Skip to main content

Showing 1–11 of 11 results for author: Sridhara, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10520  [pdf, ps, other

    cs.CV eess.IV eess.SP

    Full reference point cloud quality assessment using support vector regression

    Authors: Ryosuke Watanabe, Shashank N. Sridhara, Haoran Hong, Eduardo Pavez, Keisuke Nonaka, Tatsuya Kobayashi, Antonio Ortega

    Abstract: Point clouds are a general format for representing realistic 3D objects in diverse 3D applications. Since point clouds have large data sizes, develo** efficient point cloud compression methods is crucial. However, excessive compression leads to various distortions, which deteriorates the point cloud quality perceived by end users. Thus, establishing reliable point cloud quality assessment (PCQA)… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: Source code: https://github.com/STAC-USC/FRSVR-PCQA

  2. arXiv:2404.13998  [pdf, other

    cs.CR

    SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals

    Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde

    Abstract: User programs recover from hardware exceptions and respond to signals by executing custom handlers that they register specifically for such events. We present SIGY attack, which abuses this programming model on Intel SGX to break the confidentiality and integrity guarantees of enclaves. SIGY uses the untrusted OS to deliver fake hardware events and injects fake signals in an enclave at any point.… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. arXiv:2404.03526  [pdf, other

    cs.CR

    WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP

    Authors: Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde

    Abstract: AMD SEV-SNP offers VM-level trusted execution environments (TEEs) to protect the confidentiality and integrity for sensitive cloud workloads from untrusted hypervisor controlled by the cloud provider. AMD introduced a new exception, #VC, to facilitate the communication between the VM and the untrusted hypervisor. We present WeSee attack, where the hypervisor injects malicious #VC into a victim VM'… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Extended version of the IEEE S&P 2024 paper

  4. arXiv:2404.03387  [pdf, other

    cs.CR

    Heckler: Breaking Confidential VMs with Malicious Interrupts

    Authors: Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde

    Abstract: Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now available on popular cloud platforms. The untrusted hypervisor in these settings is in control of several resource management and configuration tasks, in… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Extended version of the Usenix Security 2024 paper

  5. arXiv:2305.15986  [pdf, other

    cs.CR

    ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

    Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde

    Abstract: Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as GPUs and FPGAs. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design, an upcoming TEE feature in Armv9-A, to address this gap. We observe that CCA offers the right abstraction a… ▽ More

    Submitted 25 October, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: Extended version of the Usenix Security 2024 paper

  6. arXiv:2211.00306  [pdf, other

    cs.CR cs.DC

    Empowering Data Centers for Next Generation Trusted Computing

    Authors: Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri

    Abstract: Modern data centers have grown beyond CPU nodes to provide domain-specific accelerators such as GPUs and FPGAs to their customers. From a security standpoint, cloud customers want to protect their data. They are willing to pay additional costs for trusted execution environments such as enclaves provided by Intel SGX and AMD SEV. Unfortunately, the customers have to make a critical choice -- either… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 23 pages, 12 figures

  7. arXiv:2207.06512  [pdf, other

    cond-mat.mtrl-sci cs.CE cs.LG

    A Generalized Framework for Microstructural Optimization using Neural Networks

    Authors: Saketh Sridhara, Aaditya Chandrasekhar, Krishnan Suresh

    Abstract: Microstructures, i.e., architected materials, are designed today, typically, by maximizing an objective, such as bulk modulus, subject to a volume constraint. However, in many applications, it is often more appropriate to impose constraints on other physical quantities of interest. In this paper, we consider such generalized microstructural optimization problems where any of the microstructural qu… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  8. arXiv:2204.06682  [pdf, other

    cs.CE cs.LG

    GM-TOuNN: Graded Multiscale Topology Optimization using Neural Networks

    Authors: Aaditya Chandrasekhar, Saketh Sridhara, Krishnan Suresh

    Abstract: Multiscale topology optimization (M-TO) entails generating an optimal global topology, and an optimal set of microstructures at a smaller scale, for a physics-constrained problem. With the advent of additive manufacturing, M-TO has gained significant prominence. However, generating optimal microstructures at various locations can be computationally very expensive. As an alternate, graded multiscal… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: Submitted to Structural and Multidisciplinary Optimization

  9. arXiv:2112.12566  [pdf, other

    cs.CE cs.LG

    Integrating Material Selection with Design Optimization via Neural Networks

    Authors: Aaditya Chandrasekhar, Saketh Sridhara, Krishnan Suresh

    Abstract: The engineering design process often entails optimizing the underlying geometry while simultaneously selecting a suitable material. For a certain class of simple problems, the two are separable where, for example, one can first select an optimal material, and then optimize the geometry. However, in general, the two are not separable. Furthermore, the discrete nature of material selection is not co… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: 16 pages, submitted to Structural and Multidisciplinary Optimization

  10. arXiv:2104.01965  [pdf, other

    cs.MS cs.CE math.NA

    AuTO: A Framework for Automatic differentiation in Topology Optimization

    Authors: Aaditya Chandrasekhar, Saketh Sridhara, Krishnan Suresh

    Abstract: A critical step in topology optimization (TO) is finding sensitivities. Manual derivation and implementation of the sensitivities can be quite laborious and error-prone, especially for non-trivial objectives, constraints and material models. An alternate approach is to utilize automatic differentiation (AD). While AD has been around for decades, and has also been applied in TO, wider adoption has… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  11. arXiv:1806.03560  [pdf, other

    cs.CV

    Semantic Correspondence: A Hierarchical Approach

    Authors: Akila Pemasiri, Kien Nguyen, Sridha Sridhara, and Clinton Fookes

    Abstract: Establishing semantic correspondence across images when the objects in the images have undergone complex deformations remains a challenging task in the field of computer vision. In this paper, we propose a hierarchical method to tackle this problem by first semantically targeting the foreground objects to localize the search space and then looking deeply into multiple levels of the feature represe… ▽ More

    Submitted 9 June, 2018; originally announced June 2018.