- Physical Unclonable Functions (PUFs) and Hardware Security
- Integrated Circuits and Semiconductor Failure Analysis
- Neuroscience and Neural Engineering
- VLSI and Analog Circuit Testing
- Microbial Community Ecology and Physiology
- Evolution and Genetic Dynamics
- Algal biology and biofuel production
- Formal Methods in Verification
- Interconnection Networks and Systems
- Embedded Systems Design Techniques
- Advanced Memory and Neural Computing
- Security and Verification in Computing
- Human-Automation Interaction and Safety
- Studies on Chitinases and Chitosanases
- Fault Detection and Control Systems
- Microbial Metabolic Engineering and Bioproduction
- Wastewater Treatment and Nitrogen Removal
- Healthcare Technology and Patient Monitoring
- Radiation Effects in Electronics
- Parallel Computing and Optimization Techniques
ETH Zurich
2023-2024
Indian Institute of Technology Patna
2019
Case Western Reserve University
2011-2016
Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors typically fabless, it is more economical to outsource device production off-shore facilities. This introduces many opportunities for the insertion malicious alterations devices foundry, referred as hardware Trojan attacks, that can cause logical physical malfunctions during field operation. The...
Competition plays a key role in shaping the structure and diversity of bacterial populations. In many clinically important species, strains compete at multiple scales: between-host scale for new hosts to colonise, within-host during co-colonisation. Characterising these facets competition an understanding ecology. This is particularly relevant antibiotic resistance, where between antibiotic-susceptible resistant determines resistance dynamics. this work, we perform survival analyses on large...
Various design-for-security (DFS) approaches have been proposed earlier for detection of hardware Trojans, which are malicious insertions in Integrated Circuits (ICs). In this paper, we highlight our major findings terms innovative Trojan design that can easily evade existing based on functional testing or side-channel analysis. particular, illustrate and placement sequential rarely activated/observed incur ultralow delay/power overhead. We provide models, examples, theoretical analysis...
Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide range of embedded applications signal processing, multimedia, and security. FPGA device production is often outsourced to off-shore facilities for economic reasons. This opens up the opportunities insertion malicious design alterations foundry, referred as Trojan attacks, cause logical physical malfunction. The vulnerability these devices attacks raises security concerns regarding assurance. In...
Growing threat of hardware Trojan attacks in untrusted foundry or design house has motivated researchers around the world to analyze and develop effective countermeasures. In this paper, we focus on analyzing a specific class Trojans embedded processor that can be enabled by software data leak critical information. These pose serious pervasively deployed systems. An attacker trigger these extract valuable information from system during field deployment. We show an adversary low-overhead...
Physical Unclonable Functions (PUFs) have emerged as an attractive primitive to address diverse hardware security issues, such chip authentication, intellectual property (IP) protection and cryptographic key generation. Existing PUFs, typically acquired integrated in a design commodity, often incur considerable overhead. Many of these PUFs also suffer from insufficient challenge-response pairs. In this paper, we propose ScanPUF, novel PUF implementation using common on-chip structure used...
Resource availability dictates how fast and much microbial populations grow. Quantifying the relationship between growth resource concentrations makes it possible to promote, inhibit, predict activity. Microbes require many resources, including macronutrients (e.g., carbon nitrogen), micronutrients metals), complex nutrients like vitamins amino acids. When multiple resources are scarce, as occurs in nature, microbes may experience colimitation which more than one limits simultaneously....
For data-intensive applications, energy expended in on-chip computation constitutes only a small fraction of the total consumption. The primary contribution comes from transporting data between off-chip memory and computing elements-a limitation referred to as Von-Neumann bottleneck. In such scenario, improving compute through parallel processing or hardware acceleration brings minor improvements requirement system. We note that an effective solution mitigate bottleneck is develop framework...
Resource competition strongly shapes microbial community dynamics and function. In polysaccharide-degrading communities, primary degraders secrete monomer-releasing enzymes exploiters consume released products without investing in enzymes. By investigating competitive strategies between chitin N-acetylglucosamine (GlcNAc) exploiters, we uncover several interacting factors, including GlcNAc liberation rates, diffusive loss, resource partitioning competitors, which determine viability growth...
Reverse Engineering (RE) has been historically considered as a powerful approach to understand electronic hardware in order gain competitive intelligence or accomplish piracy. In recent years, it also looked at way authenticate intellectual properties the court of law. this paper, we propose beneficial role RE post-silicon validation integrated circuits (IC) with respect IC functionality, reliability and integrity. Unlike traditional destructive approaches, fast non-destructive side-channel...
Resource availability dictates how fast and much microbial populations grow. Quantifying the relationship between growth resource concentrations makes it possible to promote, inhibit, predict activity. Microbes require many resources, including macronutrients (e.g., carbon nitrogen), micronutrients metals), complex nutrients like vitamins amino acids. When multiple resources are scarce, as frequently occurs in nature, microbes may experience colimitation which more than one simultaneously...
Bounded Model Checking (BMC), as a formal method of verifying VLSI circuits, shows violation given circuit property by finding counter-example to the along bounded state paths circuit. In this paper, we present an emulation framework for Automatic Test Pattern Generation (ATPG)-BMC model capable checking properties on gate-level design. our approach, counterpart is mapped into structural monitor with one output. A target fault then injected at output, and modified ATPG-based justification...
Alarm floods are dangerous because the quantity of alarms triggered is too numerous for operators to reliably implement right corrective action. Process complex systems, such as chemical plants or nuclear power production, faced with alarm management systems that can be better built in consideration human capabilities and limitations. Developing human-machine interfaces (HMIs) support critical ensuring safe reliable operation processes. The research team has developed an accessible adaptable...