Search Results - "Khattri, Hareesh"
-
1
Verifying information flow properties of firmware using symbolic execution
Published in 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2016)“…Verifying security requirements of the firmware in contemporary system-on-chip (SoC) designs is a critical challenge. There are two main difficulties in…”
Get full text
Conference Proceeding Journal Article -
2
Multiple-output low-power linear feedback shift register design
Published in IEEE transactions on circuits and systems. I, Regular papers (01-07-2006)“…In this paper, we present a new low-power architecture for linear feedback shift registers (LFSRs) that produces the output of several clock cycles of a serial…”
Get full text
Journal Article -
3
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Published 01-12-2018“…In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect…”
Get full text
Journal Article -
4
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
Published 05-09-2017“…This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers…”
Get full text
Journal Article -
5
HSDL: A Security Development Lifecycle for hardware technologies
Published in 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (01-06-2012)“…Security assurance is a rapidly evolving but well understood discipline in the software industry. Many firms have adopted the Security Development Lifecycle as…”
Get full text
Conference Proceeding