Search Results - sheikh+ariful+islam

4 Results Sort By:
Safe Controller: Efficient and Transparent CFI for RTL Design
Competitive Advantages Provides an efficient, transparent, and scalable approach to enforcing CFG of RTL controller. Can protect RTL design from contemporary and future control-flow attacks. Additional securely stored monitor works as an additional RTL module enforcing controller to follow CFG with overhead on communication. Summary USF researchers...
Published: 7/13/2023   |   Inventor(s): Srinivas Katkoori, Sheikh Ariful Islam
Keywords(s): Electronic Design Automation (EDA)
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > Hardware, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Electronics, Technology Classifications > Engineering > Electrical Engineering
An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
Competitive Advantages Promising solution to identify and authenticate Integrated Circuits Robust responses in terms of uniqueness, randomness, and uniformity Reduced bit-aliasing compared to other metastability-based PUFs Summary The novel PUF design proposed is unlike previous studies which typically require additional hardware...
Published: 7/17/2023   |   Inventor(s): Srinivas Katkoori, Rohith Prasad Challa, Sheikh Ariful Islam
Keywords(s): Cryptography and Intrusion Detection, Machine Learning
Category(s): Technology Classifications > Computer Science
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Competitive Advantages • Add-on to existing obfuscation approaches • Avoids frequently executed paths to prevent costly transformations • Locks out the design to increase difficulty of reverse engineering Summary Our inventors have developed the DLockout technique that provides an add-on to existing hardware IP obfuscation...
Published: 7/17/2023   |   Inventor(s): Srinivas Katkoori, Sheikh Ariful Islam
Keywords(s): Hardware Based Security, Industrial Applications, Mechanical and Structural Engineering
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > C/S Cybersecurity
A Graph-Based Hardware Trojan Vulnerability Analysis Approach
Competitive Advantages Scalable to complex networks Identifies previously unidentifiable small and stealthy limited-activation HTs Immediate attack path and time localization Summary USF inventors have pushed the HT triggering signal analysis boundary using a graph-based incremental window technique. The technique simultaneously...
Published: 7/18/2023   |   Inventor(s): Sheikh Ariful Islam
Keywords(s): Computer Science, Industrial Applications
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Computer Science