Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California Polytechnic State University, San Luis Obispo (102)
- Air Force Institute of Technology (29)
- University of Massachusetts Amherst (23)
- University of Arkansas, Fayetteville (21)
- The University of Akron (13)
-
- University of Tennessee, Knoxville (11)
- University of Kentucky (8)
- University of Nevada, Las Vegas (8)
- Michigan Technological University (6)
- Southern Methodist University (6)
- California State University, San Bernardino (5)
- Georgia Southern University (5)
- Virginia Commonwealth University (5)
- Western University (4)
- American University in Cairo (3)
- Grand Valley State University (3)
- Marquette University (3)
- The University of Maine (3)
- University of New Mexico (3)
- Washington University in St. Louis (3)
- Western Michigan University (3)
- Bard College (2)
- Louisiana State University (2)
- Union College (2)
- University of Texas at Arlington (2)
- West Virginia University (2)
- Boise State University (1)
- Central Washington University (1)
- Clemson University (1)
- Coastal Carolina University (1)
- Keyword
-
- FPGA (19)
- Arduino (12)
- Embedded systems (8)
- Bluetooth (7)
- Hardware (7)
-
- Hardware security (7)
- Android (6)
- Computer Engineering (6)
- Cybersecurity (6)
- Automation (5)
- Autonomous (5)
- Computer architecture (5)
- Computer vision (5)
- Hardware Security (5)
- Raspberry Pi (5)
- Robot (5)
- Simulation (5)
- Communication (4)
- Digital (4)
- Drone (4)
- GPS (4)
- Security (4)
- Sensor (4)
- Sensors (4)
- Solar (4)
- VHDL (Computer hardware description language) (4)
- #antcenter (3)
- Application (3)
- Detection (3)
- ETD (3)
- Publication Year
- Publication
-
- Computer Engineering (66)
- Theses and Dissertations (37)
- Doctoral Dissertations (19)
- Masters Theses (17)
- Electrical Engineering (16)
-
- Graduate Theses and Dissertations (14)
- Williams Honors College, Honors Research Projects (13)
- Electronic Theses and Dissertations (10)
- Master's Theses (10)
- Theses and Dissertations--Electrical and Computer Engineering (7)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (7)
- Computer Science and Computer Engineering Undergraduate Honors Theses (6)
- Dissertations, Master's Theses and Master's Reports (6)
- Honors Theses (6)
- Electronic Theses, Projects, and Dissertations (5)
- Mechanical Engineering (5)
- Computer Science and Engineering Theses and Dissertations (4)
- Electronic Thesis and Dissertation Repository (4)
- McKelvey School of Engineering Theses & Dissertations (3)
- Archived Theses and Dissertations (2)
- Chancellor’s Honors Program Projects (2)
- Computer Science and Engineering Theses (2)
- Computer Science and Software Engineering (2)
- Dissertations (2)
- Dissertations (1934 -) (2)
- Electrical Engineering Theses and Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Honors College Theses (2)
- Liberal Arts and Engineering Studies (2)
- Senior Projects Spring 2018 (2)
Articles 1 - 30 of 306
Full-Text Articles in Computer Engineering
Summonable Construction Delivery Robot, Kevin M. Lewis
Summonable Construction Delivery Robot, Kevin M. Lewis
Honors Capstones
In many different construction industries, there is a need for tools, parts, and other necessary items to be transported quickly and efficiently over various types of terrain. Human resources have often been used to address these needs, which can become very time and cost inefficient over long periods. The design proposal here is aimed at addressing this need by developing an autonomous outdoor mobile robot based on a quadrupedal robot design. This approach differs by incorporating a wheeled and quadrupedal hybrid actuation system that provides terrain negotiation and speed at the appropriate times. The team uses Robot Operating System (ROS) …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao
Masters Theses
Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.
Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …
The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique
The Integration Of Neuromorphic Computing In Autonomous Robotic Systems, Md Abu Bakr Siddique
Dissertations, Master's Theses and Master's Reports
Deep Neural Networks (DNNs) have come a long way in many cognitive tasks by training on large, labeled datasets. However, this method has problems in places with limited data and energy, like when planetary robots are used or when edge computing is used [1]. In contrast to this data-heavy approach, animals demonstrate an innate ability to learn by communicating with their environment and forming associative memories among events and entities, a process known as associative learning [2-4]. For instance, rats in a T-maze learn to associate different stimuli with outcomes through exploration without needing labeled data [5]. This learning paradigm …
Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi
Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi
Theses and Dissertations--Electrical and Computer Engineering
The long-standing technological pillars for computing systems evolution, namely Moore's law and Von Neumann architecture, are breaking down under the pressure of meeting the capacity and energy efficiency demands of computing and communication architectures that are designed to process modern data-centric applications related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In response, both industry and academia have turned to 'more-than-Moore' technologies for realizing hardware architectures for communication and computing. Fortunately, Silicon Photonics (SiPh) has emerged as one highly promising ‘more-than-Moore’ technology. Recent progress has enabled SiPh-based interconnects to outperform traditional electrical interconnects, offering advantages like high bandwidth density, …
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Theses and Dissertations--Electrical and Computer Engineering
Artificial Intelligence (AI) has experienced remarkable success in recent years, solving complex computational problems across various domains, including computer vision, natural language processing, and pattern recognition. Much of this success can be attributed to the advancements in deep learning algorithms and models, particularly Artificial Neural Networks (ANNs). In recent times, deep ANNs have achieved unprecedented levels of accuracy, surpassing human capabilities in some cases. However, these deep ANN models come at a significant computational cost, with billions to trillions of parameters. Recent trends indicate that the number of parameters per ANN model will continue to grow exponentially in the foreseeable …
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Computer Science and Engineering Theses
This thesis introduces QubiCSV, a pioneering open-source platform for quantum computing field. With an emphasis on collaborative research, QubiCSV addresses the critical need for specialized data management and visualization tools in qubit control. The platform is crafted to overcome the challenges posed by the high costs and complexities associated with quantum experimental setups. It emphasizes efficient utilization of resources through shared ideas, data, and implementation strategies. One of the primary obstacles in quantum computing research has been the ineffective management of extensive calibration data and the inability to visualize complex quantum experiment outcomes effectively. QubiCSV fills this gap by offering …
Exploring Machine Learning Techniques For Embedded Hardware, Neel R. Vora
Exploring Machine Learning Techniques For Embedded Hardware, Neel R. Vora
Computer Science and Engineering Theses
This thesis delves into the intricate symbiosis between machine learning (ML) methodologies and embedded hardware systems, with a primary focus on augmenting efficiency and real-time processing capabilities across diverse application domains. It confronts the formidable challenge of deploying sophisticated ML algorithms on resource-constrained embedded hardware, aiming not only to optimize performance but also to minimize energy consumption. Innovative strategies are explored to tailor ML models for streamlined execution on embedded platforms, with validation conducted across various real-world application domains. Notable contributions include the development of a deep-learning framework leveraging a variational autoencoder (VAE) for compressing physiological signals from wearables while …
Trojan Detection Expansion Of Structural Checking, Zachary Chapman
Trojan Detection Expansion Of Structural Checking, Zachary Chapman
Graduate Theses and Dissertations
With the growth of the integrated circuit (IC) market, there has also been a rise in demand for third-party soft intellectual properties (IPs). However, the growing use of such Ips makes it easier for adversaries to hide malicious code, like hardware Trojans, into these designs. Unlike software Trojan detection, hardware Trojan detection is still an active research area. One proposed approach to this problem is the Structural Checking tool, which can detect hardware Trojans using two methodologies. The first method is a matching process, which takes an unknown design and attempts to determine if it might contain a Trojan by …
Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata
Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata
Graduate Theses and Dissertations
Magnetic Resonance Imaging (MRI) is typically a slow process because of its sequential data acquisition. To speed up this process, MR acquisition is often accelerated by undersampling k-space signals and solving an ill-posed problem through a constrained optimization process. Image reconstruction from under-sampled data is posed as an inverse problem in traditional model-based learning paradigms. While traditional methods use image priors as constraints, modern deep learning methods use supervised learning with ground truth images to learn image features and priors. However, in some cases, ground truth images are not available, making supervised learning impractical. Recent data-centric learning frameworks such as …
Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi
Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project investigated how the densenet-161 model will perform on accident severity prediction compared to proposed methods. The research questions are: (Q1) What is the impact of usage of augmentation techniques on imbalanced datasets? (Q2) How will the hyper parameter tuning affect the model performance? (Q3) How effective is the proposed model compared to existing work? The findings are: Q1. The effectiveness of our model depends on the implementation of augmentation techniques that pay attention to handling imbalanced datasets. Our dataset poses a challenge due to distribution of classes in terms of accident severity. To address this challenge …
Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya
Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya
Theses and Dissertations
High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …
Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa
Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa
Electronic Theses, Projects, and Dissertations
The development of robust and efficient fish classification systems has become essential to preventing the rapid depletion of aquatic resources and building conservation strategies. A deep learning approach is proposed here for the automated classification of fish species from underwater images. The proposed methodology leverages state-of-the-art deep neural networks by applying the compact convolutional transformer (CCT) architecture, which is famous for faster training and lower computational cost. In CCT, data augmentation techniques are employed to enhance the variability of the training data, reducing overfitting and improving generalization. The preliminary outcomes of our proposed method demonstrate a promising accuracy level of …
Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng
McKelvey School of Engineering Theses & Dissertations
The synchronization of the clocks used at different devices across space is of critical importance in wireless communications networks. Each device’s local clock differs slightly, affecting the times at which packets are transmitted from different nodes in the network. This thesis provides experimentation and software development on POWDER, the Platform for Open, Wireless Data-driven Experimental Research, an open wireless testbed across the University of Utah campus. We build upon Shout, a suite of Python scripts that allow devices to iteratively transmit and receive with each other and save the collected data. We introduce WATCH, an experimental method to estimate clock …
Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr
Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr
Masters Theses
Virtualization is now becoming an industry standard for modern embedded systems. Modern embedded systems can now support multiple applications on a single hardware platform while meeting power and cost requirements. Virtualization on an embedded system is achieved through the design of the hardware-software interface. Instruction set architecture, ISA, defines the hardware-software interface for an embedded system. At the hardware level the ISA, provides extensions to support virtualization.
In addition to an ISA that supports hypervisor extensions it is equally important to provide a hypervisor completely capable of exploiting the benefits of virtualization for securing modern embedded systems. Currently there does …
Virtual Prototyping Of Pebb Based Power Electronics System For Ground Vehicles, Yi Li
Virtual Prototyping Of Pebb Based Power Electronics System For Ground Vehicles, Yi Li
All Theses
Power electronics are heavily involved in power and energy systems in plenty of applications nowadays. The increase of demand brings more challenges into simulations for development. Considering the complexity of the systems and high frequency operational conditions, this paper presents comprehensive research on modeling, simulating, and validation on ground vehicle propulsion system applications.
To reduce the computational burden, the Power Electronics Building Blocks concept is utilized to simplify the structure of modeling under different conversion scenarios in ground vehicle systems. In addition, the Average and Switching versions models are included. To speedup the simulation, the engagement of advanced computing technique …
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Digital Simulations Of Memristors Towards Integration With Reconfigurable Computing, Ivris Raymond
Computer Science and Computer Engineering Undergraduate Honors Theses
The end of Moore’s Law has been predicted for decades. Demand for increased parallel computational performance has been increased by improvements in machine learning. This past decade has demonstrated the ever-increasing creativity and effort necessary to extract scaling improvements in CMOS fabrication processes. However, CMOS scaling is nearing its fundamental physical limits. A viable path for increasing performance is to break the von Neumann bottleneck. In-memory computing using emerging memory technologies (e.g. ReRam, STT, MRAM) offers a potential path beyond the end of Moore’s Law. However, there is currently very little support from industry tools for designers wishing to incorporate …
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan
Pillow Based Sleep Tracking Device Using Raspberry Pi, Venkatachalam Seviappan
Electronic Theses, Projects, and Dissertations
Almost half of all people have sleep interruptions at some point in their lives, making sleep disorders a common issue that affects a sizeable section of the population. Both their physical and emotional well-being may suffer as a result of this.Insomnia, which is a prevalent sleep disorder, is identified by symptoms including insufficient sleep duration and quality, trouble initiating sleep, multiple nighttime awakenings, early morning awakenings, and non-restorative sleep. It is essential to employ sleep monitoring systems to detect sleeping disorders as soon as possible for prompt diagnosis and treatment. To avoid sleep related health issues, there are plenty of …
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Phone Microwave, Khanh Kim Hoang, Emily Zhou
Phone Microwave, Khanh Kim Hoang, Emily Zhou
Computer Engineering
This project involves the installation of remote-control capabilities in an antique 1980s microwave, effectively turning the microwave into a “smart” device. While preserving the original functionality of the microwave, a combination of software and hardware components allows for remote microwave operations. The microwave can be remotely operated by calling the built-in number, and more advanced settings and options can be utilized by texting. The microwave is also secured against unauthorized use with the addition of a PIN code that is required to operate the device.
