Shuwen Deng

ORCID: 0000-0002-9782-5038
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Radiation Effects in Electronics
  • Advanced Memory and Neural Computing
  • Parallel Computing and Optimization Techniques
  • Cryptographic Implementations and Security
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Quantum Computing Algorithms and Architecture
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Ferroelectric and Negative Capacitance Devices
  • Topic Modeling
  • Cognitive Functions and Memory
  • Green IT and Sustainability
  • Natural Language Processing Techniques
  • Quantum-Dot Cellular Automata
  • Music and Audio Processing
  • Speech and Audio Processing
  • Network Packet Processing and Optimization
  • Network Security and Intrusion Detection
  • Quantum Information and Cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Algorithms and Data Compression

Tsinghua University
2023-2025

Yale University
2018-2022

University of Passau
2021

Bayer (Germany)
2021

Hubei University of Science and Technology
2018-2019

10.1007/s41635-019-00075-9 article EN Journal of Hardware and Systems Security 2019-11-20

A secure reset operation could be an enabling technology that allows sharing of a quantum computer among different users, or programs the same user. Today, dominant method to erase qubit state is full system wipe, which effectively resets all qubits at time. In today's superconducting machines from IBM, for example, wipe takes up 1000 μs, and it fully erases information in system. However, with there no means only few cleared assigned new user program; everything has erased allow resetting...

10.1145/3548606.3559380 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

Caches are one of the key features modern processors as they help to improve memory access timing through caching recently used data. However, due differences between cache hits and misses, numerous side-channels have been discovered exploited in past. In this paper, Computation Tree Logic is model execution paths processor logic, derive formulas for that can lead side-channel vulnerabilities. total, 28 types attacks presented: 20 which map previously categorized or discussed literature, 8...

10.1145/3214292.3214294 article EN 2018-05-25

This paper focuses on a new attack vector in modern processors: the timing-based side and covert channel attacks due to Translation Look-aside Buffers (TLBs). first presents novel three-step modeling approach that is used exhaustively enumerate all possible TLB vulnerabilities. Building model, this then shows how automatically generate micro security benchmarks test for After showing insecurity of standard TLBs, two secure designs are presented: Static-Partition (SP) Random-Fill (RF) TLB....

10.1145/3307650.3322238 article EN 2019-06-14

This paper evaluates new security threats due to the processor frontend in modern Intel processors. The root causes of are multiple paths that micro-operations can take: through Micro-Instruction Translation Engine (MITE), Decode Stream Buffer (DSB), also called Micro-operation Cache, or Loop Detector (LSD). Each path has its own unique timing and power signatures, which lead side- covert-channel attacks presented this work. Especially, switching between different leads observable...

10.1109/hpca53966.2022.00013 preprint EN 2022-04-01

Based on improvements to an existing three-step model for cache timing-based attacks, this work presents 88 Strong types of theoretical vulnerabilities in processor caches. It also and implements a new benchmark suite that can be used test if is vulnerable one the attacks. In total, there are 1094 automatically-generated programs which cover vulnerabilities. The generates Cache Timing Vulnerability Score (CTVS) evaluate how specific implementation different A smaller CTVS means design more...

10.1145/3373376.3378510 preprint EN 2020-03-09

This work presents a design-time security verification framework for secure processor architectures. Our new SecChisel is built upon the Chisel hardware construction language and tools, uses information flow analysis to verify properties of an architecture at design-time. To enforce security, supports adding tags wires, registers, modules, other parts design description, as well allows defining custom lattice policies. The performs automatic tag propagation in parser checking using Z3 SMT...

10.1145/3337167.3337174 article EN 2019-06-23

Timing-based side and covert channels in processor caches continue to be a threat modern computers. This work shows for the first time, systematic, large-scale analysis of Arm devices detailed results attacks processors are vulnerable to. Compared x86, uses different architectures, microarchitectural implementations, cache replacement policies, etc., which affects how can launched, security testing vulnerabilities should done. To evaluate security, this paper presents benchmarks specifically...

10.1109/tc.2021.3126150 article EN publisher-specific-oa IEEE Transactions on Computers 2021-01-01

This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all way to physical hardware level. Different existing projects are compared, based on tools used aspects being examined. Since many require both software components work together provide system’s promised protections, it is not sufficient verify just levels or in mutually exclusive fashion. survey especially highlights system that...

10.1145/3564785 article EN ACM Journal on Emerging Technologies in Computing Systems 2022-10-06

The microarchitectural state held by predictors in modern processors can leak sensitive information. This is the first work to analyze security of a special type predictor, value and demonstrate new attacks. attacks bypass all existing predictor defenses which have not yet considered as sources vulnerabilities. further shows there are many attack variants, derived using our model. paper highlights importance analysis processor features before they realized silicon, so understood at design time.

10.1109/dac18074.2021.9586089 article EN 2021-11-08

Large Language Models (LLMs) have achieved remarkable success in various fields, but their training and finetuning require massive computation memory, necessitating parallelism which introduces heavy communication overheads. Driven by advances packaging, the chiplet architecture emerges as a potential solution, it can integrate computing power, well utilize on-package links with better signal integrity, higher bandwidth, lower energy consumption. However, most existing chiplet-related works...

10.48550/arxiv.2407.05784 preprint EN arXiv (Cornell University) 2024-07-08

Oblivious RAM (ORAM) hides the memory access patterns, enhancing data privacy by preventing attackers from discovering sensitive information based on sequence of accesses. The performance ORAM is often limited its inherent trade-off between security and efficiency, as concealing patterns imposes significant computational overhead. While prior works focus improving prefetching eliminating requests, we find that their very to workload locality behavior incurs additional management overhead...

10.48550/arxiv.2411.05400 preprint EN arXiv (Cornell University) 2024-11-08

Compute-in-memory (CiM) architecture is an emerging energy-efficient processing paradigm that has attracted widespread attention in AI and Internet of Things (IoT) applications. To protect statically stored sensitive data CiM, designers have implemented various hardware obfuscation techniques CiM architectures. However, we observe existing defense strategies are based on straightforward static-key deployment strategies, which pose vulnerabilities from the perspective key-pruning algorithms...

10.1145/3658644.3690251 article EN cc-by 2024-12-02

This paper implements the latest speech recognition technique and improves it so that can be used on embedded mobile devices. In order to implement system, I build two-layer Long Short-Term Memory networks (LSTMs) using TensorFlow framework train model by Mel Frequency Cepstral Coefficients (MFCCs) vector extracted from wave files. speeds up model, this innovatively applies pruning method LSTMs weights of each cell regularizing weight matrix regression layer. After pruning, retrain preserve...

10.23919/chicc.2019.8865701 article EN 2019-07-01

This article reveals timing-based side-channel and covert-channel attacks from the translation look-aside buffers (TLBs) discusses how to design secure TLBs.

10.1109/mdat.2023.3287938 article EN IEEE Design and Test 2023-06-27

This paper mainly introduces the implementation of bank network design and system construction.In era rapid development, is becoming more important in daily life, especially some large facilities institutions, has become a necessary means to maintain its development.Because financial institution, needs are relatively high, not only be safe, efficient, convenient, but also consider fault tolerance data integrity.In terms demand, performance planning various aspects banking described point by...

10.25236/systca.18.009 article EN 2018-01-01

The implications of ambimorphic archetypes have been far-reaching and pervasive. After years natural research into consistent hashing, we argue the simulation public-private key pairs, which embodies confirmed principles theory. Such a hypothesis might seem perverse but is derived from known results. Our focus in this paper not on whether well-known knowledge-based algorithm for emulation checksums by Herbert Simon runs Θ(n) time, rather exploring semantic tool harnessing telephony (Swale).

10.12783/dtcse/iccis2019/31942 article EN DEStech Transactions on Computer Science and Engineering 2019-11-13

Timing-based side or covert channels in processor caches continue to present a threat computer systems, and they are the key many of recent Spectre Meltdown attacks. Based on improvements an existing three-step model for cache timing-based attacks, this work presents 88 Strong types theoretical vulnerabilities caches. To understand evaluate all possible caches, further implements new benchmark suite which can be used test attacks given design is vulnerable. In total, there 1094...

10.48550/arxiv.1911.08619 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...