Abstract—The main focus of modern cryptanalysis is on break-ing the implementation of cryptograph... more Abstract—The main focus of modern cryptanalysis is on break-ing the implementation of cryptographic algorithms as opposed to traditional attacks which primarily target on mathematically breaking the algorithms. For over the last decade these new trend of attacks, Side Channel Attacks (SCAs), are becoming increasingly popular and pose a serious threat to cryptographic devices. Researchers proposing countermeasures and adversaries findingout new means of access to the system ultimately made this a continuous race.
Abstract Checkpoint and Recovery (CR) allows computer systems to operate correctly even when comp... more Abstract Checkpoint and Recovery (CR) allows computer systems to operate correctly even when compromised by transient faults. While many software systems and hardware systems for CR do exist, they are usually either too large, require major modifications to the software, too slow, or require extensive modifications to the caching schemes. In this paper, we propose a novel error-recovery management scheme, which is based upon re-engineering the instruction set.
Abstract Improving the throughput of molecular docking, a computationally intensive phase of the ... more Abstract Improving the throughput of molecular docking, a computationally intensive phase of the virtual screening process, is a highly sought area of research since it has a significant weight in the drug designing process. With such improvements, the world might find cures for incurable diseases like HIV disease and Cancer sooner. Our approach presented in this paper is to utilize a multi-core environment to introduce Data Level Parallelism (DLP) to the Autodock Vina software, which is a widely used for molecular docking software.
Abstract—Soft error rate (SER) issue due to technology scaling is becoming a concern for embedded... more Abstract—Soft error rate (SER) issue due to technology scaling is becoming a concern for embedded system processor designing. Soft errors can propagate to the system level causing code integrity error (CIE). In this paper, we propose an architectural check-pointing and recovery methodology enhancing program code integrity protection. Our methodology enables processors to recover from an erroneous state caused by either a malicious attack or a soft error.
String matching is a classical problem and it is fundamental to many applications that need proce... more String matching is a classical problem and it is fundamental to many applications that need processing of text data or some sequence data. String matching has been widely studied in the past three decades. Several string matching algorithms are used to find and locate one or several string patterns that are found within a larger string/text.
Typically, in a networked environment, a number of computers are connected by using one of the va... more Typically, in a networked environment, a number of computers are connected by using one of the various local area network (LAN) technologies. The most popular, known as switched network, uses Ethernet [1] as the LAN technology. Installing software to computers in such a network is always a tedious process that administrators face every day. The techniques adapted by administrators range from installing the software computer-by-computer, to using the cloning technique [9] after installing the software to one of the computers.
Abstract-The ability to reduce power consumption of a device is attractive for several reasons. O... more Abstract-The ability to reduce power consumption of a device is attractive for several reasons. On one hand, reducing power in high end computers will reduce the cost of cooling and the performance loss due to overheating cores. On the other hand, ubiquitous battery powered devices will enjoy a longer battery life due to the reduction in power consumption.
The concept of proteome is introduced recently and it can be used for protein identification. It ... more The concept of proteome is introduced recently and it can be used for protein identification. It requires peptide sequencing first. Then we have to use efficient computational methods to match peptides within proteins in order to identify unknown proteins. Because of the unprecedented rate of data growth, the need for fast, reliable sequence comparison engines is growing.
Abstract Side channel attackers observe external manifestations of internal computations in an em... more Abstract Side channel attackers observe external manifestations of internal computations in an embedded system to predict the encryption key employed. The ability to examine such external manifestations (power dissipation or electromagnetic emissions) is a major threat to secure embedded systems. This study proposes a secure multiprocessor architecture to prevent side channel attacks, based on a dual-core algorithmic balancing technique, where two identical cores are used.
The project described in this paper, Timesheet, is a software package developed to track and repo... more The project described in this paper, Timesheet, is a software package developed to track and report employee attendance. Timesheet provides a powerful mechanism to automate report generation on time and attendance behaviour, which could be used as a useful human resource management tool in any organization. Available attendance tracking systems are either expensive [1-3] or general purpose software (such as Microsoft Excel®[4]) not designed for such activities and therefore not user-friendly.
Abstract: An algorithm for locating all occurrences of a finite number of keywords in an arbitrar... more Abstract: An algorithm for locating all occurrences of a finite number of keywords in an arbitrary string, also known as multiple strings matching, is commonly required in information retrieval (such as sequence analysis, evolutionary biological studies, gene/protein identification and network intrusion detection) and text editing applications.
An electronic tuner is a device used by musicians to tune instruments. There, a musician plays a ... more An electronic tuner is a device used by musicians to tune instruments. There, a musician plays a note and the display of the tuner tells the musician how much the played note has deviated from the desired note in terms of frequency. Most of these devices, such as KORG Chromatic Tuner CA-30, are standalone equipments which are solely used to tune musical instruments.
