Publications and Preprints
SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
Kryptonite++: Localizing Program Interference on Multi-core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Pallavi Borkar*, Chen Chen*, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan (JV) Rajendran
ProMiSE: Programmable Hardware Monitor for Secure Execution in Zero Trust Networks
Nikhilesh Singh*, Shagnik Pal*, Rainer Leupers, Farhad Merchant, Chester Rebeiro
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
RaDaR: A Real-World Dataset for AI Powered Run-time Detection of Cyber-Attacks
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
JUGAAD: Comprehensive Malware Behavior-as-a-Service
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
Timed Speculative Attacks exploiting Store-to-Load Forwarding bypassing Cache-based Countermeasures
Anirban Chakraborty*, Nikhilesh Singh*, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay (* equal contributors)
Secure Processor Architectures
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler
Nikhilesh Singh, Chester Rebeiro
Patents
Method and Electronic Device for Mitigating Micro-architectural Side-channel Attack by Dynamic Resource Allocation
Nikhilesh Singh, Chester Rebeiro
System and Method for Malware Detection by Cross-Dimensional Behavioural Analysis
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
System and Method of Estimating Realizable Maximum Runtime Interference on Multi-Core Platforms
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro
Safety and Integrity Violation Detection System, Device and Method
Vinayak Honkote, Nikhilesh Singh, Rajesh Poornachandran
Talks
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Device Security Heartbeats in Zero Trust Networks
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures
Malware analysis using Hardware Performance Counters
Posters
Resource Contention in Microprocessors: Security Concerns and AI-based Responses
C-HERD: Centre for Hardware Security Entrepreneurship, Research, and Development
Estimating Worst-Case Program Interference on Multi-Core Embedded Systems using Reinforcement Learning
Cracking Open the Safe: Subverting Authentication in RFID Systems
On Hardware-assisted Online Malware Detection