Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 79

Full-Text Articles in Engineering

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao Mar 2024

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao

Masters Theses

Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.

Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Analog Cancellation Of A Known Remote Interference: Hardware Realization And Analysis, James M. Doty Nov 2023

Analog Cancellation Of A Known Remote Interference: Hardware Realization And Analysis, James M. Doty

Masters Theses

The onset of quantum computing threatens commonly used schemes for information secrecy across wireless communication channels, particularly key-based data-level encryption. This calls for secrecy schemes that can provide everlasting secrecy resistant to increased computational power of an adversary. One novel physical layer scheme proposes that an intended receiver capable of performing analog cancellation of a known key-based interference would hold a significant advantage in recovering small underlying messages versus an eavesdropper performing cancellation after analog-to-digital conversion. This advantage holds even in the event that an eavesdropper can recover and use the original key in their digital cancellation. Inspired by this …


Fingerprinting For Chiplet Architectures Using Power Distribution Network Transients, Matthew G. Burke Aug 2023

Fingerprinting For Chiplet Architectures Using Power Distribution Network Transients, Matthew G. Burke

Masters Theses

Chiplets have become an increasingly popular technology for extending Moore's Law and improving the reliability of integrated circuits. They do this by placing several small, interacting chips on an interposer rather than the traditional, single chip used for a device. Like any other type of integrated circuit, chiplets are in need of a physical layer of security to defend against hardware Trojans, counterfeiting, probing, and other methods of tampering and physical attacks.

Power distribution networks are ubiquitous across chiplet and monolithic ICs, and are essential to the function of the device. Thus, we propose a method of fingerprinting transient signals …


Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron Aug 2023

Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron

Masters Theses

Here we present the design, assembly and successful ion trapping of a room-temperature ion trap system with a custom designed and fabricated surface electrode ion trap, which allows for rapid prototyping of novel trap designs such that new chips can be installed and reach UHV in under 2 days. The system has demonstrated success at trapping and maintaining both single ions and cold crystals of ions. We achieve this by fabricating our own custom surface Paul traps in the UMass Amherst cleanroom facilities, which are then argon ion milled, diced, mounted and wire bonded to an interposer which is placed …


Electrothermal Properties Of 2d Materials In Device Applications, Samantha L. Klein Apr 2023

Electrothermal Properties Of 2d Materials In Device Applications, Samantha L. Klein

Masters Theses

To keep downsizing transistors, new materials must be explored since traditional 3D materials begin to experience tunneling and other problematic physical phenomena at small sizes. 2D materials are appealing due to their thinness and bandgap. The relatively weak van der Waals forces between layers in 2D materials allow easy exfoliation and device fabrication but they also result in poor heat transfer to the substrate, which is the main path for heat removal. The impaired thermal coupling is exacerbated in few-layer devices where heat dissipated in the layers further from the substrate encounters additional interlayer thermal resistance before reaching the substrate, …


Heterogeneous Iot Network Architecture Design For Age Of Information Minimization, Xiaohao Xia Feb 2023

Heterogeneous Iot Network Architecture Design For Age Of Information Minimization, Xiaohao Xia

Masters Theses

Timely data collection and execution in heterogeneous Internet of Things (IoT) networks in which different protocols and spectrum bands coexist such as WiFi, RFID, Zigbee, and LoRa, requires further investigation. This thesis studies the problem of age-of-information minimization in heterogeneous IoT networks consisting of heterogeneous IoT devices, an intermediate layer of multi-protocol mobile gateways (M-MGs) that collects and relays data from IoT objects and performs computing tasks, and heterogeneous access points (APs). A federated matching framework is presented to model the collaboration between different service providers (SPs) to deploy and share M-MGs and minimize the average weighted sum of the …


Formally Verifiable Synthesis Flow In Fpgas, Anurag V. Muttur Oct 2022

Formally Verifiable Synthesis Flow In Fpgas, Anurag V. Muttur

Masters Theses

FPGAs are used in a wide variety of digital systems. Due to their ability to support parallelism and specialization, these devices are becoming more commonplace in fields such as machine learning. One of the biggest benefits of FPGAs, logic specialization, can lead to security risks. Prior research has shown that a large variety of malicious circuits can snoop on sensitive user data, induce circuit faults, or physically damage the FPGA. These Trojan circuits can easily be crafted and embedded in FPGA designs. Often, these Trojans are small, consume little power in comparison to the target circuit, and are hard to …


