Mohit Tiwari

ORCID: 0000-0003-1836-3451
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Internet of Things and AI
  • IoT and Edge/Fog Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cloud Data Security Solutions
  • Smart Systems and Machine Learning
  • Smart Grid Security and Resilience
  • Cryptographic Implementations and Security
  • Software System Performance and Reliability
  • Artificial Intelligence in Healthcare
  • Energy Efficient Wireless Sensor Networks
  • Cryptography and Data Security
  • IoT-based Smart Home Systems
  • Advanced Memory and Neural Computing
  • Machine Learning and Data Classification
  • Brain Tumor Detection and Classification
  • Anomaly Detection Techniques and Applications
  • Smart Agriculture and AI
  • COVID-19 diagnosis using AI
  • Cloud Computing and Resource Management
  • Information and Cyber Security
  • Distributed systems and fault tolerance

Bharati Vidyapeeth Deemed University
2016-2025

The University of Texas at Austin
2014-2024

Stanford University
2020-2024

Vivekananda Global University
2023-2024

Institute of Electrical and Electronics Engineers
2014-2023

Center for Drug Evaluation and Research
2022-2023

United States Food and Drug Administration
2022-2023

Engineering Systems (United States)
2020-2023

University of Memphis
2020-2023

Antea Group (France)
2023

We introduce PHANTOM [1] a new secure processor that obfuscates its memory access trace. To an adversary who can observe the processor's output pins, all traces are computationally indistinguishable (a property known as obliviousness). achieve obliviousness through cryptographic construct Oblivious RAM or ORAM. first improve existing ORAM algorithm and empirical model for trusted storage requirement. then present PHANTOM, oblivious whose novel controller aggressively exploits DRAM bank...

10.1145/2508859.2516692 article EN 2013-01-01

For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We present a novel architecture capable tracking all within machine, including explicit data transfers and implicit flows (those subtly devious caused by not performing conditional operations). While problem is impossible to solve in general case, we have created machine that avoids general-purpose programmability...

10.1145/1508244.1508258 article EN 2009-03-07

This paper presents a new, co-designed compiler and architecture called GhostRider for supporting privacy preserving computation in the cloud. ensures all programs satisfy property memory-trace obliviousness (MTO): Even an adversary that observes memory, bus traffic, access times while program executes can learn nothing about program's sensitive inputs outputs. One way to achieve MTO is employ Oblivious RAM (ORAM), allocating code data single ORAM bank, also disable caches or fix rate of...

10.1145/2694344.2694385 article EN 2015-03-03

Privacy and integrity are important security concerns. These concerns addressed by controlling information flow, i.e., restricting how can flow through a system. Most proposed systems that restrict make the implicit assumption hardware used system is fully ``correct'' hardware's instruction set accurately describes its behavior in all circumstances. The truth more complicated: modern designs defy complete verification; many aspects of timing ordering events left totally unspecified;...

10.1145/2541940.2541947 article EN 2014-02-24

An analysis of regulatory submissions drug and biological products to the US Food Drug Administration from 2016 2021 demonstrated an increasing number that included artificial intelligence/machine learning (AI/ML). AI/ML was used perform a variety tasks, such as informing discovery/repurposing, enhancing clinical trial design elements, dose optimization, adherence regimen, end-point/biomarker assessment, postmarketing surveillance. is being increasingly explored facilitate development. Over...

10.1002/cpt.2668 article EN cc-by-nc Clinical Pharmacology & Therapeutics 2022-06-16

In recent days, additive manufacturing (AM) plays a vital role in component compared to subtractive manufacturing. AM has wide advantage producing complex parts and revolutionizing logistics panorama worldwide. Many researchers this emerging methodology with the conventional found that it helps meeting demand, designing highly components, reducing wastage of materials, there are variety processes. The process making components full use technology several applications meet above is studied...

10.1155/2022/6892641 article EN cc-by Advances in Materials Science and Engineering 2022-04-15

Because of its on-the-go nature, edge AI has gained popularity, allowing for realtime analytics by deploying artificial intelligence models onto devices. Despite the promise Edge evidenced existing research, there are still significant barriers to widespread adoption with issues such as scalability, energy efficiency, security, and reduced model explainability representing common challenges. Hence, while this paper solves in a number ways, real use case deployment, modular adaptability,...

10.1051/itmconf/20257601009 article EN cc-by ITM Web of Conferences 2025-01-01

High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware software to manage the rest system. Crafting core such system way that achieves flexibility, security, performance requires careful balancing act. Simple static primitives with hard partitions space time are easier analyze formally, but strict approaches problem at level have been extremely restrictive, failing allow even simplest dynamic behaviors be expressed.

10.1145/2000064.2000087 article EN 2011-06-04

Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for system's root of trust. We incorporate insights and techniques designing information-flow secure programming languages new perspective on hardware. describe description language, Caisson, combines domain-specific abstractions common with type-based used in languages. The proper combination these elements allows expressive,...

10.1145/1993316.1993512 article EN ACM SIGPLAN Notices 2011-06-04

Microarchitectural resources such as caches and predictors can be used to leak information across security domains. Significant prior work has demonstrated attacks defenses for specific types of microarchitectural side covert channels. In this paper, we introduce a general mathematical study channels using theory. Our conceptual contribution is simple abstraction that captures the common characteristics all We call Bucket model it reveals are fundamentally different from in networking. then...

10.1109/hpca.2015.7056069 article EN 2015-02-01

Abstract Supply chains are intended to become the essential part of this global competitive world as organizations seeking formulate strategized advantages. To put it differently, most companies aiming adopt new businesses and raise competition in market. For this, or choosing strategies such corporate social responsibility supply chain management that allow ensure financial strengthening. Moreover, stakeholders customers have raised their concerns towards with respect ensured act a socially...

10.1002/ijfe.2483 article EN International Journal of Finance & Economics 2021-02-10

High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some niceties (such control media for entertainment, or supporting remote monitoring interface) while others absolutely critical safety mechanisms, maintaining secrecy root key). While special purpose languages, careful code reviews, automated theorem proving can be used help mitigate risk combining these operations onto single machine, it is difficult...

10.1145/1669112.1669174 article EN 2009-12-12

Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for system's root of trust. We incorporate insights and techniques designing information-flow secure programming languages new perspective on hardware. describe description language, Caisson, combines domain-specific abstractions common with type-based used in languages. The proper combination these elements allows expressive,...

10.1145/1993498.1993512 article EN 2011-06-04

This article examines how Agile methodology and concepts are used to the delivery of artifical intelligence as well has transformed over time. Artificial Intelligence (AI) wide-ranging set technologies that can promise various benefits for company in terms off added business value customer satisfaction.In earlier times, organizations/companies increasingly turning technology order gain more following a deluge data strong increase computational capacity. is encouraging incorporation AI into...

10.1109/ic3i56241.2022.10073410 article EN 2022-12-14

Information flow tracking is an effective tool in computer security for detecting unintended information flows. However, software based implementations have drawbacks preciseness and performance. As a result, researchers begun to explore hardware, more specifically, understanding the interference of individual bits through logical functions. Such gate level (GLIFT) can track system at granularity bits. theoretical basis GLIFT, which essential its adoption real applications, has never been...

10.1109/tcad.2011.2120970 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2011-07-13

Flight control, banking, medical, and other high assurance systems have a strict requirement on correct operation. Fundamental to this is the enforcement of non-interference where particular subsystems should not affect one another. In an effort help guarantee policy, recent work has emerged with tracking information flows at hardware level. This article uses specific method known as gate-level flow (GLIFT) provide methodology for testing in two common bus protocols, I2C USB. We show that...

10.1145/2024724.2024782 article EN Proceedings of the 34th Design Automation Conference 2011-06-05

Key exchange protocols establish a secret key to confidentially communicate digital information over public channels. Lattice-based are promising alternative for next-generation applications due their quantum-cryptanalysis resistance and implementation efficiency. While these constructions rely on the theory of quantum-resistant lattice problems, practical implementations have shown vulnerability against side-channel attacks in context public-key encryption or signatures. Applying such is,...

10.1109/hst.2018.8383894 article EN 2018-04-01

We describe the first hardware implementation of a quantum-secure encryption scheme along with its low-cost power side-channel countermeasures. The uses an implementation-friendly Binary-Ring-Learning-with-Errors (B-RLWE) problem binary errors that can be efficiently generated in hardware. demonstrate direct B-RLWE exhibits vulnerability to attacks, even Simple Power Analysis, due nature coefficients. mitigate this redundant addition and memory update. To further protect against Differential...

10.23919/date.2018.8342207 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2018-03-01

Attacks often succeed by abusing the gap between program and machine-level semantics-- for example, locating a sensitive pointer, exploiting bug to overwrite this data, hijacking victim program's execution. In work, we take secure system design on offensive continuously obfuscating information that attackers need but normal programs do not use, such as representation of code pointers or exact location data. Our hardware architecture, Morpheus, combines two powerful protections: ensembles...

10.1145/3297858.3304037 article EN 2019-04-04
Coming Soon ...