Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vivek Venugopalan is active.

Publication


Featured researches published by Vivek Venugopalan.


ieee high performance extreme computing conference | 2015

Multi-modal sensor registration for vehicle perception via deep neural networks

Michael Giering; Vivek Venugopalan; Kishore K. Reddy

The ability to simultaneously leverage multiple modes of sensor information is critical for perception of an automated vehicles physical surroundings. Spatio-temporal alignment of registration of the incoming information is often a prerequisite to analyzing the fused data. The persistence and reliability of multi-modal registration is therefore the key to the stability of decision support systems ingesting the fused information. LiDAR-video systems like on those many driverless cars are a common example of where keeping the LiDAR and video channels registered to common physical features is important. We develop a deep learning method that takes multiple channels of heterogeneous data, to detect the misalignment of the LiDAR-video inputs. A number of variations were tested on the Ford LiDAR-video driving test data set and will be discussed. To the best of our knowledge the use of multi-modal deep convolutional neural networks for dynamic real-time LiDAR-video registration has not been presented.


network and system security | 2015

Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs

Devu Manikantan Shila; Vivek Venugopalan; Cameron D. Patterson

Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA application design and development process in conjunction with the inadequate bitstream protection measures have raised crucial security concerns in the past for reconfigurable hardware systems. Designing high fidelity and secure methodologies for FPGAs are still infancy and in particular, there are almost no concrete methods/techniques that can ensure trust in FPGA applications not entirely designed and/or developed in a trusted environment. This work strongly suggests the need for an anomaly detection capability within the FPGAs that can continuously monitor the behavior of the underlying FPGA IP cores and the communication activities of IP cores with other IP cores or peripherals for any abnormalities. To capture this need, we propose a technique called FIDelity Enhancing Security (FIDES) methodology for FPGAs that uses a combination of access control policies and behavior learning techniques for anomaly detection.


communications and networking symposium | 2016

Detecting and thwarting hardware trojan attacks in cyber-physical systems

Vivek Venugopalan; Cameron D. Patterson; Devu Manikantan Shila

Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not provide the overall trust required in an embedded system. Trust enhancements are proposed to a hardware security platform, where the trust specifications are implemented in both software and hardware. This distribution of trust makes it difficult for a hardware-only or software-only attack to cripple the system. The proposed approach is applied to a smart grid application consisting of third-party soft IP cores, where an attack on this module can result in a blackout. System integrity is preserved in the event of an attack and the anomalous behavior of the IP core is recorded by a supervisory module. The IP core also provides a snapshot of its trust metric, which is logged for further diagnostics.


Journal of Hardware and Systems Security | 2018

Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things

Vivek Venugopalan; Cameron D. Patterson

The Internet-of-Things (IoT) has emerged as one of the most innovative multidisciplinary paradigms combining heterogeneous sensors, software architectures, embedded hardware systems, and data analytics. With the growth in deployment of IoT systems, security of the sensors and trustworthiness of the data exchanged is of paramount significance. IoT security approaches are derived from the vulnerabilities existing in cyber-physical systems (CPS) and the countermeasures designed against them. This paper surveys the vulnerabilities posed due to the presence of hardware Trojans in such IoT-based CPS. The threats, trigger points, detection methods, and countermeasures for targeting hardware Trojans are discussed in detail. Finally, some of the new emerging security challenges and countermeasures are addressed.


ieee high performance extreme computing conference | 2015

FIDES: Enhancing trust in reconfigurable based hardware systems

Devu Manikantan Shila; Vivek Venugopalan; Cameron D. Patterson

Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA application design and development process in conjunction with the inadequate bitstream protection measures have raised crucial security concerns in the past for reconfigurable hardware systems. Designing high fidelity and secure methodologies for FPGAs are still infancy and in particular, there are almost no concrete methods/techniques that can ensure trust in FPGA applications not entirely designed and/or developed in a trusted environment. This work strongly suggests the need for an anomaly detection capability within the FPGAs that can continuously monitor the behavior of the underlying FPGA IP cores and the communication activities of IP cores with other IP cores or peripherals for any abnormalities. To capture this need, we propose a technique called FIDelity Enhancing Security (FIDES) methodology for FPGAs that uses a combination of access control policies and behavior learning techniques for anomaly detection. We target FIDES architecture on a Xilinx Zynq 7020 device implemented with a red-black system comprising of sensitive and non-sensitive IP cores. Our results show that FIDES implementation leads to only 1-2% overhead in terms of the logic resources per wrapper and incurs minimal latency per wrapper for tag verification and embedding.


Archive | 2018

CONTROL SYSTEMS USING DEEP REINFORCEMENT LEARNING

Michael J. Giering; Kishore K. Reddy; Vivek Venugopalan; Amit Surana; Soumalya Sarkar


ubiquitous intelligence and computing | 2017

Architectural refinements for enhancing trust and securing cyber-physical systems

Vivek Venugopalan; Cameron D. Patterson


Archive | 2017

MULTI-MODAL SENSOR DATA FUSION FOR PERCEPTION SYSTEMS

Michael J. Giering; Kishore K. Reddy; Vivek Venugopalan; Soumik Sarkar


Archive | 2016

Deep convolutional neural networks for crack detection from image data

Michael J. Giering; Kishore K. Reddy; Vivek Venugopalan


Archive | 2015

Sensor data fusion for prognostics and health monitoring

Michael J. Giering; Madhusudana Shashanka; Soumik Sarkar; Vivek Venugopalan

Collaboration


Dive into the Vivek Venugopalan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kishore K. Reddy

University of Central Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge