Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 72

Full-Text Articles in Computer Engineering

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao Mar 2024

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao

Masters Theses

Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.

Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …


Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu Mar 2024

Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu

Masters Theses

In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.

The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …


Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron Aug 2023

Design And Fabrication Of A Trapped Ion Quantum Computing Testbed, Christopher A. Caron

Masters Theses

Here we present the design, assembly and successful ion trapping of a room-temperature ion trap system with a custom designed and fabricated surface electrode ion trap, which allows for rapid prototyping of novel trap designs such that new chips can be installed and reach UHV in under 2 days. The system has demonstrated success at trapping and maintaining both single ions and cold crystals of ions. We achieve this by fabricating our own custom surface Paul traps in the UMass Amherst cleanroom facilities, which are then argon ion milled, diced, mounted and wire bonded to an interposer which is placed …


Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia Oct 2022

Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia

Doctoral Dissertations

Research studies show that sleep deprivation causes severe fatigue, impairs attention and decision making, and affects our emotional interpretation of events, which makes it a big threat to public safety, and mental and physical well-being. Hence, it would be most desired if we could continuously measure one’s drowsiness and fatigue level, their emotion while making decisions, and assess their sleep quality in order to provide personalized feedback or actionable behavioral suggestions to modulate sleep pattern and alertness levels with the aim of enhancing performance, well-being, and quality of life. While there have been decades of studies on wearable devices, we …


Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona Jun 2022

Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona

Doctoral Dissertations

The enormous innovation in computational intelligence has disrupted the traditional ways we solve the main problems of our society and allowed us to make more data-informed decisions. Energy systems and the ways we deliver electricity are not exceptions to this trend: cheap and pervasive sensing systems and new communication technologies have enabled the collection of large amounts of data that are being used to monitor and predict in real-time the behavior of this infrastructure. Bringing intelligence to the power grid creates many opportunities to integrate new renewable energy sources more efficiently, facilitate grid planning and expansion, improve reliability, optimize electricity …


Improving The Programmability Of Networked Energy Systems, Noman Bashir Jun 2022

Improving The Programmability Of Networked Energy Systems, Noman Bashir

Doctoral Dissertations

Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …


Data-Driven Control, Modeling, And Forecasting For Residential Solar Power, Akansha Singh Bansal Mar 2022

Data-Driven Control, Modeling, And Forecasting For Residential Solar Power, Akansha Singh Bansal

Doctoral Dissertations

Distributed solar generation is rising rapidly due to a continuing decline in the cost of solar modules. Most residential solar deployments today are grid-tied, enabling them to draw power from the grid when their local demand exceeds solar generation and feed power into the grid when their local solar generation exceeds demand. The electric grid was not designed to support such decentralized and intermittent energy generation by millions of individual users. This dramatic increase in solar power is placing increasing stress on the grid, which must continue to balance its supply and demand despite the potential for large solar fluctuations. …


Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza Jan 2022

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza

Publications

The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …


Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi Oct 2021

Benchmarking Small-Dataset Structure-Activity-Relationship Models For Prediction Of Wnt Signaling Inhibition, Mahtab Kokabi

Masters Theses

Quantitative structure-activity relationship (QSAR) models based on machine learning algorithms are powerful tools to expedite drug discovery processes and therapeutics development. Given the cost in acquiring large-sized training datasets, it is useful to examine if QSAR analysis can reasonably predict drug activity with only a small-sized dataset (size < 100) and benchmark these small-dataset QSAR models in application-specific studies. To this end, here we present a systematic benchmarking study on small-dataset QSAR models built for prediction of effective Wnt signaling inhibitors, which are essential to therapeutics development in prevalent human diseases (e.g., cancer). Specifically, we examined a total of 72 two-dimensional (2D) QSAR models based on 4 best-performing algorithms, 6 commonly used molecular fingerprints, and 3 typical fingerprint lengths. We trained these models using a training dataset (56 compounds), benchmarked their performance on 4 figures-of-merit (FOMs), and examined their prediction accuracy using an external validation dataset (14 compounds). Our data show that the model performance is maximized when: 1) molecular fingerprints are selected to provide sufficient, unique, and not overly detailed representations of the chemical structures of drug compounds; 2) algorithms are selected to reduce the number of false predictions due to class imbalance in the dataset; and 3) models are selected to reach balanced performance on all 4 FOMs. These results may provide general guidelines in developing high-performance small-dataset QSAR models for drug activity prediction.


