Activity
-
10 years ago — Casen Hunger and I committed to starting Symmetry. And our dream customer was the legendary Dell Children’s hospital in Austin…
10 years ago — Casen Hunger and I committed to starting Symmetry. And our dream customer was the legendary Dell Children’s hospital in Austin…
Liked by Simha Sethumadhavan
-
This is the story of how TWO’S COMPLEMENT ARITHMETIC—and its RISKS—led Gandhi to go NUCLEAR. Let me explain. Computers have to juggle positive and…
This is the story of how TWO’S COMPLEMENT ARITHMETIC—and its RISKS—led Gandhi to go NUCLEAR. Let me explain. Computers have to juggle positive and…
Liked by Simha Sethumadhavan
-
Vitamin-V delivers (2) Thanks to the smooth work by the team at the Universitat Politècnica de Catalunya lead by Dr. Beatriz Otero and Prof. Ramon…
Vitamin-V delivers (2) Thanks to the smooth work by the team at the Universitat Politècnica de Catalunya lead by Dr. Beatriz Otero and Prof. Ramon…
Liked by Simha Sethumadhavan
Patents
-
Systems and Methods for Detecting Design-Level Attacks Against a Digital Circuit
Issued US 9,098,700
Honors & Awards
-
Top Picks from the 2022 Computer Architecture Conferences
IEEE Micro
E. Manzhosov, A. Hastings, M. Pancholi, R. Piersma, M. T. I. Ziad and S. Sethumadhavan, "Revisiting Residue Codes for Modern Memories," in IEEE Micro, vol. 43, no. 4, pp. 53-61, July-Aug. 2023, doi: 10.1109/MM.2023.3273489.
Abstract: This article shows how residue codes, traditionally used for compute rather than storage error correction, can be applied to memories with surprising results. We show that adapting residue codes to modern memory systems offers a level of error correction…E. Manzhosov, A. Hastings, M. Pancholi, R. Piersma, M. T. I. Ziad and S. Sethumadhavan, "Revisiting Residue Codes for Modern Memories," in IEEE Micro, vol. 43, no. 4, pp. 53-61, July-Aug. 2023, doi: 10.1109/MM.2023.3273489.
Abstract: This article shows how residue codes, traditionally used for compute rather than storage error correction, can be applied to memories with surprising results. We show that adapting residue codes to modern memory systems offers a level of error correction comparable to those of traditional schemes, such as Reed–Solomon, but with fewer bits of storage. For instance, our adaptation of residue codes—multiuse error-correcting code (MUSE ECC)—can offer ChipKill protection using approximately 30% fewer bits. We use the storage gains to hold the metadata needed for emerging security functionality, such as memory tagging, or to provide better detection capabilities against Rowhammer attacks. In a system with memory tagging and MUSE, we achieve a 12% reduction in memory bandwidth utilization with the same error correction level as a traditional ECC baseline and without a noticeable performance loss. Thus, our work demonstrates a new, flexible primitive for co-designing reliability with security and performance.
URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10122478&isnumber=10167507 -
Distinguished Paper Award
Usenix Security 2017
CLKSCREW: Exposing the perils of security oblivious energy management. Adrian Tang, Simha Sethumadhavan, and Sal Stolfo.
Preprint: http://www.cs.columbia.edu/~simha/preprint_USENIX17_clkscrew.pdf -
Top Picks from the 2016 Computer Architecture Conferences
IEEE Micro
Analog Computing in a Modern Context: A Linear Algebra Accelerator Case Study: Yipeng Huang, Ning Guo, Mingoo Seok, Yannis Tsividis, and Simha Sethumadhavan
-
Best of CAL 2016
IEEE Computer Architecture Letters
For the paper on Hardware Enforced Statistical Privacy with Matthew Maycock. First work on discussing hardware support for Privacy.
-
Distinguished Paper Award
24TH IEEE INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION
Paper: Identifying Functionally Similar Code in Complex Codebases
w/ Fang-Hsiang Su, Jonathan Bell, Gail Kaiser -
Best Poster Award
Hot Chips: A Symposium on High Performance Chips (27th Hot Chips)
Poster Link: (http://www.cs.columbia.edu/~simha/hc27AVdemo.jpg)
Demo Video: (https://drive.google.com/file/d/0B58y14EaaEacbUJoRkMzeTgtMDg/preview)
Adrian Tang & John Demme were honored at Hot Chips conference with a best poster award for their poster and demo titled "A Silicon AntiVirus Engine". Using a FPGA co-processor attached to an Intel Windows box, Adrian and John were able to use performance counter data from the Windows machine to identify unseen malware. They showed a live…Poster Link: (http://www.cs.columbia.edu/~simha/hc27AVdemo.jpg)
Demo Video: (https://drive.google.com/file/d/0B58y14EaaEacbUJoRkMzeTgtMDg/preview)
Adrian Tang & John Demme were honored at Hot Chips conference with a best poster award for their poster and demo titled "A Silicon AntiVirus Engine". Using a FPGA co-processor attached to an Intel Windows box, Adrian and John were able to use performance counter data from the Windows machine to identify unseen malware. They showed a live demo at the Hot Chips conference!
Adrian and John work with Simha Sethumadhavan & Sal Stolfo.
-
Advisor on Best Student Paper Award
ACM SIGSAC: 20th ACM Conference on Computer and Communications Security
My students Adam Waksman (CS PhD) and Matthew Suozzo (CS Junior) have been recognized with a “Best Student Paper Award” at the CCS 2013. Our paper “FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis” describes a method for detecting backdoors in hardware circuits before the hardware is manufactured and sent to the market. This is the first purely static analysis technique for detecting hardware backdoors. Papers with more than 50% student co-authors were…
My students Adam Waksman (CS PhD) and Matthew Suozzo (CS Junior) have been recognized with a “Best Student Paper Award” at the CCS 2013. Our paper ��FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis” describes a method for detecting backdoors in hardware circuits before the hardware is manufactured and sent to the market. This is the first purely static analysis technique for detecting hardware backdoors. Papers with more than 50% student co-authors were eligible for the best student paper award, and only three of 530 submissions received this honor.
-
Top Picks from the 2012 Computer Architecture Conferences
IEEE Micro Magazine Top Picks Issue
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security
-
Sloan Fellowship
Alfred P Sloan Foundation
-
CAREER Award
National Science Foundation
Trustworthy Hardware from Untrustworthy Components
-
J.C. Browne Fellowship
Department of Computer Sciences, UT-Austin
Outstanding Graduate Students in Computer Sciences
-
Teaching Assistant Excellence Award
Department of Computer Sciences, UT-Austin
For dedication and outstanding service
-
Top Picks from the 2003 Computer Architecture Conferences
IEEE Micro Magazine Top Picks Issue
Scalable Hardware Memory Disambiguation - One of the Most Industry Relevant Architecture Research Papers in 2004.
More activity by Simha
-
Azure Integrated Hardware Security Module (HSM) is now available in public preview. This is a major shift in secure key management. By eliminating…
Azure Integrated Hardware Security Module (HSM) is now available in public preview. This is a major shift in secure key management. By eliminating…
Liked by Simha Sethumadhavan
-
Chypnosis: Undervolting-based Static Side-channel Attacks will appear in IEEE Symposium on Security and Privacy, 2026. The idea is as simple as it…
Chypnosis: Undervolting-based Static Side-channel Attacks will appear in IEEE Symposium on Security and Privacy, 2026. The idea is as simple as it…
Liked by Simha Sethumadhavan
-
𝟭𝟵 𝐧𝐞𝐰 𝗺𝗶𝗰𝗿𝗼𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗮𝗹 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐢𝐞𝐬 𝐚𝐜𝐫𝐨𝐬𝐬 𝐭𝐡𝐫𝐞𝐞 𝐑𝐈𝐒𝐂-𝐕 𝐂𝐏𝐔𝐬! 𝗠𝗶𝗹𝗲𝗦𝗮𝗻…
𝟭𝟵 𝐧𝐞𝐰 𝗺𝗶𝗰𝗿𝗼𝗮𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗮𝗹 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢��𝐢𝐞𝐬 𝐚𝐜𝐫𝐨𝐬𝐬 𝐭𝐡𝐫𝐞𝐞 𝐑𝐈𝐒𝐂-𝐕 𝐂𝐏𝐔𝐬! 𝗠𝗶𝗹𝗲𝗦𝗮𝗻…
Liked by Simha Sethumadhavan
-
Congratulations to the Apple team! I'm proud to have contributed to the inception of MTE in 2017. Hopefully, other vendors will catch…
Congratulations to the Apple team! I'm proud to have contributed to the inception of MTE in 2017. Hopefully, other vendors will catch…
Liked by Simha Sethumadhavan
-
A recent USENIX Security 2025 (SEC'25) paper from Max Planck Institute for Security and Privacy (MPI-SP), Indian Institute of Technology, Kharagpur…
A recent USENIX Security 2025 (SEC'25) paper from Max Planck Institute for Security and Privacy (MPI-SP), Indian Institute of Technology, Kharagpur…
Liked by Simha Sethumadhavan
-
🎉 Exciting news from CipherSonic Labs! 🎉 We are honored to share that CipherSonic Labs has been awarded the National Science Foundation (NSF) SBIR…
🎉 Exciting news from CipherSonic Labs! 🎉 We are honored to share that CipherSonic Labs has been awarded the National Science Foundation (NSF) SBIR…
Liked by Simha Sethumadhavan
-
Today, one of Microsoft Research's teams in Cambridge, UK published a breakthrough result in Nature Magazine. They disclosed a new type of computer…
Today, one of Microsoft Research's teams in Cambridge, UK published a breakthrough result in Nature Magazine. They disclosed a new type of computer…
Liked by Simha Sethumadhavan
-
I want to express my gratitude to everyone on my committee team for their hard work during the past year, culminating in another successful TSNE!…
I want to express my gratitude to everyone on my committee team for their hard work during the past year, culminating in another successful TSNE!…
Liked by Simha Sethumadhavan
-
🚨 Excited to share our latest research on GPU RowHammer attacks (after a 170-day embargo), that will be presented at USENIX Security 2025! 🚨 We…
🚨 Excited to share our latest research on GPU RowHammer attacks (after a 170-day embargo), that will be presented at USENIX Security 2025! 🚨 We…
Liked by Simha Sethumadhavan
-
I was truly honored and deeply humbled to have received the SIGARCH Alan D. Berenbaum Distinguished Service Award [https://lnkd.in/etueGWSY] at the…
I was truly honored and deeply humbled to have received the SIGARCH Alan D. Berenbaum Distinguished Service Award [https://lnkd.in/etueGWSY] at the…
Liked by Simha Sethumadhavan
Other similar profiles
-
Emin Gun Sirer
Emin Gun Sirer
-
Nathan Intrator
Nathan Intrator
-
Alkiviadis Vazacopoulos
Alkiviadis Vazacopoulos
-
Lionel Robert
Lionel Robert
-
Richard F. Kubli (BS,MBA,PhD)
Richard F. Kubli (BS,MBA,PhD)
-
Peter Aiken
Peter Aiken
-
Gary M. Shiffman
Gary M. Shiffman
-
Scott Madry
Scott Madry
Professor UNC-Chapel Hill, President, Informatics International, Inc.Professor emeritus, the International Space University, Strasbourg, France, full member, the International Academy of Astronautics
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content