Integration Of Digital Signal Processing Block In Symbiflow Fpga Toolchain For Artix-7 Devices, Andrew T. Hartnett Oct 2022

Integration Of Digital Signal Processing Block In Symbiflow Fpga Toolchain For Artix-7 Devices, Andrew T. Hartnett

Masters Theses

The open-source community is a valuable resource for many hobbyists and researchers interested in collaborating and contributing towards publicly available tools. In the area of field programmable gate arrays (FPGAs) this is no exception. Contributors seek to reverse-engineer the functions of large proprietary FPGA devices. An interesting challenge for open-source FPGA engineers has been reverse-engineering the operation and bitstreams of digital signal processing (DSP) blocks located in FPGAs. SymbiFlow is an open-source FPGA toolchain designed as a free alternative to proprietary computer-aided design tools like Xilinx’s Vivado. For SymbiFlow, mapping logical multipliers to DSP blocks and generating DSP block bitstreams …


Theory And Analysis Of Backprojection Processing For Interferometric Sar, Marc Closa Tarres Jun 2022

Theory And Analysis Of Backprojection Processing For Interferometric Sar, Marc Closa Tarres

Masters Theses

Synthetic Aperture Radar (SAR) is a well-known radar technique widely used for 2D and 3D imaging since the 1960s. SAR systems offer all-weather, day and night, high-resolution imaging by using the motion of the antenna over the target of interest. By later use of signal processing techniques, the received echoes can be put back together using precise knowledge of the system location and geometry to obtain the distinct high-resolution SAR imagery.

Moreover, when the system is equipped with multiple antennas, topography and topographic changes in the region of interest can be inferred using interferometric techniques.

The Microwave Remote Sensing Laboratory …


Planar Ultra-Wideband Modular Antenna (Puma) Arrays For High-Volume Manufacturing On Organic Laminates And Bga Interfaces, James R. Lacroix Mar 2022

Planar Ultra-Wideband Modular Antenna (Puma) Arrays For High-Volume Manufacturing On Organic Laminates And Bga Interfaces, James R. Lacroix

Masters Theses

This work proposes wideband and broadband Planar Ultra-wideband Modular Antenna (PUMA) arrays designed to improve cost and reliability for high production volume commercial and military applications. The designs feature simplified PCB stack-ups with high dielectric constant (Dk) dimensionally stable materials to improve the manufacturing cost and yield. Additionally, the packages use ball grid array (BGA) interconnects, commonly used in digital electronics, for simple solder reflow integration with radio frequency (RF) electronics. While high Dk materials present practical manufacturing benefits, theoretical background will show how and why PUMA arrays lose frequency bandwidth and scan volume with high Dk materials. Further, a …


Modeling And Characterization Of Optical Metasurfaces, Mahsa Torfeh Oct 2021

Modeling And Characterization Of Optical Metasurfaces, Mahsa Torfeh

Masters Theses

Metasurfaces are arrays of subwavelength meta-atoms that shape waves in a compact and planar form factor. During recent years, metasurfaces have gained a lot of attention due to their compact form factor, easy integration with other devices, multi functionality and straightforward fabrication using conventional CMOS techniques. To provide and evaluate an efficient metasurface, an optimized design, high resolution fabrication and accurate measurement is required. Analysis and design of metasurfaces require accurate methods for modeling their interactions with waves. Conventional modeling techniques assume that metasurfaces are locally periodic structures excited by plane waves, restricting their applicability to gradually varying metasurfaces that …


Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi Oct 2021

Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi

Masters Theses

Quantitative structure-activity relationship (QSAR) models based on machine learning algorithms are powerful tools to expedite drug discovery processes and therapeutics development. Given the cost in acquiring large-sized training datasets, it is useful to examine if QSAR analysis can reasonably predict drug activity with only a small-sized dataset (size < 100) and benchmark these small-dataset QSAR models in application-specific studies. To this end, here we present a systematic benchmarking study on small-dataset QSAR models built for prediction of effective Wnt signaling inhibitors, which are essential to therapeutics development in prevalent human diseases (e.g., cancer). Specifically, we examined a total of 72 two-dimensional (2D) QSAR models based on 4 best-performing algorithms, 6 commonly used molecular fingerprints, and 3 typical fingerprint lengths. We trained these models using a training dataset (56 compounds), benchmarked their performance on 4 figures-of-merit (FOMs), and examined their prediction accuracy using an external validation dataset (14 compounds). Our data show that the model performance is maximized when: 1) molecular fingerprints are selected to provide sufficient, unique, and not overly detailed representations of the chemical structures of drug compounds; 2) algorithms are selected to reduce the number of false predictions due to class imbalance in the dataset; and 3) models are selected to reach balanced performance on all 4 FOMs. These results may provide general guidelines in developing high-performance small-dataset QSAR models for drug activity prediction.


A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David Sep 2021

A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David

Masters Theses

Technology development in the sub-field of older adult care has always been on the back-burner compared to other healthcare areas. But with increasing life expectancy, this is poised to change. With the increasing older adult population, the current older adult care facilities and personnel are struggling to keep up with demand. Research conducted in the Netherlands [1] found 33,000 older adults were awaiting admission into a home for the elderly showing that demand far exceeds availability. This huge demand for older adult care has resulted in a decrease in the quality of care being provided. A recent study involving older …


Mtemp: An Ambient Temperature Estimation Method Using Acoustic Signal On Mobile Devices, Hao Guo May 2021

Mtemp: An Ambient Temperature Estimation Method Using Acoustic Signal On Mobile Devices, Hao Guo

Masters Theses

Ambient temperature sensing plays an important role in a number of applications in agriculture, industry, daily health care. In this thesis project, we propose a new acoustic-based ambient temperature sensing method called Mtemp. Mtemp empowers acoustic-enabled IoT devices, smartphones to perform ambient air temperature sensing without additional hardware. Basically, Mtemp utilizes on-board speaker and microphone to calculate the propagation speed of acoustic signal by measuring the phrase of the target signal, thereby estimate the ambient temperature according to a roughly linear relationship between temperature and sound speed. Mtemp is portable and economical, making it competitive compared with traditional thermometers for …


Correcting For Terrain Interference, Attenuation, And System Bias For A Dual Polarimetric, X-Band Radar, Casey Wolsieffer Apr 2021

Correcting For Terrain Interference, Attenuation, And System Bias For A Dual Polarimetric, X-Band Radar, Casey Wolsieffer

Masters Theses

This thesis outlines the procedure and theory used to calibrate the UMass eXperimental X-band Radar (UMAXX) for the purpose of monitoring meteorological events in the Pioneer Valley region. Due to the complex topography of the area, lower tilt angles are subject to partial or full beam blockage as well as ground clutter observed through the main beam or sidelobes. Additionally, there are biases internal and external to the system that impact the reflectivity and differential reflectivity measurements. These biases and corrections are addressed in this work. As the radar has been operational since September of 2018, there is ample data …


Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


Perception System: Object And Landmark Detection For Visually Impaired Users, Chenguang Zhang Sep 2020

Perception System: Object And Landmark Detection For Visually Impaired Users, Chenguang Zhang

Masters Theses

This paper introduces a system which enables visually impaired users to detect objects and landmarks within the line of sight. The system works in two modes: landmark mode, which detects predefined landmarks, and object mode, which detects objects for everyday use. Users can get audio announcement for the name of the detected object or landmark as well as its estimated distances. Landmark detection helps visually impaired users explore an unfamiliar environment and build a mental map.

The proposed system utilizes a deep learning system for detection, which is deployed on the mobile phone and optimized to run in real-time. Unlike …


Thermal Transport Modeling Of Semiconductor Materials From First Principles, Aliya Qureshi Aug 2020

Thermal Transport Modeling Of Semiconductor Materials From First Principles, Aliya Qureshi

Masters Theses

Over the past few years, the size of semiconductor devices has been shrinking whereas the density of transistors has exponentially increased. Thus, thermal management has become a serious concern as device performance and reliability is greatly affected by heat. An understanding of thermal transport properties at device level along with predictive modelling can lead us to design of new systems and materials tailored according to the thermal conductivity. In our work we first review different models used to calculate thermal conductivity and examine their accuracy using the experimentally measured thermal conductivity for Si. Our results suggest that empirically calculated rates …


