- Millimeter-Wave Propagation and Modeling
- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced MIMO Systems Optimization
- Microwave Engineering and Waveguides
- Advanced Malware Detection Techniques
- Antenna Design and Analysis
- Security and Verification in Computing
- Advanced Wireless Communication Techniques
- Chaos-based Image/Signal Encryption
- Power Line Communications and Noise
- Underwater Vehicles and Communication Systems
- Electrostatic Discharge in Electronics
- Integrated Circuits and Semiconductor Failure Analysis
- Parallel Computing and Optimization Techniques
- Indoor and Outdoor Localization Technologies
- Energy Harvesting in Wireless Networks
- Radio Frequency Integrated Circuit Design
- Wireless Communication Networks Research
- Underwater Acoustics Research
- Advanced Antenna and Metasurface Technologies
- Terahertz technology and applications
- Molecular Communication and Nanonetworks
- Wireless Body Area Networks
- Vehicular Ad Hoc Networks (VANETs)
Georgia Institute of Technology
2015-2024
AID Atlanta
2023
Missouri University of Science and Technology
2022
Southwestern Indian Polytechnic Institute
2022
Atlanta Technical College
2016
Deutsches Zentrum für Luft- und Raumfahrt e. V. (DLR)
2014
University of Agder
2014
Télécom Paris
2014
Hong Kong Polytechnic University
2014
United States Naval Research Laboratory
2009-2010
A 3-D reference model for wideband multiple-input multiple-output (MIMO) mobile-to-mobile (M-to-M) channels is reviewed along with its corresponding first- and second-order channel statistics. To validate the model, an experimental MIMO M-to-M channel-sounding campaign was conducted vehicular communication vehicles that travel surface streets expressways in a metropolitan area. compare statistics were obtained from those empirical measurements, new maximum-likelihood-based stochastic...
A single- and double-bounced two-ring parametric reference model is proposed for multiple-input multiple-output (MIMO) mobile-to-mobile (M-to-M) Ricean fading channels. From this model, a closed-form joint space-time correlation function space-Doppler power spectrum are derived two-dimensional (2D) non-isotropic scattering environment. Also, functions the in-phase quadrature components of complex faded envelope derived, assuming 2D isotropic Finally, two new sum-of-sinusoids based simulation...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> A 3-D reference model is proposed for multiple-input multiple-output (MIMO) mobile-to-mobile (M-to-M) multipath-fading channels. From this model, a closed-form joint space–time correlation function derived nonisotropic scattering environment. Two sum-of-sinusoids-based simulation models MIMO M-to-M channels are proposed. The statistics of the verified by simulation. Finally, these used to...
This paper shows that electromagnetic (EM) information leakage from modern laptops and desktops (with no peripherals attached) is indeed possible relatively easy to achieve. The experiments are performed on three laptop systems one desktop system with different processors (Intel Centrino, Core 2, i7, AMD Turion), show both active (program deliberately tries cause emanations at a particular frequency) passive (emanations frequencies happen as result of activity) EM side-channel attacks all...
This paper presents a new metric, which we call Signal Available to Attacker (SAVAT), that measures the side channel signal created by specific single-instruction difference in program execution, i.e. The amount of made available potential attacker who wishes decide whether has executed instruction/event A or B. We also devise practical methodology for measuring SAVAT real systems using only user-level access permissions and common measurement equipment. Finally, perform case study where...
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a new method for detecting anomalies program execution, such as malware and other code injections, without introducing any overheads, adding hardware support, changing software, or using resources on the monitored system itself. Monitoring with EDDIE involves receiving electromagnetic (EM) emanations that are emitted side effect execution system, it relies spikes EM spectrum produced result periodic (e.g....
Terahertz (THz) wireless data centers can provide low-latency networks and dynamic scalability that are vital for the next-generation cloud computing infrastructure. The knowledge of THz propagation characteristics in a center environment is essential to development novel communication systems. However, comprehensive characterization modeling channels, which includes various obstructions not available. This paper presents results from channel measurement campaign conducted environment....
A three-dimensional (3-D) geometrical propagation model for wideband multiple-input multiple-output (MIMO) mobile-to-mobile (M-to-M) communications is proposed. Based on the model, a 3-D parametric reference MIMO M-to-M multipath fading channels developed. From corresponding space-time-frequency correlation function derived non-isotropic scattering environment. It shown that time and frequency dispersion of wide sense stationary uncorrelated channel cannot be treated independently, contrary...
This paper presents measurements and statistical characterization of 300- to 320-GHz desktop channels. The are performed in line-of-sight (LoS) non-LoS (NLoS) environments. From the large set LoS measured data, parameters for single-slope path-loss model with shadowing devised. results show that exponent is around 1.9 variations due similar across different frequencies bandwidths. Furthermore, impact materials on path loss studied NLoS environment. metal objects propagation cause multiple...
This paper presents characterization of 300-GHz wireless channel on a computer motherboard, where several different measurement scenarios have been considered. Results indicate that the presence ground plane and/or vertical parallel-plate structures in introduces multipath that, if constructively superimposed, may create path loss lower than free-space propagation loss. In addition, it has found few centimeters misalignment between transmitter and receiver result greater 5 dB. Furthermore,...
