• Publications
  • Influence
Security of IoT systems: Design challenges and opportunities
A brief survey of IoT challenges and opportunities with an emphasis on security issues and several case studies that advocate the use of stable PUFs and digital PPUFs for several IoT security protocols are presented.
Nanoelectronic Solutions for Hardware Security
Techniques for foundry identification
This paper introduces statistical techniques for foundry detection, specifically for identifying from which foundry a particular chip originates from, by employing a variant of SAT that extracts channel lengths and threshold voltages.
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications
This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices.
Representation Learning for Information Extraction from Form-like Documents
An extraction system that uses knowledge of the types of the target fields to generate extraction candidates and a neural network architecture that learns a dense representation of each candidate based on neighboring words in the document is proposed.
Hardware obfuscation using PUF-based logic
This paper introduces the notion of PUF-based logic which can be configured to be functionally equivalent to any arbitrary design, as well as a new architecture for wire merging that obfuscates signal paths exponentially.
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security
The physical unclonable function (PUF) has emerged as a popular and widely studied security primitive based on the randomness of the underlying physical medium. To date, most of the research emphasis
Hierarchical Label Propagation and Discovery for Machine Generated Email
This paper formulates an efficient and effective hierarchical label propagation and discovery algorithm that achieves more than 91% precision and 93% recall, while increasing the label coverage by more than 11%.
Digital bimodal function: An ultra-low energy security primitive
A new security hardware primitive named digital bimodal function (DBF) is developed that enables ultra low energy security protocols and is competitive with the energy efficiency of traditional security key cryptographic security technique while more than three orders of magnitude more energy efficient than RSA.
The bidirectional polyomino partitioned PPUF as a hardware security primitive
Next generation CMOS-compatible technologies, such as memristors and nanowires, whose components exhibit non-linear circuit characteristics, are proposed to use for the creation of public physical unclonable functions, and a novel architecture of PPUF polyomino partitioning is introduced.