• Publications
  • Influence
The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency
TLDR
We show that Software Transactional Memory (STM) systems can perform better than locks for workloads where a significant portion of the running time is spent in the critical sections. Expand
  • 25
  • PDF
GANDALF: A Fine-Grained Hardware–Software Co-Design for Preventing Memory Attacks
TLDR
We present Gandalf, a compiler assisted hardware extension for the OpenRISC processor that thwarts all forms of memory-based attacks. Expand
  • 4
  • PDF
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware
Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only aExpand
  • 3
  • PDF
White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis
TLDR
We show for the first time that information such as the choices made by viewers can be revealed based on the characteristics of encrypted control traffic exchanged with Netflix. Expand
  • 2
  • PDF
Trust Issues in COTS: The Challenges and Emerging Solution
TLDR
We address the various trust issues in COTS and present a list of promising design and verification solutions to address them. Expand
On Database-Free Authentication of Microelectronic Components
TLDR
We propose a novel database-free and enrolment-free hardware authentication approach, i.e., a digital watermark metric for ICs that captures the characteristics of the physical layout, the manufacturing process and the foundry. Expand
Depending on HTTP/2 for Privacy? Good Luck!
TLDR
In this work, we show that it is possible for a network adversary with modest capabilities to completely break the privacy offered by the schemes that leverage HTTP/2 multiplexing. Expand
MeLPUF: Memory in Logic PUF
TLDR
We propose MeL-PUF - Memory-in-Logic PUF, a low-overhead, distributed, and synthesizable PUF that takes advantage of existing logic gates in a design and transforms them to create cross-coupled inverters (i.e. memory cells) controlled by a PUF control signal. Expand
SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection
TLDR
The emergence of distributed manufacturing ecosystems for electronic hardware involving untrusted parties has given rise to diverse trust issues. Expand