data / en Two papers gain recognition in the hardware security field /news/2022-02/two-papers-gain-recognition-hardware-security-field <span>Two papers gain recognition in the hardware security field</span> <span><span lang="" about="/user/971" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rena Malai</span></span> <span>Fri, 02/25/2022 - 14:28</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/kkhasawn" hreflang="und">Khaled Khasawneh</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-02/Khaled%20photo.jpg?itok=o32cxJwk" width="350" height="322" alt="Khaled and Benham" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption><em>Khaled N. Khasawneh (at right), assistant<br /> professor in the Electrical and Computer Engineering Department, works alongside PHD student Behnam Omidi.</em></figcaption></figure><p><span><span><span><span><span><span><span><span>Khaled N. Khasawneh, assistant professor in the Electrical and Computer Engineering <span>Department at AV, contributed significant research and work to two papers which have been recognized in the area of hardware security.</span></span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><em><span><span>Researchers in Khasawneh’s CAMLsec Lab Identified a New Vulnerability in the Cloud Scheduler </span></span></em></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span><span>A paper entitled </span></span><a href="https://arxiv.org/abs/2110.00846"><span>“<em>Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks”</em></span></a><span><span> was written as part of a collaborative research effort with University of California (UC)- Davis and AV. Along with his collaborators at UC Davis, Khasawneh helped to discover a new vulnerability in cloud schedulers, which could inadvertently allow targeted micro-architectural attacks in the cloud. </span></span></span></span></span></span></span></span></span><span><span><span><span><span><span><span><span><span>This paper pointed out that certain features in the cloud scheduler enables arbitrary users to influence scheduling results. This can help attackers co-locate attacker’s code with a targeted victim’s code in a heterogeneous cloud, which enables a wide variety of micro-architectural attacks that leak sensitive data. </span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>“The current design of scheduling algorithms in the cloud focuses on enhancing workloads performance, resource utilization, and load-balancing without security considerations, which may bring new vulnerability as we showed in our work,” says Khasawneh. </span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>The paper is accepted for publication at the 2022 Network and Distributed System Security Symposium (NDSS), and will be presented there in April.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>This paper is co-authored with Behnam Omidi, a second year PHD student within the Electrical and Computer Engineering Department. His research focuses on discovering systems vulnerabilities and hardware support to secure computing systems. </span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>Khasawneh—Omidi’s advisor-- says this paper was a great opportunity to gain useful knowledge as it was a tremendous collaborative effort between both schools.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>“I’m more of an expert in microarchitecral attacks, and our co-collaborators at UC Davis, led by Dr. Homayoun, brings expertise of cloud computing and resource scheduling,” says Khasawneh.</span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><em><span>Khasawneh’s Paper Selected as a Top Pick in </span></em><em><span><span>Architecture and Hardware Security 2021</span></span></em></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span>A paper co-authored by Khasawneh </span><span>was selected as a </span><a href="https://www.ieee-hsttc.org/top-picks/"><span>Top Pick in Architecture and Hardware Security 2021.</span></a></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span><span>The top picks in architecture and embedded security represent the top and most impactful papers that have been published in the area in the last six years, from 2015 to 2020. Top picks are selected from conference papers that have appeared in leading hardware security conferences including but not limited to DAC, ICCAD, DATE, ASPDAC, HOST, Asian HOST, GLSVLSI, VLSI Design, CHES, ETS, VTS, ITC, S&P, Usenix Security, CCS, NDSS, ISCA, MICRO, ASPLOS, HPCA, HASP, ACSAC, Euro S&P, and Asia CCS.</span></span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>The top pick paper is titled “</span><a href="https://www.usenix.org/system/files/conference/woot18/woot18-paper-koruyeh.pdf"><em>Spectre Returns! Speculation Attacks using the Return Stack Buffer</em></a><em> </em><span>” and had previously won the best paper award in the USENIX Workshop on Offensive Technologies (WOOT) in 2018. This paper </span><span><span>discovers a new class of Spectre attack, called SpectreRSB, that exploits the return stack buffer (</span></span><a href="https://stackoverflow.com/questions/13722935/return-stack-buffer#comment18872475_13722935" target="_blank"><span>RSB</span></a><span><span>), which is used in modern CPUs to help predict return addresses, instead of the branch predictor unit. SpectreRSB</span></span> <span><span>allows malicious software to steal passwords, keys, and other sensitive information, from memory it shouldn't be allowed to touch.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>According to Khasawneh, Linux kernel released a </span><a href="http://lkml.iu.edu/hypermail/linux/kernel/1807.3/00872.html">patch</a><span> to protect against SpectreRSB vulnerability (</span><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-15572#vulnCurrentDescriptionTitle">CVE-2018-15572</a><span>). </span></span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/6481" hreflang="en">grants</a></div> <div class="field__item"><a href="/taxonomy/term/6861" hreflang="en">Department of Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/10551" hreflang="en">data</a></div> <div class="field__item"><a href="/taxonomy/term/19046" hreflang="en">C-TASC</a></div> </div> </div> </div> </div> </div> Fri, 25 Feb 2022 19:28:12 +0000 Rena Malai 66096 at Avyuct brings clarity to data /news/2022-02/avyuct-brings-clarity-data <span>Avyuct brings clarity to data</span> <span><span lang="" about="/user/971" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rena Malai</span></span> <span>Mon, 02/21/2022 - 10:54</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Rajesh Aggarwal, adjunct professor of data analytics engineering in the <a href="https://cec.gmu.edu/" target="_blank">College of Engineering and Computing</a> at AV, has always been fascinated by data.  </p> <p>“I’ve been working with data science for a long time,” says Aggarwal. “I was working on data models on my own, and decided it was an opportunity to create a company around it.”  </p> <p>Combining his data science training with AI and machine learning, Aggarwal started Avyuct in 2017. A Sanskrit word meaning ‘crystal clear' he says the tagline of Avyuct is exactly that—bringing crystal clear clarity to data. </p> <p>“At Avyuct we build models using data science techniques and work with small satellite coordination, object detection, and anomaly detection,” Aggarwal says. </p> <p>Anomaly detection---which tracks any unusual discrepancies in data—is used by a variety of industries, says Aggarwal. It’s a practical tool for targeting underlying issues within a product, concept, or project and it can be a key factor in avoiding problems and determining the best solutions. </p> <p>“Anomaly detection is used by pharmaceutical companies to detect defective pills, tech companies to detect security threats, manufacturing industries to detect machine defects…it’s also an important tool to incorporate in the area of data science,” he says. </p> <p>“Right now, we have a couple interesting projects,” Aggarwal says. “We are working to develop the coordination of small satellites for optimal data collection on the ground, and an anomaly detection model.”  </p> <p>Avyuct started as a part-time venture for Aggarwal, as he explored through data concept models in his spare time. Today, the company has grown to include full- time employees, and when space and time allows, interns.</p> <p>Aggarwal plans to recruit interns during summer 2022 at Avyuct. Those interested in the opportunity can check any open positions on the Mason career portal. </p> <p>For more information on Avyuct, visit <a href="https://avyuct.com/" target="_blank">https://avyuct.com</a>. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/10551" hreflang="en">data</a></div> <div class="field__item"><a href="/taxonomy/term/4766" hreflang="en">data analytics</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/7296" hreflang="en">Data Analytics Engineering</a></div> </div> </div> </div> </div> </div> Mon, 21 Feb 2022 15:54:54 +0000 Rena Malai 65776 at Mason NSF CAREER award looks at compressing and transmitting panoramic video for accurate analysis /news/2022-02/mason-nsf-career-award-looks-compressing-and-transmitting-panoramic-video-accurate <span>Mason NSF CAREER award looks at compressing and transmitting panoramic video for accurate analysis </span> <span><span lang="" about="/user/971" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rena Malai</span></span> <span>Mon, 02/07/2022 - 14:37</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zyan4" hreflang="en">Zhisheng Yan</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><div class="align-left"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-02/Yan.jpg?itok=dfBSdcWf" width="263" height="350" alt="Zhisheng Yan" loading="lazy" typeof="foaf:Image" /></div> </div> <p>Panoramic video footage is a useful tool to capture important information, like identifying suspects or monitoring a natural disaster response during an earthquake or wildfire. </p> <p>AV assistant professor Zhisheng Yan in the Department of Information Sciences and Technology will lead a National Science Foundation (NSF) CAREER research project called <a href="https://nsf.gov/awardsearch/showAward?AWD_ID=2144764&HistoricalAwards=false" target="_blank">Machine-centered Cyberinfrastructure for Panoramic Video Analytics in Science and Engineering Monitoring</a> to further develop and enhance machine centric video compression and transmission. This will look at developing a method for video footage captured by a 360 degree panoramic camera—which uses copious amounts of data—to get compressed and transmitted into a more usable, sizeable unit for data analysis in computing servers. </p> <p>According to Yan, the benefit of 360 video footage is having a larger scope of footage available but transmission can be challenging without efficient compression. </p> <p>“The use of 360 degree panoramic video is seen as an important tool for data collection in a variety of spaces, particularly when it comes to identifying wildlife, filming airport traffic, and suspect recognition,” says Yan. “All the views are available.” </p> <p>The end consumer of 360 degree video footage is now not always a human eye, but a computer algorithm, says Yan. This is why redesigning video compression and transmission capabilities is necessary to make sure the algorithms are properly analyzing footage, and retaining the data that’s needed. </p> <p>“The need to redesign compression and transmission is not necessarily for video quality, but to optimize analytic results and accuracy for the computer systems ‘viewing’ the video,” says Yan.  </p> <p>He adds that research done around traditional camera and video systems have shown that there are often issues when software programs are used to analyze panoramic videos that are too large for the systems to handle. This is where machine centric video compression and transmission can help these systems generate an accurate analysis.   </p> <p>Yan will be the single principal investigator for the project and anticipates working alongside student researchers throughout the duration. The Machine-centered Cyberinfrastructure for Panoramic Video Analytics in Science and Engineering Monitoring project will begin June 2022 and run for about five years. </p> <p>Until June, Yan says he will focus on some literature reviews and preparation.  </p> <p>“Our first focus will be in compression technology, and then we will focus on the transmission aspect,” he says. “We’ll do testing on 360 degree panoramic video samples to see what works best.” </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14471" hreflang="en">visual art</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/14936" hreflang="en">Media</a></div> <div class="field__item"><a href="/taxonomy/term/4766" hreflang="en">data analytics</a></div> <div class="field__item"><a href="/taxonomy/term/10551" hreflang="en">data</a></div> <div class="field__item"><a href="/taxonomy/term/1161" hreflang="en">National Science Foundation</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 07 Feb 2022 19:37:10 +0000 Rena Malai 64841 at