Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Jayasena, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.08132  [pdf, other

    cs.CR

    Information Leakage through Physical Layer Supply Voltage Coupling Vulnerability

    Authors: Sahan Sanjaya, Aruna Jayasena, Prabhat Mishra

    Abstract: Side-channel attacks exploit variations in non-functional behaviors to expose sensitive information across security boundaries. Existing methods leverage side-channels based on power consumption, electromagnetic radiation, silicon substrate coupling, and channels created by malicious implants. Power-based side-channel attacks are widely known for extracting information from data processed within a… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  2. arXiv:2309.15067  [pdf, other

    cs.CR cs.AR

    Logic Locking based Trojans: A Friend Turns Foe

    Authors: Yuntao Liu, Aruna Jayasena, Prabhat Mishra, Ankur Srivastava

    Abstract: Logic locking and hardware Trojans are two fields in hardware security that have been mostly developed independently from each other. In this paper, we identify the relationship between these two fields. We find that a common structure that exists in many logic locking techniques has desirable properties of hardware Trojans (HWT). We then construct a novel type of HWT, called Trojans based on Logi… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 9 pages, double column, 8 figures, IEEE format

  3. HIVE: Scalable Hardware-Firmware Co-Verification using Scenario-based Decomposition and Automated Hint Extraction

    Authors: Aruna Jayasena, Prabhat Mishra

    Abstract: Hardware-firmware co-verification is critical to design trustworthy systems. While formal methods can provide verification guarantees, due to the complexity of firmware and hardware, it can lead to state space explosion. There are promising avenues to reduce the state space during firmware verification through manual abstraction of hardware or manual generation of hints. Manual development of abst… ▽ More

    Submitted 16 April, 2024; v1 submitted 14 September, 2023; originally announced September 2023.

    Comments: in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024

  4. Sequence-Based Incremental Concolic Testing of RTL Models

    Authors: Hasini Witharana, Aruna Jayasena, Prabhat Mishra

    Abstract: Concolic testing is a scalable solution for automated generation of directed tests for validation of hardware designs. Unfortunately, concolic testing also fails to cover complex corner cases such as hard-to-activate branches. In this paper, we propose an incremental concolic testing technique to cover hard-to-activate branches in register-transfer level models. We show that a complex branch condi… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    ACM Class: B.5.3

    Journal ref: ACM Transactions on Design Automation of Electronic Systems, 2024

  5. Design for Trust utilizing Rareness Reduction

    Authors: Aruna Jayasena, Prabhat Mishra

    Abstract: Increasing design complexity and reduced time-to-market have motivated manufacturers to outsource some parts of the System-on-Chip (SoC) design flow to third-party vendors. This provides an opportunity for attackers to introduce hardware Trojans by constructing stealthy triggers consisting of rare events (e.g., rare signals, states, and transitions). There are promising test generation-based hardw… ▽ More

    Submitted 16 April, 2024; v1 submitted 17 February, 2023; originally announced February 2023.

    Comments: 37th International Conference on VLSI Design, 2024