Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suresh Chari is active.

Publication


Featured researches published by Suresh Chari.


international cryptology conference | 1999

Towards Sound Approaches to Counteract Power-Analysis Attacks

Suresh Chari; Charanjit S. Jutla; Josyula R. Rao; Pankaj Rohatgi

Side channel cryptanalysis techniques, such as the analysis of instantaneous power consumption, have been extremely effective in attacking implementations on simple hardware platforms. There are several proposed solutions to resist these attacks, most of which are ad-hoc and can easily be rendered ineffective. A scientific approach is to create a model for the physical characteristics of the device, and then design implementations provably secure in that model, i.e, they resist generic attacks with an a priori bound on the number of experiments. We propose an abstract model which approximates power consumption in most devices and in particular small single-chip devices. Using this, we propose a generic technique to create provably resistant implementations for devices where the power model has reasonable properties, and a source of randomness exists. We prove a lower bound on the number of experiments required to mount statistical attacks on devices whose physical characteristics satisfy reasonable properties.


ACM Transactions on Information and System Security | 2003

BlueBoX: A policy-driven, host-based intrusion detection system

Suresh Chari; Pau-Chen Cheng

Detecting attacks against systems has, in practice, largely been delegated to sensors, such as network intrustion detection systems. However, due to the inherent limitations of these systems and the increasing use of encryption in communication, intrusion detection and prevention have once again moved back to the host systems themselves. In this paper, we describe our experiences with building BlueBox, a host-based intrusion detection system. Our approach, based on the technique of system call introspection, can be viewed as creating an infrastructure for defining and enforcing very fine-grained process capabilities in the kernel. These capabilities are specified as a set of rules (policies) for regulating access to system resources on a per executable basis. The language for expressing the rules is intuitive and sufficiently expressive to effectively capture security boundaries.We have prototyped our approach on Linux operating system kernel and have built rule templates for popular daemons such as Apache and wu-ftpd. Our design has been validated by testing against a comprehensive database of known attacks. Our system has been designed to minimize the kernel changes and performance impact and thus can be ported easily to new kernels. We describe the motivation and rationale behind BlueBox, its design, implementation on Linux, and how it relates to prior work on detecting and preventing intrusions on host systems.


international world wide web conferences | 2008

SMash: secure component model for cross-domain mashups on unmodified browsers

Frederik De Keukelaere; Sumeer Bhola; Michael Steiner; Suresh Chari; Sachiko Yoshihama

Mashup applications mix and merge content (data and code) from multiple content providers in a users browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical.


SIAM Journal on Computing | 1995

Randomness-Optimal Unique Element Isolation withApplications to Perfect Matching and Related Problems

Suresh Chari; Pankaj Rohatgi; Aravind Srinivasan

In this paper, we precisely characterize the randomness complexity of the unique element isolation problem, a crucial step in the


Lecture Notes in Computer Science | 2001

Security Issues in M-Commerce: A Usage-Based Taxonomy

Suresh Chari; Parviz Kermani; Sean W. Smith; Leandros Tassiulas

RNC


Journal of Computer and System Sciences | 2000

Improved Algorithms via Approximations of Probability Distributions

Suresh Chari; Pankaj Rohatgi; Aravind Srinivasan

algorithm for perfect matching due to Mulmuley, Vazirani, and Vazirani [Combinatorica, 7 (1987), pp. 105--113] and in several other applications. Given a set


Ibm Journal of Research and Development | 2016

Security 360°: Enterprise security for the cognitive era

Josyula R. Rao; Suresh Chari; Dimitrios Pendarakis; Reiner Sailer; Marc Ph. Stoecklin; Wilfried Teiken; Andreas Wespi

S


european symposium on research in computer security | 2002

Authentication for Distributed Web Caches

James R. Giles; Reiner Sailer; Dinesh C. Verma; Suresh Chari

and an unknown family


Computer Networks | 2007

Improving the resilience of content distribution networks to large scale distributed denial of service attacks

Kang-Won Lee; Suresh Chari; Anees Shaikh; Sambit Sahu; Pau-Chen Cheng

{\cal F} \subseteq 2^S


symposium on the theory of computing | 1993

Randomness-optimal unique element isolation, with applications to perfect matching and related problems

Suresh Chari; Pankaj Rohatgi; Aravind Srinivasan

with

Collaboration


Dive into the Suresh Chari's collaboration.

Researchain Logo
Decentralizing Knowledge