AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators
Ren, Wei, Kozlowski, William, Koteshwara, Sandhya, Ye, Mengmei, Franke, Hubertus, Chen, Deming
Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)
Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)
Get full text
Conference Proceeding
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Koteshwara, Sandhya
Published in 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (16.12.2021)
Published in 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (16.12.2021)
Get full text
Conference Proceeding
Functional encryption of integrated circuits by key-based hybrid obfuscation
Koteshwara, Sandhya, Kim, Chris H., Parhi, Keshab K.
Published in 2017 51st Asilomar Conference on Signals, Systems, and Computers (01.10.2017)
Published in 2017 51st Asilomar Conference on Signals, Systems, and Computers (01.10.2017)
Get full text
Conference Proceeding
Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure
Mukherjee, Rijoy, Govindan, Vidya, Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K., Chakraborty, Rajat Subhra
Published in Journal of hardware and systems security (01.12.2020)
Published in Journal of hardware and systems security (01.12.2020)
Get full text
Journal Article
S2TAR: Shared Secure Trusted Accelerators with Reconfiguration for Machine Learning in the Cloud
Ren, Wei, Koteshwara, Sandhya, Ye, Mengmei, Franke, Hubertus, Chen, Deming
Published in 2024 IEEE 17th International Conference on Cloud Computing (CLOUD) (07.07.2024)
Published in 2024 IEEE 17th International Conference on Cloud Computing (CLOUD) (07.07.2024)
Get full text
Conference Proceeding
ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch
Govindan, Vidya, Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K., Chakraborty, Rajat Subhra
Published in Security, Privacy, and Applied Cryptography Engineering (2019)
Published in Security, Privacy, and Applied Cryptography Engineering (2019)
Get full text
Book Chapter
Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors
Koteshwara, Sandhya, Kumar, Manoj, Pattnaik, Pratap
Published in 2020 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (01.08.2020)
Published in 2020 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (01.08.2020)
Get full text
Conference Proceeding
FPGA implementation and comparison of AES-GCM and Deoxys authenticated encryption schemes
Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K.
Published in 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (01.05.2017)
Published in 2017 IEEE International Symposium on Circuits and Systems (ISCAS) (01.05.2017)
Get full text
Conference Proceeding
FUZZING BASED SECURITY ASSESSMENT
CASTANOS, Jose Gabriel, FRANKE, Hubertus, CRUMLEY, Paul, KOTESHWARA, Sandhya
Year of Publication 30.03.2023
Get full text
Year of Publication 30.03.2023
Patent
FUZZING BASED SECURITY ASSESSMENT
Castanos, Jose Gabriel, Franke, Hubertus, Crumley, Paul Gregory, Koteshwara, Sandhya
Year of Publication 23.03.2023
Get full text
Year of Publication 23.03.2023
Patent
Supporting large-word operations in a reduced instruction set computer ("RISC") processor
Kattamuri Ekanadham, Pratap C Pattanaik, Sandhya Koteshwara, Jose E. Moreira, Manoj Kumar
Year of Publication 10.07.2024
Get full text
Year of Publication 10.07.2024
Patent