdf, other

    cs.PF cs.SE

    Modeling Shared Cache Performance of OpenMP Programs using Reuse Distance

    Authors: Atanu Barai, Gopinath Chennupati, Nandakishore Santhi, Abdel-Hameed A. Badawy, Stephan Eidenbenz

    Abstract: Performance modeling of parallel applications on multicore computers remains a challenge in computational co-design due to the complex design of multicore processors including private and shared memory hierarchies. We present a Scalable Analytical Shared Memory Model to predict the performance of parallel applications that runs on a multicore computer and shares the same level of cache in the hier… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Report number: LA-UR-19-27398

  11. arXiv:1806.07570  [pdf

    cs.ET

    Energy Efficient Tri-State CNFET Ternary Logic Gates

    Authors: Sepher Tabrizchi, Fazel Sharifi, Abdel-Hameed A. Badawy

    Abstract: Traditional silicon binary circuits continue to face challenges such as high leakage power dissipation and large area of interconnections. Multiple-Valued Logic (MVL) and nano devices are two feasible solutions to overcome these problems. In this paper, a novel method is presented to design ternary logic circuits based on Carbon Nanotube Field Effect Transistors (CNFETs). The proposed designs use… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

  12. MorphoNoC: Exploring the Design Space of a Configurable Hybrid NoC using Nanophotonics

    Authors: Vikram K. Narayana, Shuai Sun, Abdel-Hameed A. Badawy, Volker J. Sorger, Tarek El-Ghazawi

    Abstract: As diminishing feature sizes drive down the energy for computations, the power budget for on-chip communication is steadily rising. Furthermore, the increasing number of cores is placing a huge performance burden on the network-on-chip (NoC) infrastructure. While NoCs are designed as regular architectures that allow scaling to hundreds of cores, the lack of a flexible topology gives rise to higher… ▽ More

    Submitted 14 March, 2017; v1 submitted 12 December, 2016; originally announced January 2017.

    Comments: 14 pages, 15 figures

  13. Evaluating Discussion Boards on BlackBoard as a Collaborative Learning Tool A Students Survey and Reflections

    Authors: AbdelHameed A. Badawy, Michelle M. Hugue

    Abstract: In this paper, we investigate how the students think of their experience in a junior level course that has a blackboard course presence where the students use the discussion boards extensively. A survey is set up through blackboard as a voluntary quiz and the student who participated were given a freebie point. The results and the participation were very interesting in terms of the feedback we got… ▽ More

    Submitted 3 October, 2012; originally announced October 2012.

    Comments: 5 pages, 12 tables, appears in proceedings of the IEEE International Conference on Education and Management Technology (ICEMT 2010), Cairo, Egypt November 2010. arXiv admin note: substantial text overlap with arXiv:1210.1178

    Journal ref: In proceedings of the IEEE International Conference on Education and Management Technology (ICEMT 2010), pages 79 - 82, Cairo, Egypt November 2010

  14. arXiv:1210.1178  [pdf

    cs.CY

    Students Perceptions of the Effectiveness of Discussion Boards What can we get from our students for a freebie point

    Authors: Abdel-Hameed A. Badawy

    Abstract: We investigate how the students think of their experience in a junior 300 level computer science course that uses blackboard as the underlying course management system. The discussion boards in Blackboard are heavily used for programming project support and to foster cooperation among students to answer their questions and concerns. A survey is conducted through blackboard as a voluntary quiz and… ▽ More

    Submitted 3 October, 2012; originally announced October 2012.

    Comments: 9 pages

    Journal ref: International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, No. 9, 2012, 136-144