Abstract Security and reliability in processor based systems are concerns requiring adroit soluti... more Abstract Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even 'trusted software'. Reliability is of concern, where unintended code is executed in modern processors with ever smaller feature sizes and low voltage swings causing bit flips. Countermeasures by software-only approaches increase code size and therefore significantly reduce performance.
ACM Transactions in Embedded Computing Systems, Jan 1, 2011
Numerous methods have been described in research literature with methods to improve reliability o... more Numerous methods have been described in research literature with methods to improve reliability of processors by the use of control-flow checking. High performance and code-size penalties cripple the proposed software approaches, while hardware approaches are not scalable and are thus rarely implemented in real embedded systems. In this article, we show that by including control-flow checking as an issue to
Increasingly, embedded systems designers tend to use Application Specific Instruction Set Process... more Increasingly, embedded systems designers tend to use Application Specific Instruction Set Processors (ASIPs) during the design of application specific systems. However, one of the design metrics of embedded systems is the time to market of a product, which includes the design time of an embedded processor, is an important consideration in the deployment of ASIPs. While the design time of an ASIP is very short compared to an ASIC it is longer than when using a general purpose processor. There exist a number of tools which expedite this design process, and they could be divided into two: first, tools that automatically generate HDL descriptions of the processor for both simulation and synthesis; and second, tools that generate instruction set simulators for the simulation of the hardware models. While the first one is useful to measure the critical path of the design, die area, etc. they are extremely slow for simulating real world software applications. At the same time, the instruction set simulators are fast for simulating real world software applications, but they fail to provide information so readily available from the HDL models. The framework presented in this paper, RACE, addresses this issue by integrating an automatic HDL generator with a well-known instruction set simulator. Therefore, embedded systems designers who use our RACE framework will have the benefits of both a fast instruction set simulation and rapid hardware synthesis at the same time.
Designers of embedded systems have traditionally optimized circuits for speed, size, power and ti... more Designers of embedded systems have traditionally optimized circuits for speed, size, power and time to market. Recently however, the dependability of the system is emerging as a great concern to the modern designer with the decrease in feature size and the increase in the demand for functionality. Yet another crucial concern is the security of systems used for storage of personal details and for financial transactions. A significant number of techniques that are used to overcome security and dependability are the same or have similar origins. Thus this tutorial will examine the overlapping concerns of security and dependability and the design methods used to overcome the problems and threats. This tutorial is divided into four parts: the first will examine dependability issues due to technology effects; the second will look at reliability aware designs; the third, will describe the security threats; and, the fourth part will illustrate the countermeasures to security and reliability issues.
Abstract—The main focus of modern cryptanalysis is on break-ing the implementation of cryptograph... more Abstract—The main focus of modern cryptanalysis is on break-ing the implementation of cryptographic algorithms as opposed to traditional attacks which primarily target on mathematically breaking the algorithms. For over the last decade these new trend of attacks, Side Channel Attacks (SCAs), are becoming increasingly popular and pose a serious threat to cryptographic devices. Researchers proposing countermeasures and adversaries findingout new means of access to the system ultimately made this a continuous race.
Abstract Checkpoint and Recovery (CR) allows computer systems to operate correctly even when comp... more Abstract Checkpoint and Recovery (CR) allows computer systems to operate correctly even when compromised by transient faults. While many software systems and hardware systems for CR do exist, they are usually either too large, require major modifications to the software, too slow, or require extensive modifications to the caching schemes. In this paper, we propose a novel error-recovery management scheme, which is based upon re-engineering the instruction set.
Abstract Improving the throughput of molecular docking, a computationally intensive phase of the ... more Abstract Improving the throughput of molecular docking, a computationally intensive phase of the virtual screening process, is a highly sought area of research since it has a significant weight in the drug designing process. With such improvements, the world might find cures for incurable diseases like HIV disease and Cancer sooner. Our approach presented in this paper is to utilize a multi-core environment to introduce Data Level Parallelism (DLP) to the Autodock Vina software, which is a widely used for molecular docking software.
Abstract—Soft error rate (SER) issue due to technology scaling is becoming a concern for embedded... more Abstract—Soft error rate (SER) issue due to technology scaling is becoming a concern for embedded system processor designing. Soft errors can propagate to the system level causing code integrity error (CIE). In this paper, we propose an architectural check-pointing and recovery methodology enhancing program code integrity protection. Our methodology enables processors to recover from an erroneous state caused by either a malicious attack or a soft error.
String matching is a classical problem and it is fundamental to many applications that need proce... more String matching is a classical problem and it is fundamental to many applications that need processing of text data or some sequence data. String matching has been widely studied in the past three decades. Several string matching algorithms are used to find and locate one or several string patterns that are found within a larger string/text.
Typically, in a networked environment, a number of computers are connected by using one of the va... more Typically, in a networked environment, a number of computers are connected by using one of the various local area network (LAN) technologies. The most popular, known as switched network, uses Ethernet [1] as the LAN technology. Installing software to computers in such a network is always a tedious process that administrators face every day. The techniques adapted by administrators range from installing the software computer-by-computer, to using the cloning technique [9] after installing the software to one of the computers.
