Category: Publications

Home / Publications
Post

Measuring the Fitness of Fitness Trackers

Chealsea G. Bender, Jason C. Hoffstot, Brian T. Combs, Sara Hooshangi, and Justin Cappos. Data collected by fitness trackers could play an important role in improving the health and well-being of the individuals who wear them. Many insurance companies even offer monetary rewards to participants who meet certain steps or calorie goals. However, in order...

Post

Malicious firmware detection with hardware performance counters

Xueyang Wang, Charalambos Konstantinou, Michail Maniatakos, Ramesh Karri, Serena Lee, Patricia Robison, Paul Stergiou, and Steve Kim Critical infrastructure components nowadays use microprocessor-based embedded control systems. It is often infeasible, however, to employ the same level of security measures used in general purpose computing systems, due to the stringent performance and resource constraints of embedded...

Post

BandiTS: Dynamic timing speculation using multi-armed bandit based optimization

Jeff Jun Zhang and Siddharth Garg Timing speculation has recently been proposed as a method for increasing performance beyond that achievable by conventional worst-case design techniques. Starting with the observation of fast temporal variations in timing error probabilities, we propose a run-time technique to dynamically determine the optimal degree of timing speculation (i.e., how aggressively the processor...

Post

Inspiring trust in outsourced integrated circuit fabrication

Siddharth Garg The fabrication of integrated circuits (ICs) is typically outsourced to an external semiconductor foundry to reduce cost. However, this can come at the expense of trust. How can a designer ensure the integrity of the ICs fabricated by an external foundry? The talk will discuss a new approach for inspiring trust in outsourced...

Post

A game-theoretic analysis of label flipping attacks on distributed support vector machines

Rui Zhang and Quanyan Zhu Distributed machine learning algorithms play a significant role in processing massive data sets over large networks. However, the increasing reliance on machine learning on information and communication technologies makes it inherently vulnerable to cyber threats. This work aims to develop secure distributed algorithms to protect the learning from adversaries. We...

Post

Minimax robust optimal control of multiscale linear-quadratic systems

Hamza Anwar and Quanyan Zhu With a growing system complexity in the IoT framework, many networked cyber-physical systems work in a hierarchical fashion. Layers of information outputs and command inputs are available. An active area of research is in optimizing the design of policies and control command that influence information flow for such multi-layered systems....

Post

What to Lock?: Functional and Parametric Locking

Muhammad Yasin, Abhrajit Sengupta, Benjamin Carrion Schafer, Yiorgos Makris, Ozgur Sinanoglu and Jeyavijayan (JV) Rajendran Logic locking is an intellectual property (IP) protection technique that prevents IP piracy, reverse engineering and overbuilding attacks by the untrusted foundry or end-users. Existing logic locking techniques are all based on locking the functionality; the design/chip is nonfunctional unless...

Post

The Need for Declarative Properties in Digital IC Security

Mohamed El Massad, Frank Imeson, Siddharth Garg and Mahesh Tripunitara. We emphasize the need to articulate precise, declarative properties in the context of securing Digital ICs. We do this by discussing two pieces of our work on securing Digital ICs. In one, we discuss a seemingly compelling approach to protecting Intellectual Property — IC camouflaging. We...

Post

On the Difficulty of Inserting Trojans in Reversible Computing Architectures

Xiaotong Cui, Samah Saeed, Alwin Zulehner, Robert Wille, Rolf Drechsler, Kaijie Wu and Ramesh Karri Fabrication-less design houses outsource their designs to 3rd party foundries to lower fabrication cost. However, this creates opportunities for a rogue in the foundry to introduce hardware Trojans, which stay inactive most of the time and cause unintended consequences to...

Post

Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Service Attacks

Jeffrey Pawlick and Quanyan Zhu —While the Internet of things (IoT) promises to improve areas such as energy efficiency, health care, and transportation, it is highly vulnerable to cyberattacks. In particular, DDoS attacks work by overflowing the bandwidth of a server. But many IoT devices form part of cyber-physical systems (CPS). Therefore, they can be...