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
Theses and Dissertations--Computer Science
Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …
Imitation Learning For Swarm Control Using Variational Inference, Hafeez Olafisayo Jimoh
Imitation Learning For Swarm Control Using Variational Inference, Hafeez Olafisayo Jimoh
Graduate Theses, Dissertations, and Problem Reports
Swarms are groups of robots that can coordinate, cooperate, and communicate to achieve tasks that may be impossible for a single robot. These systems exhibit complex dynamical behavior, similar to those observed in physics, neuroscience, finance, biology, social and communication networks, etc. For instance, in Biology, schools of fish, swarm of bacteria, colony of termites exhibit flocking behavior to achieve simple and complex tasks. Modeling the dynamics of flocking in animals is challenging as we usually do not have full knowledge of the dynamics of the system and how individual agent interact. The environment of swarms is also very noisy …
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez
Theses and Dissertations
WiFi sensing offers a powerful method for tracking physical activities using the radio-frequency signals already found throughout our homes and offices. This novel sensing modality offers continuous and non-intrusive activity tracking since sensing can be performed (i) without requiring wearable sensors, (ii) outside the line-of-sight, and even (iii) through the wall. Furthermore, WiFi has become a ubiquitous technology in our computers, our smartphones, and even in low-cost Internet of Things devices. In this work, we consider how the ubiquity of these low-cost WiFi devices offer an unparalleled opportunity for improving the scalability of wireless sensing systems. Thus far, WiFi sensing …
Small Business Office Network, Michael Gerome
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Small Voip-Supported Network, Drina Hobson
Small Voip-Supported Network, Drina Hobson
Williams Honors College, Honors Research Projects
Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.
Enhancing Traffic Safety In Unpredicted Environments With Integration Of Adas Features With Sensor Fusion In Intelligent Electric Vehicle Platform With Implementation Of Environmental Mapping Technology, David S. Obando Ortegon
Enhancing Traffic Safety In Unpredicted Environments With Integration Of Adas Features With Sensor Fusion In Intelligent Electric Vehicle Platform With Implementation Of Environmental Mapping Technology, David S. Obando Ortegon
Electronic Theses and Dissertations
A major objective on society is to reduce the number of accidents and fatalities on the road for drivers, and pedestrians. Therefore, the automotive engineering field is working on this problem through the development and integration of safety technologies such as advanced driving assistance systems. For this reason, this work was intended to develop and evaluate the performance of different ADAS features and IV technologies under unexpected scenarios. This by the development of safety algorithms applied to the intelligent electric vehicle designed and built in this work, through the use of ADAS sensors based on sensor fusion. Evaluation of AEB, …
A Camera-Only Based Approach To Traffic Parameter Estimation Using Mobile Observer Methods, Temitope D. Jegede
A Camera-Only Based Approach To Traffic Parameter Estimation Using Mobile Observer Methods, Temitope D. Jegede
Electronic Theses and Dissertations
As vehicles become more modern, a large majority of vehicles on the road will have the required sensors to smoothly interact with other vehicles and infrastructure on the road. There will be many benefits of this new connectivity between vehicles on the road but one of the most profound improvements will be in the area of road accident prevention. Vehicles will be able to share information vital to road safety to oncoming vehicles and vehicles that are occluded so they do not have a direct line of sight to see a pedestrian or another vehicle on the road.
Another advantage …
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak
Computer Science and Engineering Theses and Dissertations
Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …