Nikhilesh Singh

Publications and Preprints


AttackonCTF: Defending Hardware Security Competition Benchmarks in the Age of LLMs
Mohamadreza Rostami, Nikhilesh Singh, Stephen Muttathil, Lichao Wu, Chen Chen, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi To appear in DAC, 2026

GoldenFuzz: Generative Golden Reference Hardware Fuzzing
Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi In NDSS, 2026 [paper]

AegisSat: Securing AI-Enabled SoC FPGA Satellite Platforms
Huimin Li, Vusal Novruzov, Nikhilesh Singh, Lichao Wu, Mohamadreza Rostami, Ahmad-Reza Sadeghi In Security for Space Systems (3S) Conference, Nov 2025 [paper]

Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
Nikhilesh Singh, Chester Rebeiro.
In Dependable Systems and Networks(DSN), June 2025 [preprint] [paper]

SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
In IEEE Transactions on Dependable and Secure Computing (TDSC), May 2024 [preprint]

Kryptonite++: Localizing Program Interference on Multi-core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
In ERTS Congress, 2024

WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Pallavi Borkar*, Chen Chen*, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan (JV) Rajendran
In Usenix Security Symposium, 2024 [preprint]

ProMiSE: Programmable Hardware Monitor for Secure Execution in Zero Trust Networks
Nikhilesh Singh*, Shagnik Pal*, Rainer Leupers, Farhad Merchant, Chester Rebeiro
In IEEE Embedded Systems Letters, Jan 2024

Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
In ACM Trans. Embed. Comput. Syst. (TECS), Vol. 22, No. 5s (EMSOFT'23), Sep 2023

A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
[preprint] May 2023

RaDaR: A Real-World Dataset for AI Powered Run-time Detection of Cyber-Attacks
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
In 31st ACM Inernational Conference on Informantion and Knowledge Management (CIKM), Oct 2022

JUGAAD: Comprehensive Malware Behavior-as-a-Service
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
In CSET@Usenix Security Symposium, Aug 2022

Timed Speculative Attacks exploiting Store-to-Load Forwarding bypassing Cache-based Countermeasures
Anirban Chakraborty*, Nikhilesh Singh*, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay (* equal contributors)
In 59th Design Automation Conference (DAC), June 2022 [code]

Secure Processor Architectures
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
In Handbook of Computer Architecture, Springer Singapore, Apr 2022

LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler
Nikhilesh Singh, Chester Rebeiro
[preprint] Sep 2021


Patents


Method and Electronic Device for Mitigating Micro-architectural Side-channel Attack by Dynamic Resource Allocation
Nikhilesh Singh, Chester Rebeiro
IN Patent 495535, Published 2021, Granted Jan 2024

System and Method for Malware Detection by Cross-Dimensional Behavioural Analysis
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
IN Patent 452897, Published 2022, Granted 2023

System and Method of Estimating Realizable Maximum Runtime Interference on Multi-Core Platforms
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro
IN Patent 551973, Published 2023, Granted 2024

Safety and Integrity Violation Detection System, Device and Method
Vinayak Honkote, Nikhilesh Singh, Rajesh Poornachandran
US Patent Application (Intel Labs), Published 2022


Talks


CROSSCON Project Final Review and Demonstration
CROSSCON Final Review, Virtual Event, Dec 2025

Silence of the Chips: Advanced Techniques in Hardware Vulnerability Detection
ICCAD Tutorial, Munich, Germany, Oct 2025

CROSSCON Project Deliverable Presentation and Demonstration
CROSSCON General Assembly, Wurzburg, Germany, Oct 2025

Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
DSN, Naples, Italy, July 2025

CROSSCON Project Deliverable Presentation
CROSSCON General Assembly, Budapest, Hungary, June 2025s

CROSSCON Project Deliverable Presentation
CROSSCON General Assembly, Madrid, Spain, Mar 2025

Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
CASA, Ruhr-Universität Bochum, Germany, Sep 2023

Device Security Heartbeats in Zero Trust Networks
Topics in hArdware SEcurity and RISC-V (TASER)@CHES, Prague, Czech Republic, Sep 2023

Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
International Conference on Embedded Software (EMSOFT), Hamburg, Germany, Sep 2023

Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures
59th Design Automation Conference (DAC) (virtual presenter), Jun 2022

Malware analysis using Hardware Performance Counters
ISEA Research Meet, Chennai, India, 2018


Posters


Resource Contention in Microprocessors: Security Concerns and AI-based Responses
Ph.D. Forum ESWEEK, Sep 2023

C-HERD: Centre for Hardware Security Entrepreneurship, Research, and Development
SemiconIndia, MeiTy, Govt. of India, Jul 2023

Estimating Worst-Case Program Interference on Multi-Core Embedded Systems using Reinforcement Learning
Robert Bosch Centre for DS and AI Annual Research Showcase [First Prize] , Apr 2023

Cracking Open the Safe: Subverting Authentication in RFID Systems
CSAW, IIT Kanpur, Nov 2019

On Hardware-assisted Online Malware Detection
MAST, IIT Madras, Sep 2018