Skip to main content

Showing 1–3 of 3 results for author: Sahoo, K S

Searching in archive cs. Search in all archives.
.
  1. FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN

    Authors: Ankur Mudgal, Abhishek Verma, Munesh Singh, Kshira Sagar Sahoo, Erik Elmroth, Monowar Bhuyan

    Abstract: Software Defined Networking (SDN) has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Ternary Content Addressable Memory (TCAM) for storing flow tables in OF switches introduces vulnerabilities, notably the Low-Rate Flow Table Overflow (LOFT) attacks.… ▽ More

    Submitted 19 October, 2024; originally announced October 2024.

    Comments: IEEE Transactions on Network and Service Management (2024)

  2. arXiv:2409.09210  [pdf, other

    cs.NE

    ORS: A novel Olive Ridley Survival inspired Meta-heuristic Optimization Algorithm

    Authors: Niranjan Panigrahi, Sourav Kumar Bhoi, Debasis Mohapatra, Rashmi Ranjan Sahoo, Kshira Sagar Sahoo, Anil Mohapatra

    Abstract: Meta-heuristic algorithmic development has been a thrust area of research since its inception. In this paper, a novel meta-heuristic optimization algorithm, Olive Ridley Survival (ORS), is proposed which is inspired from survival challenges faced by hatchlings of Olive Ridley sea turtle. A major fact about survival of Olive Ridley reveals that out of one thousand Olive Ridley hatchlings which emer… ▽ More

    Submitted 2 November, 2024; v1 submitted 13 September, 2024; originally announced September 2024.

  3. arXiv:2406.19091  [pdf, other

    cs.CR

    SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection

    Authors: Vijaypal Singh Rathor, Munesh Singh, Kshira Sagar Sahoo, Saraju P. Mohanty

    Abstract: Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats. The existing logic locking techniques are vulnerable to SAT-based attacks. However, several SAT-resistant logic locking methods are reported; they require sign… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 22 pages, 12 figures, Journal