Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Bahar, S

Searching in archive cs. Search in all archives.
.
  1. Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

    Authors: Serhan W. Bahar

    Abstract: Cybersecurity threats and vulnerabilities continue to grow in number and complexity, presenting an increasing challenge for organizations worldwide. Organizations use threat modelling and bug bounty programs to address these threats, which often operate independently. In this paper, we propose a Metric-Based Feedback Methodology (MBFM) that integrates bug bounty programs with threat modelling to i… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  2. arXiv:2107.09199  [pdf, other

    cs.CR

    A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips

    Authors: B. M. S. Bahar Talukder, Farah Ferdaus, Md Tauhidur Rahman

    Abstract: Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a… ▽ More

    Submitted 5 May, 2023; v1 submitted 19 July, 2021; originally announced July 2021.

    Journal ref: ACM Journal on Emerging Technologies in Computing Systems, 2023

  3. arXiv:2104.08200  [pdf, other

    cs.CL

    IndoNLG: Benchmark and Resources for Evaluating Indonesian Natural Language Generation

    Authors: Samuel Cahyawijaya, Genta Indra Winata, Bryan Wilie, Karissa Vincentio, Xiaohong Li, Adhiguna Kuncoro, Sebastian Ruder, Zhi Yuan Lim, Syafri Bahar, Masayu Leylia Khodra, Ayu Purwarianti, Pascale Fung

    Abstract: Natural language generation (NLG) benchmarks provide an important avenue to measure progress and develop better NLG systems. Unfortunately, the lack of publicly available NLG benchmarks for low-resource languages poses a challenging barrier for building NLG systems that work well for languages with limited amounts of data. Here we introduce IndoNLG, the first benchmark to measure natural language… ▽ More

    Submitted 9 October, 2021; v1 submitted 16 April, 2021; originally announced April 2021.

    Comments: Accepted in EMNLP 2021, 10 pages

  4. arXiv:2009.05387  [pdf, other

    cs.CL

    IndoNLU: Benchmark and Resources for Evaluating Indonesian Natural Language Understanding

    Authors: Bryan Wilie, Karissa Vincentio, Genta Indra Winata, Samuel Cahyawijaya, Xiaohong Li, Zhi Yuan Lim, Sidik Soleman, Rahmad Mahendra, Pascale Fung, Syafri Bahar, Ayu Purwarianti

    Abstract: Although Indonesian is known to be the fourth most frequently used language over the internet, the research progress on this language in the natural language processing (NLP) is slow-moving due to a lack of available resources. In response, we introduce the first-ever vast resource for the training, evaluating, and benchmarking on Indonesian natural language understanding (IndoNLU) tasks. IndoNLU… ▽ More

    Submitted 8 October, 2020; v1 submitted 11 September, 2020; originally announced September 2020.

    Comments: This paper will be presented in AACL-IJCNLP 2020 (with new results and acknowledgment)

  5. Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin

    Authors: B. M. S. Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt Neal, Md Tauhidur Rahman

    Abstract: Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor performance, and shorter life span. Besides, studies sugg… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

    Journal ref: IEEE Hardware-Oriented Security and Trust Symposium (HOST), 2020

  6. PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures

    Authors: B. M. S. Bahar Talukder, Biswajit Ray, Domenic Forte, Md Tauhidur Rahman

    Abstract: Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data),… ▽ More

    Submitted 31 July, 2019; v1 submitted 7 August, 2018; originally announced August 2018.

    Journal ref: IEEE Access, vol. 7, pp. 81106-81120, 2019

  7. Exploiting DRAM Latency Variations for Generating True Random Numbers

    Authors: B. M. S. Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas Morris, Md Tauhidur Rahman

    Abstract: True random number generator (TRNG) plays a vital role in a variety of security applications and protocols. The security and privacy of an asset rely on the encryption, which solely depends on the quality of random numbers. Memory chips are widely used for generating random numbers because of their prevalence in modern electronic systems. Unfortunately, existing Dynamic Random-access Memory (DRAM)… ▽ More

    Submitted 7 November, 2018; v1 submitted 6 August, 2018; originally announced August 2018.