Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
End-to-end codesign of Hessian-aware quantized neural networks for FPGAs
- Javier Campos,
- Jovan Mitrevski,
- Nhan Tran,
- Zhen Dong,
- Amir Gholaminejad,
- Michael W. Mahoney,
- Javier Duarte
ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 17, Issue 3Article No.: 36, Pages 1–22https://doi.org/10.1145/3662000We develop an end-to-end workflow for the training and implementation of co-designed neural networks (NNs) for efficient field-programmable gate array (FPGA) hardware. Our approach leverages Hessian-aware quantization of NNs, the Quantized Open Neural ...
- research-articleJanuary 2024
ISP Agent: A Generalized In-storage-processing Workload Offloading Framework by Providing Multiple Optimization Opportunities
- Seokwon Kang,
- Jongbin Kim,
- Gyeongyong Lee,
- Jeongmyung Lee,
- Jiwon Seo,
- Hyungsoo Jung,
- Yong Ho Song,
- Yongjun Park
ACM Transactions on Architecture and Code Optimization (TACO), Volume 21, Issue 1Article No.: 11, Pages 1–24https://doi.org/10.1145/3632951As solid-state drives (SSDs) with sufficient computing power have recently become the dominant devices in modern computer systems, in-storage processing (ISP), which processes data within the storage without transferring it to the host memory, is being ...
- short-paperNovember 2023
Granular IoT Device Identification Using TF-IDF and Cosine Similarity
CPSIoTSec '23: Proceedings of the 5th Workshop on CPS&IoT Security and PrivacyNovember 2023, Pages 91–99https://doi.org/10.1145/3605758.3623492Internet of things (IoT) devices are becoming more prevalent in home environments and are shown to be generally insecure. There have been many previous studies looking to identify unknown IoT devices on networks. To truly secure a network however, there ...
- posterNovember 2023
Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2023, Pages 3564–3566https://doi.org/10.1145/3576915.3624373The supply of IoT devices is increasing year by year. Even in industries that demand sophistication, such as unmanned driving, construction, and robotics industry, IoT devices are being utilized. However, the security of IoT devices is lagging behind ...
Fuzzing Embedded Systems using Debug Interfaces
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisJuly 2023, Pages 1031–1042https://doi.org/10.1145/3597926.3598115Fuzzing embedded systems is hard. Their key components – microcontrollers – are highly diverse and cannot be easily virtualized; their software may not be changed or instrumented. However, we observe that many, if not most, microcontrollers feature a ...
-
- research-articleJuly 2023
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, Pages 401–414https://doi.org/10.1145/3579856.3582840Exponential growth in embedded systems is driving the research imperative to develop fuzzers to automate firmware testing to uncover software bugs and security vulnerabilities. But, employing fuzzing techniques in this context present a uniquely ...
FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware
ASPLOS '23: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4March 2023, Pages 138–152https://doi.org/10.1145/3623278.3624759Finding vulnerabilities in firmware is vital as any firmware vulnerability may lead to cyberattacks to the physical IoT devices. Taint analysis is one promising technique for finding firmware vulnerabilities thanks to its high coverage and scalability. ...
- research-articleNovember 2022
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2022, Pages 515–529https://doi.org/10.1145/3548606.3559338In this paper we present MetaEmu, an architecture-agnostic framework geared towards rehosting and security analysis of automotive firmware. MetaEmu improves over existing rehosting environments in two ways: Firstly, it solves the hitherto open-problem ...
- research-articleJune 2021
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityMay 2021, Pages 421–431https://doi.org/10.1145/3433210.3453685Assessing unpatched devices affected by a specified vulnerability is a vital but unsolved issue. Using a proof-of-concept tool on the Internet is illegal, while identifying vulnerable device models and firmware versions via fingerprints is a safer ...
