Skip to main content

Showing 1–6 of 6 results for author: Haider, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:1804.04783  [pdf, ps, other

    cs.CR

    Comments on "Defeating HaTCh: Building Malicious IP Cores"

    Authors: Syed Kamran Haider, Chenglu Jin, Marten van Dijk

    Abstract: Recently, Haider et al. introduced the first rigorous hardware Trojan detection algorithm called HaTCh. The foundation of HaTCh is a formal framework of hardware Trojan design, which formally characterizes all the hardware Trojans based on its properties. However, Bhardwaj et al. recently published one paper "Defeating HaTCh: Building Malicious IP Cores", which incorrectly claims that their newly… ▽ More

    Submitted 4 October, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

  2. arXiv:1804.00947  [pdf, other

    cs.DC

    The Transactional Conflict Problem

    Authors: Dan Alistarh, Syed Kamran Haider, Raphael Kübler, Giorgi Nadiradze

    Abstract: The transactional conflict problem arises in transactional systems whenever two or more concurrent transactions clash on a data item. While the standard solution to such conflicts is to immediately abort one of the transactions, some practical systems consider the alternative of delaying conflict resolution for a short interval, which may allow one of the transactions to commit. The challenge in… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

  3. arXiv:1706.03852  [pdf, other

    cs.CR

    Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations

    Authors: Syed Kamran Haider, Omer Khan, Marten van Dijk

    Abstract: Oblivious RAM (ORAM) is a renowned technique to hide the access patterns of an application to an untrusted memory. According to the standard ORAM definition presented by Goldreich and Ostrovsky, two ORAM access sequences must be computationally indistinguishable if the lengths of these sequences are identically distributed. An artifact of this definition is that it does not apply to modern ORAM im… ▽ More

    Submitted 21 October, 2017; v1 submitted 12 June, 2017; originally announced June 2017.

  4. arXiv:1702.03965  [pdf, other

    cs.CR

    Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory

    Authors: Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk

    Abstract: Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patt… ▽ More

    Submitted 17 June, 2017; v1 submitted 13 February, 2017; originally announced February 2017.

    Comments: A 250 word preliminary abstract of this work has been accepted for publication and a poster presentation at Hardware Oriented Security and Trust (HOST) 2017. Added Section 5: Leakage under Caching Effects

  5. arXiv:1611.01571  [pdf, other

    cs.AR cs.CR

    Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors

    Authors: Syed Kamran Haider, Marten van Dijk

    Abstract: Oblivious RAM (ORAM) is a cryptographic primitive which obfuscates the access patterns to a storage thereby preventing privacy leakage. So far in the current literature, only `fully functional' ORAMs are widely studied which can protect, at a cost of considerable performance penalty, against the strong adversaries who can monitor all read and write operations. However, recent research has shown th… ▽ More

    Submitted 10 September, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

  6. arXiv:1605.08413  [pdf, other

    cs.CR

    Advancing the State-of-the-Art in Hardware Trojans Design

    Authors: Syed Kamran Haider, Chenglu Jin, Marten van Dijk

    Abstract: Electronic Design Automation (EDA) industry heavily reuses third party IP cores. These IP cores are vulnerable to insertion of Hardware Trojans (HTs) at design time by third party IP core providers or by malicious insiders in the design team. State of the art research has shown that existing HT detection techniques, which claim to detect all publicly available HT benchmarks, can still be defeated… ▽ More

    Submitted 12 April, 2017; v1 submitted 26 May, 2016; originally announced May 2016.

    Comments: Updated Definition 10. Invited to 60th IEEE International Midwest Symposium on Circuits and Systems