Author image not provided
 Mohit Tiwari

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.00
Citation Count160
Publication count20
Publication years2008-2014
Available for download14
Average downloads per article302.07
Downloads (cumulative)4,229
Downloads (12 Months)346
Downloads (6 Weeks)29
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


20 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 20
Result page: 1 2

Sort by:

1 published by ACM
November 2014 ACM Transactions on Design Automation of Electronic Systems (TODAES): Volume 20 Issue 1, November 2014
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 37,   Downloads (Overall): 235

Full text available: PDFPDF
High-assurance systems found in safety-critical infrastructures are facing steadily increasing cyber threats. These critical systems require rigorous guarantees in information flow security to prevent confidential information from leaking to an unclassified domain and the root of trust from being violated by an untrusted party. To enforce bit-tight information flow control, ...
Keywords: High-assurance system, formal method, multilevel security, gate-level information flow tracking, hardware security, security lattice

2 published by ACM
June 2013 PLAS '13: Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 67

Full text available: PDFPDF
We describe Sapper, a language for creating critical hardware components that have provably secure information flow. Most systems that enforce information flow policies place the hardware microarchitecture within the trusted computing base, and also assume that the observable behavior of that microarchitecture is fully and correctly documented. However, the reality ...
Keywords: non-interference, information flow, hardware description language

3
August 2012 HotSec'12: Proceedings of the 7th USENIX conference on Hot Topics in Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 5

Users today are unable to use the rich collection of third-party untrusted applications without risking significant privacy leaks. In this paper, we argue that current and proposed applications and data-centric security policies do not map well to users' expectations of privacy. In the eyes of a user, applications and peripheral ...

4
June 2012 IEEE Transactions on Information Forensics and Security: Volume 7 Issue 3, June 2012
Publisher: IEEE Press
Bibliometrics:
Citation Count: 4

Hardware-based side channels are known to expose hard-to-detect security holes enabling attackers to get a foothold into the system to perform malicious activities. Despite this fact, security is rarely accounted for in hardware design flows. As a result, security holes are often only identified after significant damage has been inflicted. ...

5 published by ACM
March 2012 ACM Transactions on Architecture and Code Optimization (TACO): Volume 9 Issue 1, March 2012
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 18,   Downloads (Overall): 388

Full text available: PDFPDF
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really understand the whole system. As abstraction is layered atop abstraction, developers gain the ability to compose systems of extraordinary complexity ...
Keywords: Dataflow tracking, tomography understanding

6
August 2011 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems: Volume 30 Issue 8, August 2011
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3

Information flow tracking is an effective tool in computer security for detecting unintended information flows. However, software based information flow tracking implementations have drawbacks in preciseness and performance. As a result, researchers have begun to explore tracking information flow in hardware, and more specifically, understanding the interference of individual bits ...

7 published by ACM
June 2011 DAC '11: Proceedings of the 48th Design Automation Conference
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 33,   Downloads (Overall): 150

Full text available: PDFPDF
Flight control, banking, medical, and other high assurance systems have a strict requirement on correct operation. Fundamental to this is the enforcement of non-interference where particular subsystems should not affect one another. In an effort to help guarantee this policy, recent work has emerged with tracking information flows at the ...
Keywords: information flow tracking, high-assurance systems, timing channels

8 published by ACM
June 2011 ISCA '11: Proceedings of the 38th annual international symposium on Computer architecture
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 2,   Downloads (12 Months): 35,   Downloads (Overall): 522

Full text available: PDFPDF
Local thermal hot-spots in microprocessors lead to worst-case provisioning of global cooling resources, especially in large-scale systems where cooling power can be 50~100% of IT power. Further, the efficiency of cooling solutions degrade non-linearly with supply temperature. Recent advances in active cooling techniques have shown on-chip thermoelectric coolers (TECs) to ...
Keywords: data center, active cooling, cooling power, tec
Also published in:
June 2011  ACM SIGARCH Computer Architecture News - ISCA '11: Volume 39 Issue 3, June 2011

9 published by ACM
June 2011 ACM SIGPLAN Notices - PLDI '11: Volume 46 Issue 6, June 2011
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 6,   Downloads (12 Months): 42,   Downloads (Overall): 419

Full text available: PDFPDF
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system's root of trust. We incorporate insights and techniques from designing information-flow secure programming languages to provide a new perspective on designing secure ...
Keywords: hardware description language, non-interference, state machine
Also published in:
June 2011  PLDI '11: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation

10 published by ACM
June 2011 ISCA '11: Proceedings of the 38th annual international symposium on Computer architecture
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 4,   Downloads (12 Months): 32,   Downloads (Overall): 542

Full text available: PDFPDF
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. Crafting the core of such a system in a way that achieves flexibility, security, and performance requires a careful balancing act. ...
Keywords: gate level information flow tracking, high assurance systems, non-interference
Also published in:
June 2011  ACM SIGARCH Computer Architecture News - ISCA '11: Volume 39 Issue 3, June 2011

11
January 2011
Bibliometrics:
Citation Count: 0

We show that it is possible to construct hardware-software systems whose implementations are verifiably free from all illegal information flows. This work is motivated by high assurance systems such as aircraft, automobiles, banks, and medical devices where secrets should never leak to unclassified outputs or untrusted programs should ...

