Skip to main content

Showing 1–11 of 11 results for author: Bhandari, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19549  [pdf, other

    cs.CR cs.LG

    ASCENT: Amplifying Power Side-Channel Resilience via Learning & Monte-Carlo Tree Search

    Authors: Jitendra Bhandari, Animesh Basak Chowdhury, Mohammed Nabeel, Ozgur Sinanoglu, Siddharth Garg, Ramesh Karri, Johann Knechtel

    Abstract: Power side-channel (PSC) analysis is pivotal for securing cryptographic hardware. Prior art focused on securing gate-level netlists obtained as-is from chip design automation, neglecting all the complexities and potential side-effects for security arising from the design automation process. That is, automation traditionally prioritizes power, performance, and area (PPA), sidelining security. We pr… ▽ More

    Submitted 1 July, 2024; v1 submitted 27 June, 2024; originally announced June 2024.

    Comments: Accepted at 2024 ACM/IEEE International Conference on Computer-Aided Design

  2. arXiv:2406.17132  [pdf, other

    cs.AR

    LLM-Aided Testbench Generation and Bug Detection for Finite-State Machines

    Authors: Jitendra Bhandari, Johann Knechtel, Ramesh Narayanaswamy, Siddharth Garg, Ramesh Karri

    Abstract: This work investigates the potential of tailoring Large Language Models (LLMs), specifically GPT3.5 and GPT4, for the domain of chip testing. A key aspect of chip design is functional testing, which relies on testbenches to evaluate the functionality and coverage of Register-Transfer Level (RTL) designs. We aim to enhance testbench generation by incorporating feedback from commercial-grade Electro… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  3. arXiv:2402.03196  [pdf, other

    cs.CR

    Lightweight Masking Against Static Power Side-Channel Attacks

    Authors: Jitendra Bhandari, Mohammed Nabeel, Likhitha Mankali, Ozgur Sinanoglu, Ramesh Karri, Johann Knechtel

    Abstract: This paper presents a novel defense strategy against static power side-channel attacks (PSCAs), a critical threat to cryptographic security. Our method is based on (1) carefully tuning high-Vth versus low-Vth cell selection during synthesis, accounting for both security and timing impact, and (2), at runtime, randomly switching the operation between these cells. This approach serves to significant… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  4. arXiv:2312.03814  [pdf, other

    cs.LG cs.AI

    Pearl: A Production-ready Reinforcement Learning Agent

    Authors: Zheqing Zhu, Rodrigo de Salvo Braz, Jalaj Bhandari, Daniel Jiang, Yi Wan, Yonathan Efroni, Liyuan Wang, Ruiyang Xu, Hongbo Guo, Alex Nikulkov, Dmytro Korenkevych, Urun Dogan, Frank Cheng, Zheng Wu, Wanqiao Xu

    Abstract: Reinforcement Learning (RL) offers a versatile framework for achieving long-term goals. Its generality allows us to formalize a wide range of problems that real-world intelligent systems encounter, such as dealing with delayed rewards, handling partial observability, addressing the exploration and exploitation dilemma, utilizing offline data to improve online performance, and ensuring safety const… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  5. arXiv:2305.13747  [pdf, other

    cs.IR cs.AI

    Optimizing Long-term Value for Auction-Based Recommender Systems via On-Policy Reinforcement Learning

    Authors: Ruiyang Xu, Jalaj Bhandari, Dmytro Korenkevych, Fan Liu, Yuchen He, Alex Nikulkov, Zheqing Zhu

    Abstract: Auction-based recommender systems are prevalent in online advertising platforms, but they are typically optimized to allocate recommendation slots based on immediate expected return metrics, neglecting the downstream effects of recommendations on user behavior. In this study, we employ reinforcement learning to optimize for long-term return metrics in an auction-based recommender system. Utilizing… ▽ More

    Submitted 30 July, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

  6. ALICE: An Automatic Design Flow for eFPGA Redaction

    Authors: Chiara Muscari Tomajoli, Luca Collini, Jitendra Bhandari, Abdul Khader Thalakkattu Moosa, Benjamin Tan, Xifan Tang, Pierre-Emmanuel Gaillardon, Ramesh Karri, Christian Pilato

    Abstract: Fabricating an integrated circuit is becoming unaffordable for many semiconductor design houses. Outsourcing the fabrication to a third-party foundry requires methods to protect the intellectual property of the hardware designs. Designers can rely on embedded reconfigurable devices to completely hide the real functionality of selected design portions unless the configuration string (bitstream) is… ▽ More

    Submitted 15 May, 2022; originally announced May 2022.

