Skip to main content

Showing 1–7 of 7 results for author: Katkoori, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.01588  [pdf

    cs.CY

    Workshops on Extreme Scale Design Automation (ESDA) Challenges and Opportunities for 2025 and Beyond

    Authors: R. Iris Bahar, Alex K. Jones, Srinivas Katkoori, Patrick H. Madden, Diana Marculescu, Igor L. Markov

    Abstract: Integrated circuits and electronic systems, as well as design technologies, are evolving at a great rate -- both quantitatively and qualitatively. Major developments include new interconnects and switching devices with atomic-scale uncertainty, the depth and scale of on-chip integration, electronic system-level integration, the increasing significance of software, as well as more effective means o… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: A Computing Community Consortium (CCC) workshop report, 32 pages

    Report number: ccc2014report_1

  2. arXiv:2003.13164  [pdf, other

    cs.CR

    Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs

    Authors: Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori

    Abstract: Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with varia… ▽ More

    Submitted 29 March, 2020; originally announced March 2020.

    Comments: Accepted to be Published in: Proceedings of the 21st International Symposium on Quality Electronic Design (ISQED 2020), Mar. 25-26, 2020, Santa Clara, CA

  3. arXiv:2001.01071  [pdf, ps, other

    cs.CR

    DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs

    Authors: Sheikh Ariful Islam, Love Kumar Sah, Srinivas Katkoori

    Abstract: Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it… ▽ More

    Submitted 4 January, 2020; originally announced January 2020.

    Comments: Accepted to be Published in: Proceedings of the 2019 5th IEEE International Symposium on Smart Electronic Systems (IEEE-iSES), Dec. 16-18, 2019, Rourkela, India

  4. arXiv:1909.07891  [pdf, other

    cs.CR

    Machine Learning based IoT Edge Node Security Attack and Countermeasures

    Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam

    Abstract: Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the secu… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: Accepted in ISVLSI 2019

  5. arXiv:1909.07821  [pdf, other

    cs.CR

    Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack

    Authors: Love Kumar Sah, Sheikh Ariful Islam, Srinivas Katkoori

    Abstract: We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables sp… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Comments: Accepted for publication in MWSCAS2019

  6. arXiv:1909.06357  [pdf, ps, other

    cs.CR

    An SR Flip-Flop based Physical Unclonable Functions for Hardware Security

    Authors: Rohith Prasad Challa, Sheikh Ariful Islam, Srinivas Katkoori

    Abstract: Physical Unclonable Functions (PUFs) have emerged as a promising solution to identify and authenticate Integrated Circuits (ICs). In this paper, we propose a novel NAND-based Set-Reset (SR) Flip-flop (FF) PUF design for security enclosures of the area- and power-constrained Internet-of-Things (IoT) edge node. Such SR-FF based PUF is constructed during a unique race condition that is (normally) avo… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Accepted to MWSCAS 2019

  7. arXiv:1611.07392  [pdf, other

    cs.CR cs.DC

    Call Trace and Memory Access Pattern based Runtime Insider Threat Detection for Big Data Platforms

    Authors: Santosh Aditham, Nagarajan Ranganathan, Srinivas Katkoori

    Abstract: Big data platforms such as Hadoop and Spark are being widely adopted both by academia and industry. In this paper, we propose a runtime intrusion detection technique that understands and works according to the properties of such distributed compute platforms. The proposed method is based on runtime analysis of system and library calls and memory access patterns of tasks running on the datanodes (s… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.