Category: Publications

Home / Publications
Post

Law Enforcement Online: Innovative Doesn’t Mean Illegal

Judith H. Germano Criminal actors have an increasing ability to commit serious crimes remotely via computers, while concealing their identity and location through the use of various means, including Tor hidden service protocols. To effectively identify and apprehend these criminals, law enforcement must be nimble and technologically savvy, and must employ regularly updated investigative tools.

Post

A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications

Samah Mohamed Saeed and Ozgur Sinanoglu Testability is a perennial concern that requires ever-improved solutions; however, potentially resultant security vulnerabilities need to be considered as well. This article provides a compact look at a body of DfT work from lead practitioners in the field. The DfT strategies address predicting and data Potential impacts DfT controlling test...

Post

System, Method And Computer-Accessible Medium For Facilitating Logic Encryption

Jeyavijayan Rajendran, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri Exemplary systems, methods and computer-accessible mediums for encrypting at least one integrated circuit (IC) can include determining, using an interference graph, at least one location for a proposed insertion of at least one gate in or at the at least one IC, and inserting the gate(s) into the IC(s)...

Post

Thwarting location privacy protection in location‐based social discovery services

Minhui Xue, Yong Liu, Keith W. Ross, and Haifeng Qian In this paper, we investigate the user location privacy leakage problem in LBSD services reporting distances in discrete bands. Using number theory, we analytically show that by strategically placing multiple virtual probes with fake Global Positioning System locations, one can nevertheless localize user locations in...

Post

System, Method and Computer-Accessible Medium for Providing Secure Split Manufacturing

Jeyavijayan Rajendran, Ozgur Sinanoglu, and Ramesh Karri  Exemplary systems, methods and computer-accessible mediums can secure split manufacturing of an integrated circuit by modifying a previous location of at least one pin to a further location of the at least one pin based on a fault analysis procedure. A determination of the further location can include...

Post

Optimal De-Anonymization in Random Graphs with Community Structure

Efe Onaran, Siddharth Garg, and Elza Erkip Anonymized social network graphs published for academic or advertisement purposes are subject to de-anonymization attacks by leveraging side information in the form of a second, public social network graph correlated with the anonymized graph. This is because the two are from the same underlying graph of true social...

Post

Adapting to Varying Distribution of Unknown Response Bits

Chandra K. H. Suresh, Ozgur Sinanoglu, and Sule Ozev In this article, we present several adaptive strategies to enable adaptive unknown bit masking for faster-than-at-speed testing so as to ensure no yield loss while attaining the maximum test quality based on tester memory constraints. We also develop a tester-enabled compression scheme that helps alleviate memory constraints...

Post

Providing a fast, remote security service using hashlists of approved web objects

Justin Cappos, Nasir Memon, Sai Teja Peddinti, and Keith Ross A security system and service, which improves the performance of SECaaS services, is described. A security server system tracks the content that has successfully passed through its security modules and distributes this information to the end user client devices as hashlist information. The remote client devices can...

Post

Bullet-Proof Credit Card Processing

Damon McCoy In this talk, I will first describe the process of disrupting counterfeit credit card processing which involves placing a test purchase with an online counterfeit website to trace the merchant account accepting payments and then filing a complaint with the card holder association, such as Visa or MasterCard.