Youngsam Park, Damon McCoy, and Elaine Shi Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of...
Author: Emerald Knox (Emerald Knox)
Systems, Processes and Computer-Accessible Medium for Providing Logic Encryption Utilizing Fault Analysis
Ozgur Sinanoglu, Youngok Pino, Jeyavijayan Rajendran, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums can encrypting a circuit by determining at least one location to insert at least one gate in the circuit using a fault analysis, and inserting the at least one gate in at least one section of the at least one...
Test access system, method and computer-accessible medium for chips with spare identical cores
Ozgur Sinanoglu Exemplary system, method and computer-accessible medium for testing a multi-core chip can be provided which can have and/or utilize a plurality of identical cores. This can be performed by comparing each core with as many as at least the number of spare cores plus 1 using a comparator; the number of comparators can...
A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications
Samah Mohamed Saeed and Ozgur Sinanoglu Testability is a perennial concern that requires ever-improved solutions; however, potentially resultant security vulnerabilities need to be considered as well. This article provides a compact look at a body of DfT work from lead practitioners in the field. The DfT strategies address predicting and data Potential impacts DfT controlling test...
System, Method And Computer-Accessible Medium For Facilitating Logic Encryption
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s)...
Thwarting location privacy protection in location‐based social discovery services
Minhui Xue, Yong Liu, Keith W. Ross, and Haifeng Qian In this paper, we investigate the user location privacy leakage problem in LBSD services reporting distances in discrete bands. Using number theory, we analytically show that by strategically placing multiple virtual probes with fake Global Positioning System locations, one can nevertheless localize user locations in...
System, Method and Computer-Accessible Medium for Providing Secure Split Manufacturing
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include...
Optimal De-Anonymization in Random Graphs with Community Structure
Efe Onaran, Siddharth Garg, and Elza Erkip Anonymized social network graphs published for academic or advertisement purposes are subject to de-anonymization attacks by leveraging side information in the form of a second, public social network graph correlated with the anonymized graph. This is because the two are from the same underlying graph of true social...
Adapting to Varying Distribution of Unknown Response Bits
Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev In this article, we present several adaptive strategies to enable adaptive unknown bit masking for faster-than-at-speed testing so as to ensure no yield loss while attaining the maximum test quality based on tester memory constraints. We also develop a tester-enabled compression scheme that helps alleviate memory constraints...
Providing a fast, remote security service using hashlists of approved web objects
Justin Cappos, Nasir Memon, Sai Teja Peddinti, and Keith Ross A security system and service, which improves the performance of SECaaS services, is described. A security server system tracks the content that has successfully passed through its security modules and distributes this information to the end user client devices as hashlist information. The remote client devices can...