On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil Oct 2021

On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil

Doctoral Dissertations

The continued growth of information technology (IT) industry and proliferation of interconnected devices has aggravated the problem of ensuring security and necessitated the need for novel, robust solutions. Physically unclonable functions (PUFs) have emerged as promising secure hardware primitives that can utilize the disorder introduced during manufacturing process to generate unique keys. They can be utilized as \textit{lightweight} roots-of-trust for use in authentication and key generation systems. Unlike insecure non-volatile memory (NVM) based key storage systems, PUFs provide an advantage -- no party, including the manufacturer, should be able to replicate the physical disorder and thus, effectively clone the PUF. …


Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy Oct 2021

Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy

Doctoral Dissertations

The past few years have witnessed significant growth in the use of distributed network analytics involving agile code, data and computational resources. In many such networked systems, for example, Internet of Things (IoT), a large number of smart devices, sensors, processing and storage resources are widely distributed in a geographic region. These devices and resources distributed over a physical space are collectively called a distributed service network. Efficient resource allocation in such high performance service networks remains one of the most critical problems. In this thesis, we model and optimize the allocation of resources in a distributed service network. This …


A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David Sep 2021

A Cloud Infrastructure For Large Scale Health Monitoring In Older Adult Care Facilities, Uchechukwu Gabriel David

Masters Theses

Technology development in the sub-field of older adult care has always been on the back-burner compared to other healthcare areas. But with increasing life expectancy, this is poised to change. With the increasing older adult population, the current older adult care facilities and personnel are struggling to keep up with demand. Research conducted in the Netherlands [1] found 33,000 older adults were awaiting admission into a home for the elderly showing that demand far exceeds availability. This huge demand for older adult care has resulted in a decrease in the quality of care being provided. A recent study involving older …


Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios Apr 2021

Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios

Doctoral Dissertations

Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrastructure that supports our modern technological world. Given the multitude of threats that are present, the need for secure computing systems is undeniably greater than ever. Embedded systems and FPGAs are governed by characteristics that create unique security challenges and vulnerabilities. Despite their array of uses, embedded systems are often built with modest microprocessors that do not support the conventional security solutions used by workstations, such as virus scanners. In the first part of this dissertation, a microprocessor defense mechanism that uses a hardware monitor to protect …


Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin Jul 2020

Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin

Doctoral Dissertations

A considerable progress has been made in recent years in verification of arithmetic circuits such as multipliers, fused multiply-adders, multiply-accumulate, and other components of arithmetic datapaths, both in integer and finite field domain. However, the verification of hardware dividers and square-root functions have received only a limited attention from the verification community, with a notable exception for theorem provers and other inductive, non-automated systems. Division, square root, and transcendental functions are all tied to the basic Intel architecture and proving correctness of such algorithms is of grave importance. Although belonging to the same iterative-subtract class of architectures, they widely differ …


Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse Jul 2020

Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse

Masters Theses

The power side-channel attack, which allows an attacker to derive secret information from power traces, continues to be a major vulnerability in many critical systems. Numerous countermeasures have been proposed since its discovery as a serious vulnerability, including both hardware and software implementations. Each countermeasure has its own drawback, with some of the highly effective countermeasures incurring large overhead in area and power. In addition, many countermeasures are quite invasive to the design process, requiring modification of the design and therefore additional validation and testing to ensure its accuracy. Less invasive countermeasures that do not require directly modifying the system …


Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily Mar 2020

Trustworthy Systems And Protocols For The Internet Of Things, Arman Pouraghily

Doctoral Dissertations

Processor-based embedded systems are integrated into many aspects of everyday life such as industrial control, automotive systems, healthcare, the Internet of Things, etc. As Moore’s law progresses, these embedded systems have moved from simple microcontrollers to full-scale embedded computing systems with multiple processor cores and operating systems support. At the same time, the security of these devices has also become a key concern. Our main focus in this work is the security and privacy of the embedded systems used in IoT systems. In the first part of this work, we take a look at the security of embedded systems from …


Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz Mar 2020

Design Of Hardware With Quantifiable Security Against Reverse Engineering, Shahrzad Keshavarz

Doctoral Dissertations

Semiconductors are a 412 billion dollar industry and integrated circuits take on important roles in human life, from everyday use in smart-devices to critical applications like healthcare and aviation. Saving today's hardware systems from attackers can be a huge concern considering the budget spent on designing these chips and the sensitive information they may contain. In particular, after fabrication, the chip can be subject to a malicious reverse engineer that tries to invasively figure out the function of the chip or other sensitive data. Subsequent to an attack, a system can be subject to cloning, counterfeiting, or IP theft. This …


A Parallel Direct Method For Finite Element Electromagnetic Computations Based On Domain Decomposition, Javad Moshfegh Nov 2019

A Parallel Direct Method For Finite Element Electromagnetic Computations Based On Domain Decomposition, Javad Moshfegh

Doctoral Dissertations

High performance parallel computing and direct (factorization-based) solution methods have been the two main trends in electromagnetic computations in recent years. When time-harmonic (frequency-domain) Maxwell's equation are directly discretized with the Finite Element Method (FEM) or other Partial Differential Equation (PDE) methods, the resulting linear system of equations is sparse and indefinite, thus harder to efficiently factorize serially or in parallel than alternative methods e.g. integral equation solutions, that result in dense linear systems. State-of-the-art sparse matrix direct solvers such as MUMPS and PARDISO don't scale favorably, have low parallel efficiency and high memory footprint. This work introduces a new …


Time-Difference Circuits: Methodology, Design, And Digital Realization, Shuo Li Oct 2019

Time-Difference Circuits: Methodology, Design, And Digital Realization, Shuo Li

Doctoral Dissertations

This thesis presents innovations for a special class of circuits called Time Difference (TD) circuits. We introduce a signal processing methodology with TD signals that alters the target signal from a magnitude perspective to time interval between two time events and systematically organizes the primary TD functions abstracted from existing TD circuits and systems. The TD circuits draw attention from a broad range of application fields. In addition, highly evolved complementary metal-oxide-semiconductor (CMOS) technology suffers from various problems related to voltage and current amplitude signal processing methods. Compared to traditional analog and digital circuits, TD circuits bring several compelling features: …


Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh Oct 2019

Function And Dissipation In Finite State Automata - From Computing To Intelligence And Back, Natesh Ganesh

Doctoral Dissertations

Society has benefited from the technological revolution and the tremendous growth in computing powered by Moore's law. However, we are fast approaching the ultimate physical limits in terms of both device sizes and the associated energy dissipation. It is important to characterize these limits in a physically grounded and implementation-agnostic manner, in order to capture the fundamental energy dissipation costs associated with performing computing operations with classical information in nano-scale quantum systems. It is also necessary to identify and understand the effect of quantum in-distinguishability, noise, and device variability on these dissipation limits. Identifying these parameters is crucial to designing …


Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng Jul 2019

Sparsity In Machine Learning: An Information Selecting Perspective, Siwei Feng

Doctoral Dissertations

Today we are living in a world awash with data. Large volumes of data are acquired, analyzed and applied to tasks through machine learning algorithms in nearly every area of science, business, and industry. For example, medical scientists analyze the gene expression data from a single specimen to learn the underlying causes of disease (e.g. cancer) and choose the best treatment; retailers can know more about customers' shopping habits from retail data to adjust their business strategies to better appeal to customers; suppliers can enhance supply chain success through supply chain systems built on knowledge sharing. However, it is also …


Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo Mar 2019

Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo

Doctoral Dissertations

Wideband is a booming technology in the field of wireless communications. The receivers in wideband communication systems are expected to cover a very wide spectrum and adaptively extract the parts of interest. The literature has focused on mixing the input spectrum to baseband using a pseudorandom sequence modulation and recovering the received signals from linearly independent measurements by parallel branches to mitigate the pressures from required extreme high sampling frequency. However, a pseudorandom sequence provides no rejection for the strong interferers received together with weak signals from distant sources. The interferers cause significant distortion due to the nonlinearity of the …


Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani Mar 2019

Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani

Doctoral Dissertations

This dissertation focuses on covert communication in channels where the communication takes place by the transmission of packets. Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $\lambda$ packets per second for a time period $T$. Jack's transmitted packet visit Alice, Willie, Bob and Steve, respectively. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob without being detected by a watchful adversary Willie. We consider three sets of assumptions for this channel. For each set of assumptions, we present a technique for establishing covert communication …


Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li Nov 2018

Cmos Compatible Memristor Networks For Brain-Inspired Computing, Can Li

Doctoral Dissertations

In the past decades, the computing capability has shown an exponential growth trend, which is observed as Moore’s law. However, this growth speed is slowing down in recent years mostly because the down-scaled size of transistors is approaching their physical limit. On the other hand, recent advances in software, especially in big data analysis and artificial intelligence, call for a break-through in computing hardware. The memristor, or the resistive switching device, is believed to be a potential building block of the future generation of integrated circuits. The underlying mechanism of this device is different from that of complementary metal-oxide-semiconductor (CMOS) …


Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry Oct 2018

Leveraging Eye Structure And Motion To Build A Low-Power Wearable Gaze Tracking System, Addison Mayberry

Doctoral Dissertations

Clinical studies have shown that features of a person's eyes can function as an effective proxy for cognitive state and neurological function. Technological advances in recent decades have allowed us to deepen this understanding and discover that the actions of the eyes are in fact very tightly coupled to the operation of the brain. Researchers have used camera-based eye monitoring technology to exploit this connection and analyze mental state across across many different metrics of interest. These range from simple things like attention and scene processing, to impairments such as a fatigue or substance use, and even significant mental disorders …


Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen Oct 2018

Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen

Doctoral Dissertations

The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …


Application And Evaluation Of Lighthouse Technology For Precision Motion Capture, Soumitra Sitole Oct 2018

Application And Evaluation Of Lighthouse Technology For Precision Motion Capture, Soumitra Sitole

Masters Theses

This thesis presents the development towards a system that can capture and quantify motion for applications in biomechanical and medical fields demanding precision motion tracking using the lighthouse technology. Commercially known as SteamVR tracking, the lighthouse technology is a motion tracking system developed for virtual reality applications that makes use of patterned infrared light sources to highlight trackers (objects embedded with photodiodes) to obtain their pose or spatial position and orientation. Current motion capture systems such as the camera-based motion capture are expensive and not readily available outside of research labs. This thesis provides a case for low-cost motion capture …


Skybridge-3d-Cmos: A Fine-Grained Vertical 3d-Cmos Technology Paving New Direction For 3d Ic, Jiajun Shi Jul 2018

Skybridge-3d-Cmos: A Fine-Grained Vertical 3d-Cmos Technology Paving New Direction For 3d Ic, Jiajun Shi

Doctoral Dissertations

2D CMOS integrated circuit (IC) technology scaling faces severe challenges that result from device scaling limitations, interconnect bottleneck that dominates power and performance, etc. 3D ICs with die-die and layer-layer stacking using Through Silicon Vias (TSVs) and Monolithic Inter-layer Vias (MIVs) have been explored in recent years to generate circuits with considerable interconnect saving for continuing technology scaling. However, these 3D IC technologies still rely on conventional 2D CMOS’s device, circuit and interconnect mindset showing only incremental benefits while adding new challenges reliability issues, robustness of power delivery network design and short-channel effects as technology node scaling. Skybridge-3D-CMOS (S3DC) is …


Analog Signal Processing Solutions And Design Of Memristor-Cmos Analog Co-Processor For Acceleration Of High-Performance Computing Applications, Nihar Athreyas Jul 2018

Analog Signal Processing Solutions And Design Of Memristor-Cmos Analog Co-Processor For Acceleration Of High-Performance Computing Applications, Nihar Athreyas

Doctoral Dissertations

Emerging applications in the field of machine vision, deep learning and scientific simulation require high computational speed and are run on platforms that are size, weight and power constrained. With the transistor scaling coming to an end, existing digital hardware architectures will not be able to meet these ever-increasing demands. Analog computation with its rich set of primitives and inherent parallel architecture can be faster, more efficient and compact for some of these applications. The major contribution of this work is to show that analog processing can be a viable solution to this problem. This is demonstrated in the three …