Abstract-The ability to reduce power consumption of a device is attractive for several reasons. O... more Abstract-The ability to reduce power consumption of a device is attractive for several reasons. On one hand, reducing power in high end computers will reduce the cost of cooling and the performance loss due to overheating cores. On the other hand, ubiquitous battery powered devices will enjoy a longer battery life due to the reduction in power consumption.
The concept of proteome is introduced recently and it can be used for protein identification. It ... more The concept of proteome is introduced recently and it can be used for protein identification. It requires peptide sequencing first. Then we have to use efficient computational methods to match peptides within proteins in order to identify unknown proteins. Because of the unprecedented rate of data growth, the need for fast, reliable sequence comparison engines is growing.
Abstract Side channel attackers observe external manifestations of internal computations in an em... more Abstract Side channel attackers observe external manifestations of internal computations in an embedded system to predict the encryption key employed. The ability to examine such external manifestations (power dissipation or electromagnetic emissions) is a major threat to secure embedded systems. This study proposes a secure multiprocessor architecture to prevent side channel attacks, based on a dual-core algorithmic balancing technique, where two identical cores are used.
The project described in this paper, Timesheet, is a software package developed to track and repo... more The project described in this paper, Timesheet, is a software package developed to track and report employee attendance. Timesheet provides a powerful mechanism to automate report generation on time and attendance behaviour, which could be used as a useful human resource management tool in any organization. Available attendance tracking systems are either expensive [1-3] or general purpose software (such as Microsoft Excel®[4]) not designed for such activities and therefore not user-friendly.
Abstract: An algorithm for locating all occurrences of a finite number of keywords in an arbitrar... more Abstract: An algorithm for locating all occurrences of a finite number of keywords in an arbitrary string, also known as multiple strings matching, is commonly required in information retrieval (such as sequence analysis, evolutionary biological studies, gene/protein identification and network intrusion detection) and text editing applications.
An electronic tuner is a device used by musicians to tune instruments. There, a musician plays a ... more An electronic tuner is a device used by musicians to tune instruments. There, a musician plays a note and the display of the tuner tells the musician how much the played note has deviated from the desired note in terms of frequency. Most of these devices, such as KORG Chromatic Tuner CA-30, are standalone equipments which are solely used to tune musical instruments.
Abstract Security and reliability in processor based systems are concerns requiring adroit soluti... more Abstract Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even 'trusted software'. Reliability is of concern, where unintended code is executed in modern processors with ever smaller feature sizes and low voltage swings causing bit flips. Countermeasures by software-only approaches increase code size and therefore significantly reduce performance.
ACM Transactions in Embedded Computing Systems, Jan 1, 2011
Numerous methods have been described in research literature with methods to improve reliability o... more Numerous methods have been described in research literature with methods to improve reliability of processors by the use of control-flow checking. High performance and code-size penalties cripple the proposed software approaches, while hardware approaches are not scalable and are thus rarely implemented in real embedded systems. In this article, we show that by including control-flow checking as an issue to
Increasingly, embedded systems designers tend to use Application Specific Instruction Set Process... more Increasingly, embedded systems designers tend to use Application Specific Instruction Set Processors (ASIPs) during the design of application specific systems. However, one of the design metrics of embedded systems is the time to market of a product, which includes the design time of an embedded processor, is an important consideration in the deployment of ASIPs. While the design time of an ASIP is very short compared to an ASIC it is longer than when using a general purpose processor. There exist a number of tools which expedite this design process, and they could be divided into two: first, tools that automatically generate HDL descriptions of the processor for both simulation and synthesis; and second, tools that generate instruction set simulators for the simulation of the hardware models. While the first one is useful to measure the critical path of the design, die area, etc. they are extremely slow for simulating real world software applications. At the same time, the instruction set simulators are fast for simulating real world software applications, but they fail to provide information so readily available from the HDL models. The framework presented in this paper, RACE, addresses this issue by integrating an automatic HDL generator with a well-known instruction set simulator. Therefore, embedded systems designers who use our RACE framework will have the benefits of both a fast instruction set simulation and rapid hardware synthesis at the same time.
Designers of embedded systems have traditionally optimized circuits for speed, size, power and ti... more Designers of embedded systems have traditionally optimized circuits for speed, size, power and time to market. Recently however, the dependability of the system is emerging as a great concern to the modern designer with the decrease in feature size and the increase in the demand for functionality. Yet another crucial concern is the security of systems used for storage of personal details and for financial transactions. A significant number of techniques that are used to overcome security and dependability are the same or have similar origins. Thus this tutorial will examine the overlapping concerns of security and dependability and the design methods used to overcome the problems and threats. This tutorial is divided into four parts: the first will examine dependability issues due to technology effects; the second will look at reliability aware designs; the third, will describe the security threats; and, the fourth part will illustrate the countermeasures to security and reliability issues.
Uploads
Papers by Roshan Ragel