Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Southern Methodist University

Other Electrical and Computer Engineering

2018

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Indirect Imaging Using Computational Imaging Techniques, Aparna Viswanath Oct 2018

Indirect Imaging Using Computational Imaging Techniques, Aparna Viswanath

Electrical Engineering Theses and Dissertations

The work describes various methods employed towards solving the problem of indirect imaging. Computational techniques are employed to indirectly decipher information about an object hidden from view of a camera. Notion of virtualizing the source of illumination and detectors on real world rough surfaces was exploited to construct a non line of sight computational imager. Diversity was explored from the stand point of both illumination of the object and imaging of light reflected from the object. To understand the impact of scattering by real world rough surfaces, an instrument was developed that allows characterization of isoplanatic angle for different surface …


Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan Oct 2018

Investigating The Effect Of Detecting And Mitigating A Ring Oscillator-Based Hardware Trojan, Lakshmi Ramakrishnan

Electrical Engineering Theses and Dissertations

The outsourcing of the manufacturing process of integrated circuits to fabrications plants all over the world has exposed these chips to several security threats, especially at the hardware level. There have been instances of malicious circuitry, such as backdoors, being added to circuits without the knowledge of the chip designers or vendors. Such threats could be immensely powerful and dangerous against confidentiality, among other vulnerabilities.

Defense mechanisms against such attacks have been probed and defense techniques have been developed. But with the passage of time, attack techniques have improved immensely as well. From directly observing the inputs or outputs, adversaries …