- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Internet of Things and AI
- IoT and Edge/Fog Computing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cloud Data Security Solutions
- Smart Systems and Machine Learning
- Smart Grid Security and Resilience
- Cryptographic Implementations and Security
- Software System Performance and Reliability
- Artificial Intelligence in Healthcare
- Energy Efficient Wireless Sensor Networks
- Cryptography and Data Security
- IoT-based Smart Home Systems
- Advanced Memory and Neural Computing
- Machine Learning and Data Classification
- Brain Tumor Detection and Classification
- Anomaly Detection Techniques and Applications
- Smart Agriculture and AI
- COVID-19 diagnosis using AI
- Cloud Computing and Resource Management
- Information and Cyber Security
- Distributed systems and fault tolerance
Bharati Vidyapeeth Deemed University
2016-2025
The University of Texas at Austin
2014-2024
Stanford University
2020-2024
Vivekananda Global University
2023-2024
Institute of Electrical and Electronics Engineers
2014-2023
Center for Drug Evaluation and Research
2022-2023
United States Food and Drug Administration
2022-2023
Engineering Systems (United States)
2020-2023
University of Memphis
2020-2023
Antea Group (France)
2023
We introduce PHANTOM [1] a new secure processor that obfuscates its memory access trace. To an adversary who can observe the processor's output pins, all traces are computationally indistinguishable (a property known as obliviousness). achieve obliviousness through cryptographic construct Oblivious RAM or ORAM. first improve existing ORAM algorithm and empirical model for trusted storage requirement. then present PHANTOM, oblivious whose novel controller aggressively exploits DRAM bank...
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We present a novel architecture capable tracking all within machine, including explicit data transfers and implicit flows (those subtly devious caused by not performing conditional operations). While problem is impossible to solve in general case, we have created machine that avoids general-purpose programmability...
This paper presents a new, co-designed compiler and architecture called GhostRider for supporting privacy preserving computation in the cloud. ensures all programs satisfy property memory-trace obliviousness (MTO): Even an adversary that observes memory, bus traffic, access times while program executes can learn nothing about program's sensitive inputs outputs. One way to achieve MTO is employ Oblivious RAM (ORAM), allocating code data single ORAM bank, also disable caches or fix rate of...
Privacy and integrity are important security concerns. These concerns addressed by controlling information flow, i.e., restricting how can flow through a system. Most proposed systems that restrict make the implicit assumption hardware used system is fully ``correct'' hardware's instruction set accurately describes its behavior in all circumstances. The truth more complicated: modern designs defy complete verification; many aspects of timing ordering events left totally unspecified;...
An analysis of regulatory submissions drug and biological products to the US Food Drug Administration from 2016 2021 demonstrated an increasing number that included artificial intelligence/machine learning (AI/ML). AI/ML was used perform a variety tasks, such as informing discovery/repurposing, enhancing clinical trial design elements, dose optimization, adherence regimen, end-point/biomarker assessment, postmarketing surveillance. is being increasingly explored facilitate development. Over...
In recent days, additive manufacturing (AM) plays a vital role in component compared to subtractive manufacturing. AM has wide advantage producing complex parts and revolutionizing logistics panorama worldwide. Many researchers this emerging methodology with the conventional found that it helps meeting demand, designing highly components, reducing wastage of materials, there are variety processes. The process making components full use technology several applications meet above is studied...
Because of its on-the-go nature, edge AI has gained popularity, allowing for realtime analytics by deploying artificial intelligence models onto devices. Despite the promise Edge evidenced existing research, there are still significant barriers to widespread adoption with issues such as scalability, energy efficiency, security, and reduced model explainability representing common challenges. Hence, while this paper solves in a number ways, real use case deployment, modular adaptability,...
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware software to manage the rest system. Crafting core such system way that achieves flexibility, security, performance requires careful balancing act. Simple static primitives with hard partitions space time are easier analyze formally, but strict approaches problem at level have been extremely restrictive, failing allow even simplest dynamic behaviors be expressed.
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for system's root of trust. We incorporate insights and techniques designing information-flow secure programming languages new perspective on hardware. describe description language, Caisson, combines domain-specific abstractions common with type-based used in languages. The proper combination these elements allows expressive,...
Microarchitectural resources such as caches and predictors can be used to leak information across security domains. Significant prior work has demonstrated attacks defenses for specific types of microarchitectural side covert channels. In this paper, we introduce a general mathematical study channels using theory. Our conceptual contribution is simple abstraction that captures the common characteristics all We call Bucket model it reveals are fundamentally different from in networking. then...
Abstract Supply chains are intended to become the essential part of this global competitive world as organizations seeking formulate strategized advantages. To put it differently, most companies aiming adopt new businesses and raise competition in market. For this, or choosing strategies such corporate social responsibility supply chain management that allow ensure financial strengthening. Moreover, stakeholders customers have raised their concerns towards with respect ensured act a socially...
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some niceties (such control media for entertainment, or supporting remote monitoring interface) while others absolutely critical safety mechanisms, maintaining secrecy root key). While special purpose languages, careful code reviews, automated theorem proving can be used help mitigate risk combining these operations onto single machine, it is difficult...
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for system's root of trust. We incorporate insights and techniques designing information-flow secure programming languages new perspective on hardware. describe description language, Caisson, combines domain-specific abstractions common with type-based used in languages. The proper combination these elements allows expressive,...
This article examines how Agile methodology and concepts are used to the delivery of artifical intelligence as well has transformed over time. Artificial Intelligence (AI) wide-ranging set technologies that can promise various benefits for company in terms off added business value customer satisfaction.In earlier times, organizations/companies increasingly turning technology order gain more following a deluge data strong increase computational capacity. is encouraging incorporation AI into...
Information flow tracking is an effective tool in computer security for detecting unintended information flows. However, software based implementations have drawbacks preciseness and performance. As a result, researchers begun to explore hardware, more specifically, understanding the interference of individual bits through logical functions. Such gate level (GLIFT) can track system at granularity bits. theoretical basis GLIFT, which essential its adoption real applications, has never been...
Flight control, banking, medical, and other high assurance systems have a strict requirement on correct operation. Fundamental to this is the enforcement of non-interference where particular subsystems should not affect one another. In an effort help guarantee policy, recent work has emerged with tracking information flows at hardware level. This article uses specific method known as gate-level flow (GLIFT) provide methodology for testing in two common bus protocols, I2C USB. We show that...
Key exchange protocols establish a secret key to confidentially communicate digital information over public channels. Lattice-based are promising alternative for next-generation applications due their quantum-cryptanalysis resistance and implementation efficiency. While these constructions rely on the theory of quantum-resistant lattice problems, practical implementations have shown vulnerability against side-channel attacks in context public-key encryption or signatures. Applying such is,...
We describe the first hardware implementation of a quantum-secure encryption scheme along with its low-cost power side-channel countermeasures. The uses an implementation-friendly Binary-Ring-Learning-with-Errors (B-RLWE) problem binary errors that can be efficiently generated in hardware. demonstrate direct B-RLWE exhibits vulnerability to attacks, even Simple Power Analysis, due nature coefficients. mitigate this redundant addition and memory update. To further protect against Differential...
Attacks often succeed by abusing the gap between program and machine-level semantics-- for example, locating a sensitive pointer, exploiting bug to overwrite this data, hijacking victim program's execution. In work, we take secure system design on offensive continuously obfuscating information that attackers need but normal programs do not use, such as representation of code pointers or exact location data. Our hardware architecture, Morpheus, combines two powerful protections: ensembles...