Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lakshminarasimhan Sethumadhavan is active.

Publication


Featured researches published by Lakshminarasimhan Sethumadhavan.


Archive | 2009

Rapid Parallelization by Collaboration

Lakshminarasimhan Sethumadhavan; Gail E. Kaiser

The widespread adoption of Chip Multiprocessors has renewed the emphasis on the use of parallelism to improve performance. The present and growing diversity in hardware architectures and software environments, however, continues to pose difficulties in the effective use of parallelism thus delaying a quick and smooth transition to the concurrency era. In this document, we describe the research being conducted at Columbia University on a system called COMPASS that aims to simplify this transition by providing advice to programmers considering parallelizing their code. The advice proffered to the programmer is based on the wisdom collected from programmers who have already parallelized some code. The utility of COMPASS rests, not only on its ability to collect the wisdom unintrusively but also on its ablility to automatically seek, find and synthesize this wisdom into advice that is tailored to the code the user is considering parallelizing and to the environment in which the optimized program will execute in. COMPASS provides a platform and an extensible framework for sharing human expertise about code parallelization – widely, and on diverse hardware and software. By leveraging the “wisdom of crowds” model [78] which has been conjunctured to scale exponentially and which has successfully worked for wikis, COMPASS aims to enable rapid parallelization of code and thus continue to extend the benefits of Moore’s law scaling to science and society. ACM


Archive | 2013

Cost and Scalability of Hardware Encryption Techniques

Adam Waksman; Lakshminarasimhan Sethumadhavan

We discuss practical details and basic scalability for two recent ideas for hardware encryption for trojan prevention. The broad idea is to encrypt the data used as inputs to hardware circuits to make it more difficult for malicious attackers to exploit hardware trojans. The two methods we discuss are data obfuscation and fully homomorphic encryption (FHE). Data obfuscation [5] is a technique wherein specific data inputs are encrypted so that they can be operated on within a hardware module without exposing the data itself to the hardware. FHE is a technique recently discovered to be theoretically possible [2]. With FHE, not only the data but also the operations and the entire circuit are encrypted. FHE primarily exists as a theoretical construct currently. It has been shown that it can theoretically be applied to any program or circuit [2]. It has also been applied in a limited respect to some software [4]. Some initial algorithms for hardware applications have been proposed [1]. We find that data obfuscation is efficient enough to be immediately practical, while FHE is not yet in the practical realm. There are also scalability concerns regarding current algorithms for FHE.


Archive | 2011

System and Methods for Precise Microprocessor Event Counting

Lakshminarasimhan Sethumadhavan; John Demme


Archive | 2011

System and Methods for Silencing Hardware Backdoors

Lakshminarasimhan Sethumadhavan; Adam Waksman


Archive | 2013

Systems and methods to counter side channels attacks

Lakshminarasimhan Sethumadhavan; Robert Martin; John Demme


Archive | 2011

Systems and methods for detecting attacks against a digital circuit

Lakshminarasimhan Sethumadhavan; Adam Waksman


Archive | 2014

IMPLEMENTATIONS TO FACILITATE HARDWARE TRUST AND SECURITY

Lakshminarasimhan Sethumadhavan; Adam Waksman


Archive | 2013

IDENTIFICATION OF BACKDOORS AND BACKDOOR TRIGGERS

Lakshminarasimhan Sethumadhavan; Adam Waksman; Matthew Suozzo


Archive | 2013

DETECTION OF ANOMALOUS PROGRAM EXECUTION USING HARDWARE-BASED MICRO-ARCHITECTURAL DATA

Lakshminarasimhan Sethumadhavan; John Demme; Jared Schmitz; Adrian Tang; Sal Stolfo; Matthew Maycock


Archive | 2016

Inhibiting memory disclosure attacks using destructive code reads

Adrian Tang; Salvatore J. Stolfo; Lakshminarasimhan Sethumadhavan

Collaboration


Dive into the Lakshminarasimhan Sethumadhavan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge