Skip to main content

Showing 1–10 of 10 results for author: Dinakarrao, S M P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10012  [pdf, other

    cs.CR cs.DC

    Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security

    Authors: Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

    Abstract: In recent years, networked IoT systems have revolutionized connectivity, portability, and functionality, offering a myriad of advantages. However, these systems are increasingly targeted by adversaries due to inherent security vulnerabilities and limited computational and storage resources. Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks. Wh… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2404.08808

  2. arXiv:2404.08818  [pdf, other

    cs.CR cs.AR

    Empowering Malware Detection Efficiency within Processing-in-Memory Architecture

    Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao

    Abstract: The widespread integration of embedded systems across various industries has facilitated seamless connectivity among devices and bolstered computational capabilities. Despite their extensive applications, embedded systems encounter significant security threats, with one of the most critical vulnerabilities being malicious software, commonly known as malware. In recent times, malware detection tech… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  3. arXiv:2404.08808  [pdf, other

    cs.CR cs.DC

    Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization

    Authors: Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

    Abstract: The widespread integration of IoT devices has greatly improved connectivity and computational capabilities, facilitating seamless communication across networks. Despite their global deployment, IoT devices are frequently targeted for security breaches due to inherent vulnerabilities. Among these threats, malware poses a significant risk to IoT devices. The lack of built-in security features and li… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  4. arXiv:2404.02344  [pdf, other

    cs.CR cs.CV

    Generative AI-Based Effective Malware Detection for Embedded Computing Systems

    Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, the existing techniques require a tremendous number of benign and malware samples for training and modeling an efficient malware detector. Furthermore,… ▽ More

    Submitted 12 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  5. arXiv:2403.12812  [pdf, other

    cs.CR

    The Emergence of Hardware Fuzzing: A Critical Review of its Significance

    Authors: Raghul Saravanan, Sai Manoj Pudukotai Dinakarrao

    Abstract: In recent years, there has been a notable surge in attention towards hardware security, driven by the increasing complexity and integration of processors, SoCs, and third-party IPs aimed at delivering advanced solutions. However, this complexity also introduces vulnerabilities and bugs into hardware systems, necessitating early detection during the IC design cycle to uphold system integrity and mi… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  6. A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

    Authors: Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Logic obfuscation is introduced as a pivotal defense against multiple hardware threats on Integrated Circuits (ICs), including reverse engineering (RE) and intellectual property (IP) theft. The effectiveness of logic obfuscation is challenged by the recently introduced Boolean satisfiability (SAT) attack and its variants. A plethora of countermeasures has also been proposed to thwart the SAT attac… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( Early Access ) 2021 1-1

  7. arXiv:2110.11459  [pdf, other

    cs.CR

    CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

    Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi

    Abstract: Reverse engineering (RE) in Integrated Circuits (IC) is a process in which one will attempt to extract the internals of an IC, extract the circuit structure, and determine the gate-level information of an IC. In general, RE process can be done for validation as well as intellectual property (IP) stealing intentions. In addition, RE also facilitates different illicit activities such as insertion of… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  8. arXiv:2003.09945  [pdf, other

    cs.LG cs.SI stat.ML

    Deep Multi-attributed Graph Translation with Node-Edge Co-evolution

    Authors: Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: Generalized from image and language translation, graph translation aims to generate a graph in the target domain by conditioning an input graph in the source domain. This promising topic has attracted fast-increasing attention recently. Existing works are limited to either merely predicting the node attributes of graphs with fixed topology or predicting only the graph topology without considering… ▽ More

    Submitted 15 June, 2020; v1 submitted 22 March, 2020; originally announced March 2020.

    Comments: This paper has won the Best Paper Award in International Conference on Data Mining (ICDM), Bei**g, China, 2019

    Journal ref: International Conference on Data Mining (ICDM), Bei**g, China, 2019, pp. 250-259

  9. arXiv:2002.07857  [pdf, other

    cs.CR

    DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain

    Authors: Shervin Roshanisefat, Hadi Mardani Kamali, Kimia Zamiri Azar, Sai Manoj Pudukotai Dinakarrao, Naghmeh Karimi, Houman Homayoun, Avesta Sasan

    Abstract: In this paper, we introduce DFSSD, a novel logic locking solution for sequential and FSM circuits with a restricted (locked) access to the scan chain. DFSSD combines two techniques for obfuscation: (1) Deep Faults, and (2) Shallow State Duality. Both techniques are specifically designed to resist against sequential SAT attacks based on bounded model checking. The shallow state duality prevents a s… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

  10. arXiv:1907.12952  [pdf, other

    cs.AR cs.LG

    Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

    Authors: Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad

    Abstract: The emergence of High-Level Synthesis (HLS) tools shifted the paradigm of hardware design by making the process of map** high-level programming languages to hardware design such as C to VHDL/Verilog feasible. HLS tools offer a plethora of techniques to optimize designs for both area and performance, but resource usage and timing reports of HLS tools mostly deviate from the post-implementation re… ▽ More

    Submitted 28 July, 2019; originally announced July 2019.

    Comments: This paper has been accepted in The International Conference on Field-Programmable Logic and Applications 2019 (FPL'19)