Research

Man-In-The-Middle(MITM) Attacks

MITM attacks can hijack the messages in the channel by eavesdropping and disruption. Besides, even if the attack does not know the secret key, he can still apply replay attacks. We are trying to combine several crypto techniques such as AES and AMD etc. to provide protection against MITM.

We are also studying the practical applications of such technique on implantable medical devices (IMD) such as pacemakers and insulin pumps, and human interface devices (HID) such as keyboards and mice.

Hybrid Diagnosis Providing Reliability and Security

Usually a diagnosis mechanism is able to locate several defective nodes through a number of tests and the analysis of those test signatures (syndromes). Although this covers the cases caused by random errors, sophisticated attacks are still able to manipulate the outputs of each node, so that they will be masked and pass the diagnosis. We have proposed a hybrid self-diagnosis mechanism. We adopt a new type of analysis with the linear syndromes compressed by OLSC codes, which are able to locate up to a certain number of defective nodes caused by random errors. In addition to this, we introduce a new type of robust analysis of the non-linear syndromes compressed by Robust codes, which is capable of detecting the attacks undetectable by the linear syndromes at a probability close to one.

Group Testing Based (GTB) codes

GTB codes have the advantages of simple decoding and small hardware cost, comparing to the popular codes such as Hamming, BCH, Reed-Solomon codes. Its most attractive character is that the non-binary GTB codes do not need finite field multiplication or inversion in the encoding/decoding procedure. All computations are carried out by binary XORs. This new class of codes can be widely used on diagnosis, testing, communication, secret sharing/cheater identification, reliable memory design etc.

Design of Reliable CNT NANO Devices

The lack of deterministic error models for the inherent unreliability of the nanodevices has restricted the large-scale adoption of these nanodevices for designing large VLSI systems. In this paper, we propose methodologies based on nonlinear codes to design reliable VLSI systems using unreliable nanodevices. For more information visit Integrated Circuits and Systems Group

Routing Policy Development

Developing optimal polices for routing in computer/communication networks, multiprocessors and networks of workstations. Prevention of deadlocks. Unicasting and multicasting virtual networks. Wormhole routing. Routing policies based on turn prohibitions. Testing and diagnosis of computer/communication networks . For more information please contact Prof. Karpovsky or Prof. Levitin.

Hardware Security

Application of Robust Codes for security related hardware applications. Protection of hardware against side-channel attacks. Design of reliable and secure hardware for smart phones resistant to attacks (Part of the joint project with Dr Trachtenberg and Dr Starobinski, ECE Dept and Dr. Corvela, Dr. Reizin, Dr. Homer, Dr Goldberg, from Computer Science Dept, CAS and Dr Zlateva Metropolitan College BU) more info…