Western New England University

    Dr. Love Kumar Sah

    Assistant Professor of Electrical & Computer Engineering

    201C Sleith Hall, Springfield, MA 01119
    413-782-1276
    Dr. Love Kumar Sah

    Education

    PhD, Computer Science & Engineering

    University of South Florida (USF), Tampa, FL

    Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks

    2020

    MS, Computer Engineering

    University of South Florida, Tampa, FL

    2016

    MSc, Computer System & Knowledge Engineering

    Tribhuvan University (TU), Kathmandu, Nepal

    Credit Transferred to USF

    2013-2014

    BE, Computer Engineering

    Tribhuvan University, Kathmandu, Nepal

    2009

    Teaching

    Teaching experience and statements

    Teaching Experience

    Western New England University

    • CPE690-40: Computer System Security & Trust (W21, F23)
    • CPE590-41: Digital Design Optimization Verification (F23)
    • CPE462/562: VHDL: Simulation & Synthesis (S21, S22, S23, S24)
    • CPE305: Data Structure for Firmware Design (F21, F22, F23)
    • EE285: C-Programming (S22, S23, S24)
    • CPE271: Digital System Design (S22, S23, S24)
    • EE205: Electrical Engineering I (F22)

    University of South Florida

    • CDA4205: Computer Architecture (Sum17, Sum18)
    • CDA3103: Computer Organization (Sum 16)

    Tribhuvan University

    • CT603: Computer Organization and Architecturer (S10, S11, S12, S13, S14)
    • EX511: Microprocessors (S10, S11, S12, S13, S14)
    • CT501: Object Oriented Programming (F10, F11, F12, F13)
    • CT401: Computer Programming (F10, F11, F12, F13)

    Publications

    Selected peer-reviewed conferences and journals

    Conference

    Variable Record Table: A Unified Hardware-Assisted Framework for Runtime Security

    S. K. Sah, L. K. Sah

    68th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Springfield, MA, USA

    2025
    Conference

    Enhancing Cybersecurity in Critical Infrastructure with LLM-Assisted Explainable IoT Systems

    L. A. Ghimire, G. Ghajari, K. Gurung, L. K. Sah, F. Amsaad

    1st International Conference on Secure IoT, Assured and Trusted Computing (SATC), Dayton, OH, USA

    2025
    Conference

    The Art of Obfuscation: A Comprehensive Survey of Software Protection Techniques

    K. Saleh, O. Darwish, L. K. Sah, F. Amsaad

    1st International Conference on Secure IoT, Assured and Trusted Computing (SATC), Dayton, OH, USA

    2025
    Conference

    VRT: A Runtime Protection Against Back-Edge CFI Violation

    S. K. Sah, L. K. Sah

    67th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Springfield, MA, USA

    2024
    Conference

    Defending Misspeculation-based Cache Probe Attacks Using Variable Record Table

    L. K. Sah, S. A. Islam, S. Katkoori

    21th IEEE International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, pp. 408-413

    2021
    Journal

    High-Level Synthesis of Key Obfuscated RTL IP with DesignLockout and Camouflaging

    S. A. Islam, L. K. Sah, S. Katkoori

    ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 26

    2020
    32 citations