    Comments: Paper accepted for presentation at the IEEE/ACM Design Automation Conference (DAC 2022)

  7. arXiv:2111.04222  [pdf, other

    cs.CR cs.AR

    Not All Fabrics Are Created Equal: Exploring eFPGA Parameters For IP Redaction

    Authors: Jitendra Bhandari, Abdul Khader Thalakkattu Moosa, Benjamin Tan, Christian Pilato, Ganesh Gore, Xifan Tang, Scott Temple, Pierre-Emmanuel Gaillardo, Ramesh Karri

    Abstract: Semiconductor design houses rely on third-party foundries to manufacture their integrated circuits (IC). While this trend allows them to tackle fabrication costs, it introduces security concerns as external (and potentially malicious) parties can access critical parts of the designs and steal or modify the Intellectual Property (IP). Embedded FPGA (eFPGA) redaction is a promising technique to prot… ▽ More

    Submitted 7 November, 2021; originally announced November 2021.

    Comments: 13 Pages

  8. arXiv:2110.13346  [pdf, other

    cs.CR

    Exploring eFPGA-based Redaction for IP Protection

    Authors: Jitendra Bhandari, Abdul Khader Thalakkattu Moosa, Benjamin Tan, Christian Pilato, Ganesh Gore, Xifan Tang, Scott Temple, Pierre-Emmanuel Gaillardon, Ramesh Karri

    Abstract: Recently, eFPGA-based redaction has been proposed as a promising solution for hiding parts of a digital design from untrusted entities, where legitimate end-users can restore functionality by loading the withheld bitstream after fabrication. However, when deciding which parts of a design to redact, there are a number of practical issues that designers need to consider, including area and timing ov… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: Accepted to ICCAD 2021

  9. arXiv:2007.11120  [pdf, other

    cs.LG math.OC stat.ML

    On Linear Convergence of Policy Gradient Methods for Finite MDPs

    Authors: Jalaj Bhandari, Daniel Russo

    Abstract: We revisit the finite time analysis of policy gradient methods in the one of the simplest settings: finite state and action MDPs with a policy class consisting of all stochastic policies and with exact gradient evaluations. There has been some recent work viewing this setting as an instance of smooth non-linear optimization problems and showing sub-linear convergence rates with small step-sizes. H… ▽ More

    Submitted 13 December, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: Published in AISTATS 2021

  10. arXiv:1906.01786  [pdf, other

    cs.LG stat.ML

    Global Optimality Guarantees For Policy Gradient Methods

    Authors: Jalaj Bhandari, Daniel Russo

    Abstract: Policy gradients methods apply to complex, poorly understood, control problems by performing stochastic gradient descent over a parameterized class of polices. Unfortunately, even for simple control problems solvable by standard dynamic programming techniques, policy gradient algorithms face non-convex optimization problems and are widely understood to converge only to a stationary point. This wor… ▽ More

    Submitted 19 June, 2022; v1 submitted 4 June, 2019; originally announced June 2019.

  11. arXiv:1806.02450  [pdf, ps, other

    cs.LG stat.ML

    A Finite Time Analysis of Temporal Difference Learning With Linear Function Approximation

    Authors: Jalaj Bhandari, Daniel Russo, Raghav Singal

    Abstract: Temporal difference learning (TD) is a simple iterative algorithm used to estimate the value function corresponding to a given policy in a Markov decision process. Although TD is one of the most widely used algorithms in reinforcement learning, its theoretical analysis has proved challenging and few guarantees on its statistical efficiency are available. In this work, we provide a simple and expli… ▽ More

    Submitted 6 November, 2018; v1 submitted 6 June, 2018; originally announced June 2018.