Imitating functional operations for mitigating side-channel leakage

A Dhavlle, S Rafatirad, K Khasawneh… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Inspired by the idiom,“Mitigation (prevention) is better than cure!”, this work presents a
random yet cognitive side-channel mitigation technique that is independent of underlying …

Design of secure and robust cognitive system for malware detection

S Shukla - arXiv preprint arXiv:2208.02310, 2022 - arxiv.org
Machine learning based malware detection techniques rely on grayscale images of malware
and tends to classify malware based on the distribution of textures in graycale images. Albeit …

A novel malware detection mechanism based on features extracted from converted malware binary images

A Dhavlle, S Shukla - arXiv preprint arXiv:2104.06652, 2021 - arxiv.org
Our computer systems for decades have been threatened by various types of hardware and
software attacks of which Malwares have been one of them. This malware has the ability to …

Reverse Engineering of Integrated Circuits: Tools and Techniques

A Dhavlle - arXiv preprint arXiv:2208.08689, 2022 - arxiv.org
Consumer and defense systems demanded design and manufacturing of electronics with
increased performance, compared to their predecessors. As such systems became …

Power swapper: Approximate functional block assisted cryptosystem security

A Dhavlle, S Rafatirad, H Homayoun… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
The hardware security domain in the recent years has experienced a plethora of threats of
which side-channel attacks (SCAs) has been one of the emerging threats. These SCAs …

Securing the Hardware System Stack

A Dhavlle - 2022 - search.proquest.com
Computing systems have come a long way concerning speed, performance, optimization,
and security. The state-of-the-art designs are deployed in the real world, targeting a variety …

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

A Dhavlle - arXiv preprint arXiv:2104.04054, 2021 - arxiv.org
Evolving attacks on the vulnerabilities of the computing systems demand novel defense
strategies to keep pace with newer attacks. This report discusses previous works on side …