Publications and Preprints
AttackonCTF: Defending Hardware Security Competition Benchmarks in the Age of LLMs
Mohamadreza Rostami, Nikhilesh Singh, Stephen Muttathil, Lichao Wu, Chen Chen, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
GoldenFuzz: Generative Golden Reference Hardware Fuzzing
Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi
AegisSat: Securing AI-Enabled SoC FPGA Satellite Platforms
Huimin Li, Vusal Novruzov, Nikhilesh Singh, Lichao Wu, Mohamadreza Rostami, Ahmad-Reza Sadeghi
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
Nikhilesh Singh, Chester Rebeiro.
SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
Kryptonite++: Localizing Program Interference on Multi-core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
Pallavi Borkar*, Chen Chen*, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan (JV) Rajendran
ProMiSE: Programmable Hardware Monitor for Secure Execution in Zero Trust Networks
Nikhilesh Singh*, Shagnik Pal*, Rainer Leupers, Farhad Merchant, Chester Rebeiro
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader
A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
RaDaR: A Real-World Dataset for AI Powered Run-time Detection of Cyber-Attacks
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
JUGAAD: Comprehensive Malware Behavior-as-a-Service
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
Timed Speculative Attacks exploiting Store-to-Load Forwarding bypassing Cache-based Countermeasures
Anirban Chakraborty*, Nikhilesh Singh*, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay (* equal contributors)
Secure Processor Architectures
Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler
Nikhilesh Singh, Chester Rebeiro
Patents
Method and Electronic Device for Mitigating Micro-architectural Side-channel Attack by Dynamic Resource Allocation
Nikhilesh Singh, Chester Rebeiro
System and Method for Malware Detection by Cross-Dimensional Behavioural Analysis
Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V.
System and Method of Estimating Realizable Maximum Runtime Interference on Multi-Core Platforms
Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro
Safety and Integrity Violation Detection System, Device and Method
Vinayak Honkote, Nikhilesh Singh, Rajesh Poornachandran
Talks
CROSSCON Project Final Review and Demonstration
Silence of the Chips: Advanced Techniques in Hardware Vulnerability Detection
CROSSCON Project Deliverable Presentation and Demonstration
Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
CROSSCON Project Deliverable Presentation
CROSSCON Project Deliverable Presentation
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Device Security Heartbeats in Zero Trust Networks
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures
Malware analysis using Hardware Performance Counters
Posters
Resource Contention in Microprocessors: Security Concerns and AI-based Responses
C-HERD: Centre for Hardware Security Entrepreneurship, Research, and Development
Estimating Worst-Case Program Interference on Multi-Core Embedded Systems using Reinforcement Learning
Cracking Open the Safe: Subverting Authentication in RFID Systems
On Hardware-assisted Online Malware Detection