Aditya Thimmaiah

ORCID: 0009-0002-1917-7386
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Software Testing and Debugging Techniques
  • Formal Methods in Verification
  • Software Reliability and Analysis Research
  • Logic, programming, and type systems
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Advanced Database Systems and Queries
  • Logic, Reasoning, and Knowledge
  • Data Management and Algorithms
  • Constraint Satisfaction and Optimization
  • Chaos-based Image/Signal Encryption
  • Quantum-Dot Cellular Automata
  • Real-time simulation and control systems
  • Graph Theory and Algorithms
  • Semantic Web and Ontologies
  • Software Engineering Research
  • Parallel Computing and Optimization Techniques

The University of Texas at Austin
2021-2024

We present LeJit, a template-based framework for testing Java just-in-time (JIT) compilers. Like recent frameworks, LeJit executes template---a program with holes to be filled---to generate concrete programs given as inputs JIT automatically generates template from existing code by converting expressions holes, well generating necessary glue (i.e., that instances of non-primitive types) make generated templates executable. have successfully used test range popular compilers, revealing five...

10.1145/3643777 article EN Proceedings of the ACM on software engineering. 2024-07-12

We present JOG, a framework for developing peephole optimizations and accompanying tests Java compilers. JOG allows developers to write optimization as pattern in itself. Such contains code before after the desired transformation defined by optimization, with any necessary preconditions, can be written same way that are already OpenJDK. automatically translates each into C/C++ JIT pass, generates optimization. Also, analyzes shadow relation between pair of where effect shadowed is overridden...

10.1145/3639478.3640040 article EN cc-by 2024-04-14

A galvanic isolation (GI) technique for cryptographic cores is proposed to mitigate power and electromagnetic (EM) sidechannel analysis (SCA) attacks. The design uses deep N-well technology an integrated charge pump-based delivery management completely isolate V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CC</sub> , xmlns:xlink="http://www.w3.org/1999/xlink">SS</sub> substrate nodes from the external supply ground pins, improving SCA...

10.1109/cicc51472.2021.9431524 article EN 2022 IEEE Custom Integrated Circuits Conference (CICC) 2021-04-01

Electromagnetic (EM) fields have been extensively studied as potent side-channel tools for testing the security of hardware implementations. In this work, a low-cost disassembler that uses fine-grained EM signals to predict program's execution trace with high accuracy is proposed. Unlike conventional disassemblers, proposed does not require extensive randomized instantiations instructions profile them, instead relying on leakage-model-informed sub-sampling potential architectural states...

10.1145/3629167 article EN other-oa ACM Transactions on Embedded Computing Systems 2023-10-25

We present JOG, a framework that facilitates developing Java JIT peephole optimizations alongside tests. JOG enables developers to write pattern, in itself, specifies desired code transformations by writing before and after the optimization, as well any necessary preconditions. Such patterns can be written same way tests of optimization are already OpenJDK. translates each pattern into C/C++ integrated pass. also generates for from patterns. Furthermore, automatically detect possible shadow...

10.1145/3597926.3598038 preprint EN cc-by 2023-07-12

We introduce Object Graph Programming (OGO), which enables reading and modifying an object graph (i.e., the entire state of heap) via declarative queries. OGO models objects their relations in heap as thereby treating a database: each node is (e.g., instance class or metadata class) edge relation between field one references another object). leverage Cypher, most popular query language for databases, OGO's language. Unlike LINQ, uses collections List) source data, views single "collection"....

10.1145/3597503.3623319 article EN cc-by 2024-02-06

We introduce Object Graph Programming (OGO), which enables reading and modifying an object graph (i.e., the entire state of heap) via declarative queries. OGO models objects their relations in heap as thereby treating a database: each node is (e.g., instance class or metadata class) edge relation between field one references another object). leverage Cypher, most popular query language for databases, OGO's language. Unlike LINQ, uses collections List) source data, views single "collection"....

10.48550/arxiv.2402.02642 preprint EN arXiv (Cornell University) 2024-02-04

The ability of various countermeasures to secure cryptographic modules implementing the Advanced Encryption Standard (AES) algorithm is experimentally evaluated using fine-grained time- and frequency-domain electromagnetic side-channel analysis (EM SCA) attacks. Because an infeasibly large number measurements on-chip EM emanations should be required break protection a cryptosystem, novel approach used keep acquisition costs low while testing system resilience SCA An adaptive scan protocol...

10.1109/iceaa52647.2021.9539534 article EN 2022 International Conference on Electromagnetics in Advanced Applications (ICEAA) 2021-08-09
Coming Soon ...