12 published by ACM
December 2010 ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 15,   Downloads (Overall): 148

Full text available: PDFPDF
Hardware resources are abundant; state-of-the-art processors have over one billion transistors. Yet for a variety of reasons, specialized hardware functions for high assurance processing are seldom (i.e., a couple of features per vendor over twenty years) integrated into these commodity processors, despite a small flurry of late (e.g., ARM TrustZone, ...

13 published by ACM
October 2010 WESS '10: Proceedings of the 5th Workshop on Embedded Systems Security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 175

Full text available: PdfPdf
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductive posts. Since the dies may be manufactured separately, 3-D circuit integration offers the option of enhancing a commodity processor with a variety ...

14 published by ACM
June 2010 DAC '10: Proceedings of the 47th Design Automation Conference
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 110

Full text available: PDFPDF
Understanding the flow of information is an important aspect in computer security. There has been a recent move towards tracking information in hardware and understanding the flow of individual bits through Boolean functions. Such gate level information flow tracking (GLIFT) provides a precise understanding of all flows of information. This ...
Keywords: information flow tracking, Boolean logic, hardware security

15 published by ACM
June 2010 PLAS '10: Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 2,   Downloads (12 Months): 21,   Downloads (Overall): 159

Full text available: PdfPdf
Hardware designers need to precisely analyze high-level descriptions for illegal information flows. Language-based information flow analyses can be applied to hardware description languages, but a straight-forward application either conservatively rules out many secure hardware designs, or constrains the designers to work at impractically low levels of abstraction. We demonstrate that ...
Keywords: language-based automated verification, hardware security, information flow analysis

16
January 2010 IEEE Micro: Volume 30 Issue 1, January 2010
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 2

This article describes a new method for constructing and analyzing architectures that can track all information flows within a processor, including explicit, implicit, and timing flows. The key to this approach is a novel gate-level information-flow-tracking method that provides a way to create complex logical structures with well-defined information-flow properties.
Keywords: information-flow tracking, timing channels, high-assurance systems, high-assurance systems, information-flow tracking, noninterference, timing channels, covert channels, noninterference, covert channels

17 published by ACM
December 2009 MICRO 42: Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 294

Full text available: PDFPDF
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote monitoring interface) while others are absolutely critical (such as the control ...
Keywords: gate level information flow tracking, high assurance systems, covert channels, timing channels

18
September 2009 PACT '09: Proceedings of the 2009 18th International Conference on Parallel Architectures and Compilation Techniques
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

Tools such as multi-threaded data race detectors, memory bounds checkers, dynamic type analyzers, data flight recorders, and various performance profilers are becoming increasingly vital aids to software developers. Rather than performing all the instrumentation and analysis on the main processor, we exploit the fact that increasingly high-throughput board level interconnect ...
Keywords: Dynamic program analysis, Hardware support, Debugging and Security, Offchip accelerator

19 published by ACM
March 2009 ASPLOS XIV: Proceedings of the 14th international conference on Architectural support for programming languages and operating systems
Publisher: ACM
Bibliometrics:
Citation Count: 39
Downloads (6 Weeks): 4,   Downloads (12 Months): 61,   Downloads (Overall): 789

Full text available: PDFPDF
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We present a novel architecture capable of tracking all information flow within the machine, including all explicit data transfers and all implicit flows (those subtly devious ...
Keywords: gate level, information flow tracking, provably sound
Also published in:
February 2009  ACM SIGPLAN Notices - ASPLOS 2009: Volume 44 Issue 3, March 2009 March 2009  ACM SIGARCH Computer Architecture News - ASPLOS 2009: Volume 37 Issue 1, March 2009

20
November 2008 MICRO 41: Proceedings of the 41st annual IEEE/ACM International Symposium on Microarchitecture
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 0,   Downloads (12 Months): 13,   Downloads (Overall): 231

Full text available: PDFPDF
Dynamically tracking the flow of data within a microprocessor creates many new opportunities to detect and track malicious or erroneous behavior, but these schemes all rely on the ability to associate tags with all of virtual or physical memory. If one wishes to store large 32-bit tags, multiple tags per ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us