Numerical Simulation Of Thermoelectric Transport In Bulk And Nanostructured Sisn Alloys, Venkatakrishna Dusetty Jul 2020

Numerical Simulation Of Thermoelectric Transport In Bulk And Nanostructured Sisn Alloys, Venkatakrishna Dusetty

Masters Theses

The current high demand for sustainable and renewable energy sources to solve world energy crisis has enormously increased interest in looking at alternative sources of energy. All the machines used in manufacturing process, electricity generation, residential applications, transportation etc., rejects energy in the form of heat into environment. Thermoelectric materials can convert thermal-to-electrical and electrical-to-thermal energy and can be utilized in waste-heat harvesting, more efficient cooling to reduce energy usage and CO2 emissions. Significant research efforts have been devoted over the past decade to thermoelectric materials, with particular emphasis being placed on combining materials selection with nanostructuring. The overarching …


Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse Jul 2020

Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse

Masters Theses

The power side-channel attack, which allows an attacker to derive secret information from power traces, continues to be a major vulnerability in many critical systems. Numerous countermeasures have been proposed since its discovery as a serious vulnerability, including both hardware and software implementations. Each countermeasure has its own drawback, with some of the highly effective countermeasures incurring large overhead in area and power. In addition, many countermeasures are quite invasive to the design process, requiring modification of the design and therefore additional validation and testing to ensure its accuracy. Less invasive countermeasures that do not require directly modifying the system …


Accelerating Rsa Public Key Cryptography Via Hardware Acceleration, Pavithra Ramesh Apr 2020

Accelerating Rsa Public Key Cryptography Via Hardware Acceleration, Pavithra Ramesh

Masters Theses

A large number and a variety of sensors and actuators, also known as edge devices of the Internet of Things, belonging to various industries - health care monitoring, home automation, industrial automation, have become prevalent in today's world. These edge devices need to communicate data collected to the central system occasionally and often in burst mode which is then used for monitoring and control purposes. To ensure secure connections, Asymmetric or Public Key Cryptography (PKC) schemes are used in combination with Symmetric Cryptography schemes. RSA (Rivest - Shamir- Adleman) is one of the most prevalent public key cryptosystems, and has …


Crosstalk Based Side Channel Attacks In Fpgas, Chethan Ramesh Apr 2020

Crosstalk Based Side Channel Attacks In Fpgas, Chethan Ramesh

Masters Theses

As FPGA use becomes more diverse, the shared use of these devices becomes a security concern. Multi-tenant FPGAs that contain circuits from multiple independent sources or users will soon be prevalent in cloud and embedded computing environments. The recent discovery of a new attack vector using neighboring long wires in Xilinx SRAM FPGAs presents the possibility of covert information leakage from an unsuspecting user's circuit. The work makes two contributions that extend this finding. First, we rigorously evaluate several Intel SRAM FPGAs and confirm that long wire information leakage is also prevalent in these devices. Second, we present the first …


Compressive Parameter Estimation Via Approximate Message Passing, Shermin Hamzehei Apr 2020

Compressive Parameter Estimation Via Approximate Message Passing, Shermin Hamzehei

Masters Theses

The literature on compressive parameter estimation has been mostly focused on the use of sparsity dictionaries that encode a discretized sampling of the parameter space; these dictionaries, however, suffer from coherence issues that must be controlled for successful estimation. To bypass such issues with discretization, we propose the use of statistical parameter estimation methods within the Approximate Message Passing (AMP) algorithm for signal recovery. Our method leverages the recently proposed use of custom denoisers in place of the usual thresholding steps (which act as denoisers for sparse signals) in AMP. We introduce the design of analog denoisers that are based …


A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna Oct 2019

A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna

Masters Theses

With growing connectivity in the modern era, the risk of encrypted data stored in hardware being exposed to third-party adversaries is higher than ever. The security of encrypted data depends on the secrecy of the stored key. Conventional methods of storing keys in Non-Volatile Memory have been shown to be susceptible to physical attacks. Physically Unclonable Functions provide a unique alternative to conventional key storage. SRAM PUFs utilize inherent process variation caused during manufacturing to derive secret keys from the power-up values of SRAM memory cells.

This thesis analyzes the effect of supply ramp-up times on the reliability of SRAM …


The Umass Experimental X-Band Radar (Umaxx): An Upgrade Of The Casa Ma-1 To Support Cross-Polarization Measurements, Jezabel Vilardell Sanchez Aug 2019

The Umass Experimental X-Band Radar (Umaxx): An Upgrade Of The Casa Ma-1 To Support Cross-Polarization Measurements, Jezabel Vilardell Sanchez

Masters Theses

Ground-based radars are instruments commonly used to surveil the precipitation climate of the surrounding areas. Weather events are characterized by collecting backscatter data and analyzing computed products such as the Reflectivity Factor, the Doppler Velocity, the Spectrum Width, the Differential Reflectivity, the Co-polar Correlation Coefficient and the Differential Propagation Phase. The ability of the radar to transmit different polarization waves, such as horizontal and vertical polarization, allow for further analysis of the weather given the capability to perform co-polar and cross-polar measurements. The Linear Depolarization Ratio is another computed product based on the difference in power between the co-polarized and …


Improving Resilience Of Communication In Information Dissemination For Time-Critical Applications, Rajvardhan Somraj Deshmukh Jul 2019

Improving Resilience Of Communication In Information Dissemination For Time-Critical Applications, Rajvardhan Somraj Deshmukh

Masters Theses

Severe weather impacts life and in this dire condition, people rely on communication, to organize relief and stay in touch with their loved ones. In such situations, cellular network infrastructure\footnote{We refer to cellular network infrastructure as infrastructure for the entirety of this document} might be affected due to power outage, link failures, etc. This urges us to look at Ad-hoc mode of communication, to offload major traffic partially or fully from the infrastructure, depending on the status of it.

We look into threefold approach, ranging from the case where the infrastructure is completely unavailable, to where it has been replaced …


Energy Efficiency Of Computation In All-Spin Logic: Projections And Fundamental Limits, Zongya Chen Mar 2019

Energy Efficiency Of Computation In All-Spin Logic: Projections And Fundamental Limits, Zongya Chen

Masters Theses

Built with nanomagnets, a spintronic device called the all-spin logic (ASL) device carries information with only spin currents, resulting in a low power supply--10 mV. This voltage is 100 times smaller than the conventional CMOS devices (usually 0.8~1V). The potential for improved energy efficiency made possible by the low operating voltage of ASL makes it one of the most promising devices among its post-CMOS competitors.

The basic working principles of ASL device are introduced in this thesis and two complementary approaches to studying energy efficiency of computation are applied to a common set of ASL circuits: (1) a circuit simulation …


Insar Simulations For Swot And Dual Frequency Processing For Topographic Measurements, Gerard Masalias Huguet Mar 2019

Insar Simulations For Swot And Dual Frequency Processing For Topographic Measurements, Gerard Masalias Huguet

Masters Theses

In Earth remote sensing precise characterization of the backscatter coefficient is important to extract valuable information about the observed target. A system that eliminates platform motion during near-nadir airborne observations is presented in this thesis, showing an improvement on the accuracy of measurements for a Ka- band scatterometer previously developed at Microwave Remote Sensing Laboratory (MIRSL). These very same results are used to simulate the reflectivity of such targets as seen from a spaceborne radar and estimate height errors based on mission-specific geometry. Finally, data collected from a dual-frequency airborne interferometer com- prised by the Ka-band system and an S-band …


On-Chip Communication And Security In Fpgas, Shivukumar Basanagouda Patil Oct 2018

On-Chip Communication And Security In Fpgas, Shivukumar Basanagouda Patil

Masters Theses

Innovations in Field Programmable Gate Array (FPGA) manufacturing processes and architectural design have led to the development of extremely large FPGAs. There has also been a widespread adaptation of these large FPGAs in cloud infrastructures and data centers to accelerate search and machine learning applications. Two important topics related to FPGAs are addressed in this work: on-chip communication and security. On-chip communication is quickly becoming a bottleneck in to- day’s large multi-million gate FPGAs. Hard Networks-on-Chip (NoC), made of fixed silicon, have been shown to provide low power, high speed, flexible on-chip communication. An iterative algorithm for routing pre-scheduled time-division-multiplexed …