Judith H. Germano Criminal actors have an increasing ability to commit serious crimes remotely via computers, while concealing their identity and location through the use of various means, including Tor hidden service protocols. To effectively identify and apprehend these criminals, law enforcement must be nimble and technologically savvy, and must employ regularly updated investigative tools.
Category: Publications
Test access system, method and computer-accessible medium for chips with spare identical cores
Ozgur Sinanoglu Exemplary system, method and computer-accessible medium for testing a multi-core chip can be provided which can have and/or utilize a plurality of identical cores. This can be performed by comparing each core with as many as at least the number of spare cores plus 1 using a comparator; the number of comparators can...
A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications
Samah Mohamed Saeed and Ozgur Sinanoglu Testability is a perennial concern that requires ever-improved solutions; however, potentially resultant security vulnerabilities need to be considered as well. This article provides a compact look at a body of DfT work from lead practitioners in the field. The DfT strategies address predicting and data Potential impacts DfT controlling test...
System, Method And Computer-Accessible Medium For Facilitating Logic Encryption
Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s)...
Thwarting location privacy protection in location‐based social discovery services
Minhui Xue, Yong Liu, Keith W. Ross, and Haifeng Qian In this paper, we investigate the user location privacy leakage problem in LBSD services reporting distances in discrete bands. Using number theory, we analytically show that by strategically placing multiple virtual probes with fake Global Positioning System locations, one can nevertheless localize user locations in...
System, Method and Computer-Accessible Medium for Providing Secure Split Manufacturing
Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include...
Optimal De-Anonymization in Random Graphs with Community Structure
Efe Onaran, Siddharth Garg, and Elza Erkip Anonymized social network graphs published for academic or advertisement purposes are subject to de-anonymization attacks by leveraging side information in the form of a second, public social network graph correlated with the anonymized graph. This is because the two are from the same underlying graph of true social...
Adapting to Varying Distribution of Unknown Response Bits
Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev In this article, we present several adaptive strategies to enable adaptive unknown bit masking for faster-than-at-speed testing so as to ensure no yield loss while attaining the maximum test quality based on tester memory constraints. We also develop a tester-enabled compression scheme that helps alleviate memory constraints...
Providing a fast, remote security service using hashlists of approved web objects
Justin Cappos, Nasir Memon, Sai Teja Peddinti, and Keith Ross A security system and service, which improves the performance of SECaaS services, is described. A security server system tracks the content that has successfully passed through its security modules and distributes this information to the end user client devices as hashlist information. The remote client devices can...
Bullet-Proof Credit Card Processing
Damon McCoy In this talk, I will first describe the process of disrupting counterfeit credit card processing which involves placing a test purchase with an online counterfeit website to trace the merchant account accepting payments and then filing a complaint with the card holder association, such as Visa or MasterCard.