- Advanced Memory and Neural Computing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Ferroelectric and Negative Capacitance Devices
- 2D Materials and Applications
- Neuroscience and Neural Engineering
- Cell Image Analysis Techniques
- Perovskite Materials and Applications
- Integrated Circuits and Semiconductor Failure Analysis
- Advancements in Semiconductor Devices and Circuit Design
- Biochemical Analysis and Sensing Techniques
- Graphene research and applications
- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Quantum-Dot Cellular Automata
- Adversarial Robustness in Machine Learning
- Analytical Chemistry and Sensors
- Advanced Sensor and Energy Harvesting Materials
- Semiconductor materials and devices
- Advanced Machining and Optimization Techniques
- Advanced Materials and Mechanics
- Electrochemical sensors and biosensors
- Silicon and Solar Cell Technologies
- MXene and MAX Phase Materials
- Conducting polymers and applications
- Advanced Surface Polishing Techniques
Pennsylvania State University
2017-2024
Jackson State University
2024
Argonne National Laboratory
2024
Abstract Information security is one of the foundational requirements for any modern society thriving on digital connectivity. At present, information accomplished either through software algorithms or hardware protocols. Software use pseudo random numbers generated by one-way mathematical functions that are computationally robust in classical era, but shown to become vulnerable post-quantum era. Hardware overcomes such limitations physically unclonable (PUFs) exploit manufacturing process...
Abstract The increased demand of high‐performance computing systems has exposed the inherent limitations current state‐of‐the‐art von Neumann architecture. Therefore, developing alternate primitives that can offer faster speed with low energy expenditure is critical. In this context, while several non‐volatile memory (NVM) devices such as synaptic transistors, spintronic devices, phase change (PCM), and memristors have been demonstrated in past, their two‐terminal nature necessitates...
Animal behavior involves complex interactions between physiology and psychology. However, most AI systems neglect psychological factors in decision-making due to a limited understanding of the physiological-psychological connection at neuronal level. Recent advancements brain imaging genetics have uncovered specific neural circuits that regulate behaviors like feeding. By developing neuro-mimetic incorporate both psychology, new emotional-AI paradigm can be established bridges gap humans...
A true random number generator (TRNG) is a critical hardware component that has become increasingly important in the era of Internet Things (IoT) and mobile computing for ensuring secure communication authentication schemes. While recent years have seen an upsurge TRNGs based on nanoscale materials devices, their resilience against machine learning (ML) attacks remains unexamined. In this article, we demonstrate ML attack resilient, low-power, low-cost TRNG by exploiting stochastic...
Reverse engineering (RE) is one of the major security threats to semiconductor industry due involvement untrustworthy parties in an increasingly globalized chip manufacturing supply chain. RE efforts have already been successful extracting device level functionalities from integrated circuit (IC) with very limited resources. Camouflaging obfuscation method that can thwart such RE. Existing work on IC camouflaging primarily involves transformable interconnects and/or covert gates where...
With an ever-increasing globalization of the semiconductor chip manufacturing supply chain coupled with soaring complexity modern-day integrated circuits (ICs), intellectual property (IP) piracy, reverse engineering, counterfeiting, and hardware trojan insertion have emerged as severe threats that compromised security critical components. Logic locking (LL) is IP protection technique can mitigate these by a given IC secret key. Earlier LL demonstrations based on traditional silicon...
Abstract User authentication is a critical aspect of any information exchange system which verifies the identities individuals seeking access to sensitive information. Conventionally, this approachrelies on establishing robust digital signature protocols employ asymmetric encryption techniques involving key pair consisting public and its matching private key. In article, user verification platform constructed using integrated circuits (ICs) with atomically thin two‐dimensional (2D) monolayer...
A true random number generator (TRNG) is essential to ensure information security for Internet of Things (IoT) edge devices. While pseudorandom generators (PRNGs) have been instrumental, their deterministic nature limits application in security-sensitive scenarios. In contrast, hardware-based TRNGs derived from physically unpredictable processes offer greater reliability. This study demonstrates a peripheral-free TRNG utilizing two cascaded three-stage inverters (TSIs) conjunction with an...
Abstract Disorder is fundamental to nature and natural phenomena, providing countless information sources, which are astronomically difficult duplicate, but have yet be exploited for cryptographic applications. While the contemporary crypto systems, relying on premise of abstract mathematical one‐way functions, relatively decipher with reasonable and/or finite resources, situation bound change advent quantum computers, necessitating physically unclonable entropy sources. As such, inspiration...
Hardware Trojans (HTs) have emerged as a major security threat for integrated circuits (ICs) owing to the involvement of untrustworthy actors in globally distributed semiconductor supply chain.
The metal-to-insulator phase transition (MIT) in two-dimensional (2D) materials under the influence of a gating electric field has revealed interesting electronic behavior and need for deeper fundamental understanding...
Abstract Animal behavior is a complex interaction between physiology and psychology. Yet, most artificial intelligence (AI) systems do not take into account psychological factors in their decision-making. One obvious reason for this exclusion the lack of comprehensive understanding connection psychology at neuronal level. However, recent advances brain imaging molecular genetic tools have revealed that there are specific neural circuits through which hardwired regulating animal behaviors...
Abstract The development of highly selective and miniaturized chemisensors for liquid media can enable newer discoveries empower a wide range disciplines from biology to human health, marine ecology climate change, industrial process monitoring food safety. While the two-terminal chemiresistor architecture has been remarkably successful in this regard, they rely on appropriate surface functionalization achieve selectivity specific target analyte. Furthermore, sensor drift sensor-to-sensor...
Abstract Intrinsically ferromagnetic and semiconducting two-dimensional (2D) H-phase vanadium disulfide (VS 2 ) holds tremendous promise for future electronics, optoelectronics, spintronics valleytronics applications. However, its thermodynamic instability the formation of intermediate stoichiometric polymorphs during growth have stymied any progress towards synthesis high quality 2D VS films. In this article, we circumvent these challenges accomplish large area monolayer films using...
This letter is concerned with the electrical characterization of 3D fin-shaped silicon used as a channel in novel transistor architectures. approach adapts photoconductance decay minority carrier measurement methodology to needs semiconductor materials systems. The results obtained indicate high threefold decrease lifetime Si compared same active planar prior fins definition (from τ ~ 45 μs 15 μs). A cause this significant expansion effective surface area finned samples and resulting...
Abstract Reverse engineering (RE) is one of the major security threats to semiconductor industry due involvement untrustworthy parties in an increasingly globalized chip manufacturing supply chain [1-5]. RE efforts have already been successful extracting device level functionalities from integrated circuit (IC) with very limited resources [6]. Camouflaging obfuscation method that can thwart such [7-9]. Existing work on IC camouflaging primarily uses fabrication techniques as doping and dummy...