Mohammad Sina Karvandi
YOU?
Author Swipe
View article: hwdbg: Debugging Hardware Like Software
hwdbg: Debugging Hardware Like Software Open
Debugging hardware designs presents unique and significant challenges compared to software debugging. Software simulators often fail to uncover design issues arising from physical constraints or incorrect elaboration. Traditional hardware …
View article: The Reversing Machine: Reconstructing Memory Assumptions
The Reversing Machine: Reconstructing Memory Assumptions Open
Existing anti-malware software and reverse engineering toolkits struggle with stealthy sub-OS rootkits due to limitations of run-time kernel-level monitoring. A malicious kernel-level driver can bypass OS-level anti-virus mechanisms easily…
View article: A Hardware Realization Framework for Fuzzy Inference System Optimization
A Hardware Realization Framework for Fuzzy Inference System Optimization Open
Fuzzy inference systems (FISs) are a key focus for decision-making in embedded systems due to their effectiveness in managing uncertainty and non-linearity. This study demonstrates that optimizing FIS hardware enhances performance, efficie…
View article: A Hardware Realization Framework for Fuzzy Inference System Optimization
A Hardware Realization Framework for Fuzzy Inference System Optimization Open
The effectiveness of Fuzzy Inference Systems (FISs) in manipulating uncertainty and nonlinearity makes them a subject of significant interest for decision-making in embedded systems. Accordingly, optimizing FIS hardware improves its perfor…
View article: HyperDbg: Reinventing Hardware-Assisted Debugging
HyperDbg: Reinventing Hardware-Assisted Debugging Open
Software analysis, debugging, and reverse engineering have a crucial impact in today’s software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to ad…
View article: HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version)
HyperDbg: Reinventing Hardware-Assisted Debugging (Extended Version) Open
Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address …
View article: A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel
A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Open
Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Rand…
View article: A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Attack.
A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Attack. Open
Nowadays, in operating systems, numerous protection mechanisms prevent or limit the user-mode applicationsto access the kernels internal information. This is regularlycarried out by software-based defenses such as Address Space Layout Rand…