Confidential computing for OpenPOWER
- Guerney D. H. Hunt,
- Ramachandra Pai,
- Michael V. Le,
- Hani Jamjoom,
- Sukadev Bhattiprolu,
- Rick Boivie,
- Laurent Dufour,
- Brad Frey,
- Mohit Kapur,
- Kenneth A. Goldman,
- Ryan Grimm,
- Janani Janakirman,
- John M. Ludden,
- Paul Mackerras,
- Cathy May,
- Elaine R. Palmer,
- Bharata Bhasker Rao,
- Lawrence Roy,
- William A. Starke,
- Jeff Stuecheli,
- Enriquillo Valdez,
- Wendel Voigt
EuroSys '21: Proceedings of the Sixteenth European Conference on Computer SystemsApril 2021, Pages 294–310https://doi.org/10.1145/3447786.3456243This paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted Execution Environment (TEE) for confidential computing on Power ISA. PEF enables protected secure virtual machines (SVMs). Like other TEEs, PEF verifies the SVM prior ...
- rfcApril 2021
RFC 9019: A Firmware Update Architecture for Internet of Things
Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing ...
- research-articleDecember 2020
Decentralized Firmware Attestation for In-Vehicle Networks
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 5, Issue 1Article No.: 7, Pages 1–23https://doi.org/10.1145/3418685Today’s vehicles are examples of Cyber-Physical Systems (CPS) controlled by a large number of electronic control units (ECUs), which manage everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these ...
- short-paperJuly 2021
Firmware Fuzzing: The State of the Art
Internetware '20: Proceedings of the 12th Asia-Pacific Symposium on InternetwareNovember 2020, Pages 110–115https://doi.org/10.1145/3457913.3457934Background: Firmware is the enable software of Internet of Things (IoT) devices, and its software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to the limited resources of IoT devices, it is impractical to deploy ...
- research-articleOctober 2021
Applying the Principle of Least Privilege to System Management Interrupt Handlers with the Intel SMI Transfer Monitor
HASP '20: Proceedings of the 9th International Workshop on Hardware and Architectural Support for Security and PrivacyOctober 2020, Article No.: 4, Pages 1–9https://doi.org/10.1145/3458903.3458907Recent years have seen a growing concern over System Management Mode (SMM) and its broad access to platform resources. The SMI Transfer Monitor (STM) is Intel’s most powerful executing CPU context. The STM is a firmware-based hypervisor that applies the ...
- research-articleSeptember 2020
RUCKUS: a cybersecurity engine for performing autonomous cyber-physical system vulnerability discovery at scale
HotSoS '20: Proceedings of the 7th Symposium on Hot Topics in the Science of SecuritySeptember 2020, Article No.: 4, Pages 1–10https://doi.org/10.1145/3384217.3385622In 2016, the Cyber Grand Challenge (CGC) provided key foundations and motivations for navigating towards an autonomous cybersecurity approach. Since that time, novel strides have been made in the areas of static analysis, vulnerability discovery, ...
- research-articleNovember 2020
UEFI firmware fuzzing with simics virtual platform
DAC '20: Proceedings of the 57th ACM/EDAC/IEEE Design Automation ConferenceJuly 2020, Article No.: 212, Pages 1–6This paper presents a fuzzing framework for Unified Extensible Firmware Interface (UEFI) BIOS with the Simics virtual platform. Firmware has increasingly become an attack target as operating systems are getting more and more secure. Due to its special ...
- research-articleNovember 2019
Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis
ASHES'19: Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security WorkshopNovember 2019, Pages 23–32https://doi.org/10.1145/3338508.3359571Physical attacks constitute a significant threat for any cryptosystem. Among them, Side-Channel Analysis (SCA) is a common practice to stress the security of embedded devices like smartcards or secure controllers. Nowadays, it has become more than ...
- research-articleJuly 2019
Decentralized Firmware Attestation for In-Vehicle Networks
CPSS '19: Proceedings of the 5th on Cyber-Physical System Security WorkshopJuly 2019, Pages 47–56https://doi.org/10.1145/3327961.3329529Today's vehicles are equipped with a large number of Electronic Control Units (ECUs), which control everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU ...
- research-articleJuly 2019
Indoor passive localisation based on reliable CSI extraction
IET Communications (CMU2), Volume 13, Issue 11Pages 1633–1642https://doi.org/10.1049/iet-com.2018.5037In indoor environment, passive human detection and localisation are important enabling technologies for elder healthcare, emergence rescue and target tracking applications. Recently, the fine‐grained channel state information (CSI) of Wi‐Fi was adopted ...
- research-articleJune 2019
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
MobiSys '19: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and ServicesJune 2019, Pages 79–90https://doi.org/10.1145/3307334.3326089Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol ...