Steven Eric Zeltmann, Nikhil Gupta, Nektarios Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri As the manufacturing time, quality, and cost associated with additive manufacturing (AM) continue to improve, more and more businesses and consumers are adopting this technology. Some of the key benefits of AM include customizing products, localizing production and reducing logistics....
Category: Publications
Controlling your control flow graph
Arun Kanuparthi, Jeyavijayan Rajendran, Ramesh Karri In this paper, the authors propose Dynamic Sequence Checker (DSC), a framework to verify the validity of control flow between basic blocks in the program
SARLock: SAT attack resistant logic locking
Muhammad Yasin, Bodhisatwa Mazumdar, Jeyavijayan J V Rajendran, and Ozgur Sinanoglu Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently...
Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks
Maria I. Mera Collantes, Mohamed El Massad, and Siddharth Garg With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure...
The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin, Charalambos Konstantinou, Xueyang Wang, Lucas Davi, Ahmad-Reza Sadeghi, Michail Maniatakos, and Ramesh Karri Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling between cyber and physical components. In this paper, we explore the ICS cybersecurity landscape including: 1) the key principles and unique aspects of ICS operation;...
Compliance signaling games: toward modeling the deterrence of insider threats
William Casey, Jose Andre Morales, Evan Wright, Quanyan Zhu, Bud Mishra The authors form a signaling game model to address the controllable risks acting within an organization whether they are expressed from malicious, unwitting, or benign insiders who are trusted to operate within an organization.
Educating Tomorrow's Lawyers to Handle New Digital Problems
Zachary K. Goldman Tomorrow’s lawyers—today’s law students—need to be better equipped to understand the underlying technical systems that will push the law in new directions. In no area of law is this dynamic more apparent than cyber security.
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao. Raheem Beyah In this paper, the authors take the first step toward understanding how long-tail SEO spam is implemented on cloud hosting platforms.
Building trustworthy systems using untrusted components: A High-level synthesis approach
Jeyavijayan (JV) Rajendran, Ozgur Sinanoglu, and Ramesh Karri Trustworthiness of system-on-chip designs is undermined by malicious logic (Trojans) in third-party intellectual properties (3PIPs). In this paper, duplication, diversity, and isolation principles have been extended to detect build trustworthy systems using untrusted, potentially Trojan-infected 3PIPs.
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services
Mohammad Karami, Youngsam Park, and Damon McCoy DDoS-for-hire services, also known as booters, have commoditized DDoS attacks and enabled abusive subscribers of these services to cheaply extort, harass and intimidate businesses and people by taking them offline. However, due to the underground nature of these booters, little is known about their underlying technical and business...