Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - sheikh+ariful+islam
4
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Safe Controller: Efficient and Transparent CFI for RTL Design
Competitive Advantages Provides an efficient, transparent, and scalable approach to enforcing CFG of RTL controller. Can protect RTL design from contemporary and future control-flow attacks. Additional securely stored monitor works as an additional RTL module enforcing controller to follow CFG with overhead on communication. Summary USF researchers...
Published: 7/13/2023
|
Inventor(s):
Srinivas Katkoori
,
Sheikh Ariful Islam
Keywords(s):
Electronic Design Automation (EDA)
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Hardware
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Electronics
,
Technology Classifications > Engineering > Electrical Engineering
An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
Competitive Advantages Promising solution to identify and authenticate Integrated Circuits Robust responses in terms of uniqueness, randomness, and uniformity Reduced bit-aliasing compared to other metastability-based PUFs Summary The novel PUF design proposed is unlike previous studies which typically require additional hardware...
Published: 7/17/2023
|
Inventor(s):
Srinivas Katkoori
,
Rohith Prasad Challa
,
Sheikh Ariful Islam
Keywords(s):
Cryptography and Intrusion Detection
,
Machine Learning
Category(s):
Technology Classifications > Computer Science
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Advantages Prevents brute-force attacks by locking out after incorrect attempts. Maintains minimal area, power, and performance overhead in implementation. Integrates seamlessly with existing hardware IP obfuscation approaches. Summary Intellectual property theft, including piracy and reverse engineering, poses significant risks to the semiconductor...
Published: 11/15/2024
|
Inventor(s):
Srinivas Katkoori
,
Sheikh Ariful Islam
Keywords(s):
Additive Manufacturing
,
Industrial Applications
,
Nanotechnology
,
Optical, Laser, Fiberoptic, Spectroscopy
Category(s):
Technology Classifications > Electronics > Electronics Laser
,
Technology Classifications > Electronics > Nanotechnology
,
Technology Classifications > Engineering > Additive Manufacturing
A Graph-Based Hardware Trojan Vulnerability Analysis Approach
Competitive Advantages Scalable to complex networks Identifies previously unidentifiable small and stealthy limited-activation HTs Immediate attack path and time localization Summary USF inventors have pushed the HT triggering signal analysis boundary using a graph-based incremental window technique. The technique simultaneously...
Published: 7/18/2023
|
Inventor(s):
Sheikh Ariful Islam
Keywords(s):
Computer Science
,
Industrial Applications
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science