Skip to main content

Showing 1–12 of 12 results for author: Monfared, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19418  [pdf, other

    cs.CR cs.AR

    ChipletQuake: On-die Digital Impedance Sensing for Chiplet and Interposer Verification

    Authors: Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik

    Abstract: The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller and modular chiplets are integrated onto a single interposer. While chiplet architectures offer significant advantages, such as improved yields, design flexibility, and cost efficiency, they introduce new security challenges in the horizontal hardw… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.

  2. arXiv:2504.11633  [pdf, ps, other

    cs.CR

    Chypnosis: Undervolting-based Static Side-channel Attacks

    Authors: Kyle Mitard, Saleh Khalaj Monfared, Fatemeh Khojasteh Dana, Robert Dumitru, Yuval Yarom, Shahin Tajik

    Abstract: Static side-channel analysis attacks, which rely on a stopped clock to extract sensitive information, pose a growing threat to embedded systems' security. To protect against such attacks, several proposed defenses aim to detect unexpected variations in the clock signal and clear sensitive states. In this work, we present \emph{Chypnosis}, an undervolting attack technique that indirectly stops the… ▽ More

    Submitted 29 September, 2025; v1 submitted 15 April, 2025; originally announced April 2025.

  3. arXiv:2501.13894  [pdf, other

    cs.CR

    Logical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in Space

    Authors: Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, Shahin Tajik

    Abstract: Satellites are highly vulnerable to adversarial glitches or high-energy radiation in space, which could cause faults on the onboard computer. Various radiation- and fault-tolerant methods, such as error correction codes (ECC) and redundancy-based approaches, have been explored over the last decades to mitigate temporary soft errors on software and hardware. However, conventional ECC methods fail t… ▽ More

    Submitted 10 February, 2025; v1 submitted 23 January, 2025; originally announced January 2025.

    Comments: 9 pages, 10 figures, Workshop on the Security of Space and Satellite Systems

  4. arXiv:2405.03632  [pdf, other

    cs.CR

    LaserEscape: Detecting and Mitigating Optical Probing Attacks

    Authors: Saleh Khalaj Monfared, Kyle Mitard, Andrew Cannon, Domenic Forte, Shahin Tajik

    Abstract: The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even with limited knowledge of the IC under attack. Unfortunately, few countermeasures are proposed in the literature, and none has been fabricated and tes… ▽ More

    Submitted 30 August, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  5. arXiv:2405.00298  [pdf, other

    cs.CR

    The Reversing Machine: Reconstructing Memory Assumptions

    Authors: Mohammad Sina Karvandi, Soroush Meghdadizanjani, Sima Arasteh, Saleh Khalaj Monfared, Mohammad K. Fallah, Saeid Gorgin, Jeong-A Lee, Erik van der Kouwe

    Abstract: Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can bypass OS-level anti-virus mechanisms easily. Although static analysis of such malware is possible, obfuscation and packing techniques complicate offline analysis. Moreover, current dynamic analyzers suffe… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  6. arXiv:2401.08925  [pdf, other

    cs.CR

    RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations

    Authors: Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik

    Abstract: Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate them. However, as demonstrated recently, these mitiga… ▽ More

    Submitted 30 August, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

  7. arXiv:2310.07014  [pdf, other

    cs.CR

    LeakyOhm: Secret Bits Extraction using Impedance Analysis

    Authors: Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik

    Abstract: The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physica… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 May, 2023; originally announced October 2023.

  8. arXiv:2207.05676  [pdf, other

    cs.CR cs.AR cs.OS

    HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)

    Authors: Mohammad Sina Karvandi, MohammadHossein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadizanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz

    Abstract: Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address a transparent, effective, and high-performance low-level debugger due to their detectable fingerprints, complexity, and implementation restrictions. In this pape… ▽ More

    Submitted 2 September, 2022; v1 submitted 29 May, 2022; originally announced July 2022.

  9. arXiv:2005.14156  [pdf, other

    cs.AI cs.RO

    Unlucky Explorer: A Complete non-Overlapping Map Exploration

    Authors: Mohammad Sina Kiarostami, Saleh Khalaj Monfared, Mohammadreza Daneshvaramoli, Ali Oliayi, Negar Yousefian, Dara Rahmati, Saeid Gorgin

    Abstract: Nowadays, the field of Artificial Intelligence in Computer Games (AI in Games) is going to be more alluring since computer games challenge many aspects of AI with a wide range of problems, particularly general problems. One of these kinds of problems is Exploration, which states that an unknown environment must be explored by one or several agents. In this work, we have first introduced the Maze D… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  10. arXiv:2005.10333  [pdf, other

    cs.CR cs.AR cs.OS

    A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel

    Authors: Mohammad Sina Karvandi, Saleh Khalaj Monfared, Mohammad Sina Kiarostami, Dara Rahmati, Saeid Gorgin

    Abstract: Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Randomization (ASLR) and Kernel ASLR(KASLR). They play pronounced roles when the security of sandboxed applications such as Web-browser are considered.Armed with arb… ▽ More

    Submitted 22 April, 2021; v1 submitted 20 May, 2020; originally announced May 2020.

  11. arXiv:1910.12062  [pdf, other

    cs.MA

    Decentralized Cooperative Communication-less Multi-Agent Task Assignment with Monte-Carlo Tree Search

    Authors: Mohammadreza Daneshvaramoli, Mohammad Sina Kiarostami, Saleh Khalaj Monfared, Helia Karisani, Hamed Khashehchi, Dara Rahmati, Saeid Gorgin, Amir Rahmati

    Abstract: Cooperative task assignment is an important subject in multi-agent systems with a wide range of applications. These systems are usually designed with massive communication among the agents to minimize the error in pursuit of the general goal of the entire system. In this work, we propose a novel approach for Decentralized Cooperative Communication-less Multi-Agent Task Assignment (DCCMATA) employi… ▽ More

    Submitted 23 February, 2020; v1 submitted 26 October, 2019; originally announced October 2019.

  12. arXiv:1909.04750  [pdf, other

    cs.CR

    Generating High Quality Random Numbers: A High Throughput Parallel Bitsliced Approach

    Authors: Saleh Khalaj Monfared, Omid Hajihassani, Soroush Meghdadi Zanjani, Mohammadsina Kiarostami, Dara Rahmati, Saeid Gorgin

    Abstract: In this work, by employing a bitsliced data representation as building blocks of algorithms, we showcase the capability and scalability of our proposed method in a variety of PRNG methods in the category of block and stream ciphers. While demonstrating the suitability of stream-ciphers for high throughput PRNG, as an example, we implement and investigate a bitsliced MICKEY 2.0 PRNG by altering the… ▽ More

    Submitted 20 October, 2019; v1 submitted 10 September, 2019; originally announced September 2019.

    Comments: 10 pages