A 2-D geometrical propagation model for short-range device-to-device desktop communication channels at sub-terahertz (sub-THz) frequencies is proposed. Based on the model, a parametric reference sub-THz multipath fading developed. From corresponding frequency correlation function and power delay profile (PDP) are derived compared with measured data. The results show good agreement between theoretical PDPs. Finally, new sum-of-sinusoids-based simulation wideband statistics of verified by...
This paper compares performance of the single-frequency floating-intercept (FI) model, close-in (CI) multi-frequency alpha-beta-gamma (ABG) and frequency-dependant (CIF) model at 30 GHz, 140 300 GHz. For comparison purposes, extensive propagation measurements GHz (26.5-40 GHz), D-band (110-170 (300-316 GHz) are conducted in indoor line-of-sight (LoS) environments. The results show that if no measurement error is present channel impulse response, all four models have very similar with...
This paper presents measurements and characterization of D-band indoor channels. The are performed in line-of-sight (LoS), obstructed-LoS (OLoS), reflected non-LoS (RNLoS) environments. For OLoS sceanrio, cylindrical objects different materials used as an obstruction. RNLoS, surfaces reflectors. From the large set LoS measured data, parameters for single-slope path loss model with shadowing devised. Furthermore, analysis multipath propagation is performed. results show that strong multiple...
A 3-D geometrical propagation model that includes both stationary and moving scatterers around the transmitter receiver for narrow-band multiple-input-multiple-output (MIMO) vehicle-to-vehicle (V-to-V) communications is proposed. Based on model, a parametric reference MIMO V-to-V multipath fading channels developed. From corresponding space-time correlation function (ST-CF) space-Doppler power spectral density (SD-PSD) are derived nonisotropic scattering environment. Finally, theoretical...
Recent advances in embedded and IoT (internet-of-things) technologies are rapidly transforming health-care solutions we headed to a future of smaller, smarter, wearable connected medical devices. advanced health sensors provide more convenience patients physicians. Where physicians can now wirelessly automatically monitor patient's state. While these devices lot new opportunities improve the care system, they also introduce set security risks since networks. More importantly, extremely...
This paper presents an algorithm for finding carriers of frequency-modulated (FM) and amplitude-modulated (AM) electromagnetic (EM) emanations from computer systems. Computer systems create EM across the RF spectrum making it difficult, error-prone, time consuming to find relatively few that expose sensitive information. One most common simplest mechanisms information leakage occurs when amplitude or a frequency existing strong signal (e.g., processor memory clock) is modulated by system...
This article presents details about an extensive channel measurement campaign and subsequent statistical models for the characterization of 300 GHz channels wireless rack-to-rack (R2R) blade-to-blade (B2B) communications in a data center-like environment. Measurements were conducted various scenarios such as R2R line-of-sight (LoS), obstructed-LoS (OLoS), reflected-non-LoS (RNLoS), obstructed-RNLoS (ORNLoS), B2B RNLoS, ORNLoS, LoS scenarios. In aforementioned scenarios, we explored impact...
This paper presents Spectral Profiling, a new method for profiling program execution without instrumenting or otherwise affecting the profiled system. Profiling monitors EM emanations unintentionally produced by system, looking spectral "spikes" periodic activity (e.g. loops). allows to determine which parts of have executed at what time. By analyzing frequency and shape "spike", can obtain additional information such as per-iteration time loop. The key advantage is that it monitor system...
While all computation generates electromagnetic (EM) side-channel signals, some of the strongest and farthest-propagating signals are created when an existing strong periodic signal (e.g. a clock signal) becomes stronger or weaker (amplitude-modulated) depending on processor memory activity. However, modern systems create emanations at thousands different frequencies, so it is difficult, error-prone, time-consuming task to find those few that AM-modulated by processor/memory
This paper presents an approach for zero-overhead profiling (ZOP). ZOP accomplishes accurate program with no modification to the or system during and dedicated hardware features. To do so, records electromagnetic (EM) emanations generated by computing systems execution analyzes recorded track a program's path generate information. Our consists of two main phases. In training phase, instruments runs it against set inputs collect timing information while simultaneously collecting waveforms EM...
This paper describes a new physical side channel, i.e., the backscattering created by transmitting signal toward integrated circuits (ICs), where internal impedance changes caused on-chip switching activity modulate that is backscattered (reflected) from IC. To demonstrate how this channel can be used to detect small in circuit impedances, we propose method for nondestructively detecting hardware Trojans (HTs) outside chip. We experimentally confirm, using measurements on one instance...
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our physical world while being continuously exposed to potential cyber-attacks. These typically have limited performance, memory, energy reserves, which limits their ability run existing advanced malware protection, that, in turn, makes securing them very challenging. To tackle these problems, this paper proposes, REMOTE, a new robust framework detect by externally observing Electromagnetic (EM) signals...
We propose a novel framework called IDEA that exploits electromagnetic (EM) side-channel signals to detect malicious activity on embedded and cyber-physical systems (CPS). first records EM emanations from an uncompromised reference device establish baseline of patterns. then monitors the target device's emanations. When observed deviate patterns, reports this as anomalous or activity. does not require any resource infrastructure on, modification to, monitored system itself. In fact, is...