Skip to main content

Showing 1–3 of 3 results for author: Shivakumar, B A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19139  [pdf, other

    cs.DC

    HMTRace: Hardware-Assisted Memory-Tagging based Dynamic Data Race Detection

    Authors: Jaidev Shastri, Xiaoguang Wang, Basavesh Ammanaghatta Shivakumar, Freek Verbeek, Binoy Ravindran

    Abstract: Data race, a category of insidious software concurrency bugs, is often challenging and resource-intensive to detect and debug. Existing dynamic race detection tools incur significant execution time and memory overhead while exhibiting high false positives. This paper proposes HMTRace, a novel Armv8.5-A memory tag extension (MTE) based dynamic data race detection framework, emphasizing low compute… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  2. arXiv:2311.05831  [pdf, other

    cs.CR

    Robust Constant-Time Cryptography

    Authors: Matthew Kolosick, Basavesh Ammanaghatta Shivakumar, Sunjay Cauligi, Marco Patrignani, Marco Vassena, Ranjit Jhala, Deian Stefan

    Abstract: The constant-time property is considered the security standard for cryptographic code. Code following the constant-time discipline is free from secret-dependent branches and memory accesses, and thus avoids leaking secrets through cache and timing side-channels. The constant-time property makes a number of implicit assumptions that are fundamentally at odds with the reality of cryptographic code.… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  3. arXiv:2006.14679  [pdf, other

    eess.SP cs.CY eess.SY

    On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

    Authors: Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan Gerdes, Z. Berkay Celik

    Abstract: Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and in… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.