MUSE: A More Efficient Error Correcting SoftwareCU21290MUSE delivers resource-efficient error correction with simple math, enabling high accuracy, low overhead data storage and transmission.TagsAlgorithmAliasingData securityInventorsLakshminarasimhan SethumadhavanEvgeny ManzhosovManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2022-06-19
Improving N-variant systems using phantom address spacesCU19308Phantom address spaces cut N-variant system overhead, enabling efficient anomaly detection and stronger ROP defense.TagsCloud computingComputer networkEncryptionInventorsLakshminarasimhan SethumadhavanEvgeny ManzhosovMiguel A. ArroyoManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2020-11-02
Hybrid hardware-software method to enhance computer memory safetyCU18053Concise hardware-software framework enables byte-level memory safety with ~1.02x–1.16x overhead, low hardware impact.TagsBlacklistingComputer securityDebuggingInventorsLakshminarasimhan SethumadhavanKanad SinhaManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2018-05-21
Microprocessor Security Threats Disabled with Hardware Backdoor DetectionM11-028Hardware backdoors in microprocessors halted at run-time via remote resets and simple cryptography; enables secure, remediated devices.TagsCryptographyIntegrated circuitIntellectual propertyInventorsLakshminarasimhan SethumadhavanAdam WaksmanManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2011-07-08
Instruction-set randomization enhances computer security by enabling system diversity at the lowest hardware/software interfaceCU13367Hardware-based instruction-set randomization diversifies systems with near-zero overhead, boosting security against code injection and attacks.TagsEncryptionField-programmable gate arrayInstruction set architectureInventorsLakshminarasimhan SethumadhavanAngelos D. KeromytisKanad SinhaManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2015-05-14
Automated clone detection algorithm for characterizing programsCU15182DyCLINK dynamically detects exact and near-match code clones using instruction graphs, accelerating search, refactoring, and plagiarism detection.TagsAlgorithmCode refactoringControl flowInventorsLakshminarasimhan SethumadhavanFang-Hsiang SuGail KaiserManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2016-03-11
Microprocessor Performance Counters with Software Interface, LiMiTM11-029Fast, low-overhead user-space toolkit for precise microprocessor performance counters and deterministic multithreaded scheduling.TagsCentral processing unitComputer securityDatabaseInventorsLakshminarasimhan SethumadhavanJohn DemmeManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2011-07-08
CALIFORMS - Efficient memory access with improved cache structureCU18384Efficient in-cache metadata storage with inline pointers; 64x overhead reduction enables fast, memory-safe data access.TagsByteCPU cacheCache (computing)InventorsLakshminarasimhan SethumadhavanLuca CarloniManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2020-02-14
Improved security architecture for cyber-physical systems using rebooting and diversificationCU16331YOLO CPS security: periodic micro-reboots with program diversification to curb attacks, using inertia to preserve operation.TagsComputer securityDrug deliveryIndustrial control systemInventorsLakshminarasimhan SethumadhavanJonathan WeiszMiguel A. ArroyoManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2018-03-09
Timing obfuscation to prevent side channel attacks and improve computer securityCU12252Obscures execution timing with nanosecond random delays to thwart side-channel attacks, preserving performance across OSes and apps.TagsCloud computingComputer architectureComputer securityInventorsLakshminarasimhan SethumadhavanRobert MartinManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2014-08-25
On-chip security circuit for protection against hardware tamperingCU14190Beacon circuit flags hardware tampering across design and fabrication, crippling tampered devices and signaling breaches via unique power readouts.TagsComputer securityMobile deviceSemiconductor fabrication plantInventorsLakshminarasimhan SethumadhavanAdam WaksmanManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2015-08-24
On-chip microprocessor security for defense against malicious hardware attacksM10-061On-chip security detects insider hardware attacks via TrustNet and DataWatch, monitoring inter-component communication to reveal tampering.TagsComputer securityLogic gateMicroprocessorInventorsLakshminarasimhan SethumadhavanAdam WaksmanManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2015-06-29
Low-overhead robust malware detection using hardware performance countersCU13241Hardware-based malware detection using non-linear ML on runtime hardware counters; low overhead, robust against zero-days and side-channel attacks.TagsAntivirus softwareCommunicationMachine learningInventorsLakshminarasimhan SethumadhavanAdrian TangJared SchmitzManagerGreg MaskelDepartmentsComputer ScienceDivisionsFu Foundation School of Engineering and Applied Science (SEAS)Release Date2015-09-23