Skip to main content

Showing 1–3 of 3 results for author: Minwalla, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17795  [pdf, ps, other

    cs.CR

    A TRNG Implemented using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture

    Authors: Rachel Cazzola, Cyrus Minwalla, Calvin Chan, Jim Plusquellic

    Abstract: Hardware security primitives including True Random Number Generators (TRNG) and Physical Unclonable Functions (PUFs) are central components to establishing a root of trust in microelectronic systems. In this paper, we propose a unified PUF-TRNG architecture that leverages a combination of the static entropy available in a strong PUF called the shift-register, reconvergent-fanout (SiRF) PUF, and th… ▽ More

    Submitted 21 June, 2025; originally announced June 2025.

  2. arXiv:2504.05509  [pdf, other

    cs.CR cs.SE

    Secure Smart Contract with Control Flow Integrity

    Authors: Zhiyang Chen, Sidi Mohamed Beillahi, Pasha Barahimi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long

    Abstract: Smart contracts power decentralized financial (DeFi) services but are vulnerable to complex security exploits that can lead to significant financial losses. Existing security measures often fail to adequately protect these contracts due to the composability of DeFi protocols and the increasing sophistication of attacks. Through a large-scale empirical study of historical transactions from the 30 h… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

    Comments: 11 pages, 2 figures, 3 tables

  3. arXiv:2401.06044  [pdf, other

    cs.SE

    Safeguarding DeFi Smart Contracts against Oracle Deviations

    Authors: Xun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas Veneris, Fan Long

    Abstract: This paper presents OVer, a framework designed to automatically analyze the behavior of decentralized finance (DeFi) protocols when subjected to a "skewed" oracle input. OVer firstly performs symbolic analysis on the given contract and constructs a model of constraints. Then, the framework leverages an SMT solver to identify parameters that allow its secure operation. Furthermore, guard statements… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 13 pages; extended version of paper accepted in ICSE'24

    ACM Class: D.2.4