-
Bioblox 2.5D -- Develo** an Educational Game Based on Protein Docking
Authors:
Frederic Fol Leymarie,
William Latham,
Guido Salimbeni,
Suhail A. Islam,
Christopher Reynolds,
Charlie Cook,
Luis Armas Suarez,
Richard Leinfellner,
Michael J. E. Sternberg
Abstract:
We present the development process of Bioblox2-5D, an educational biology game aimed at teenagers. The game content refers to protein docking and aims to improve learning about molecular shape complexity, the roles of charges in molecular docking and the scoring function to calculate binding affinity. We developed the game as part of a collaboration between the Computing Department at Goldsmiths,…
▽ More
We present the development process of Bioblox2-5D, an educational biology game aimed at teenagers. The game content refers to protein docking and aims to improve learning about molecular shape complexity, the roles of charges in molecular docking and the scoring function to calculate binding affinity. We developed the game as part of a collaboration between the Computing Department at Goldsmiths, University of London, and the Structural Bioinformatics group at Imperial College London. The team at Imperial provided the content requirements and validated the technical solution adopted in the game. The team at Goldsmiths designed and implemented the content requirements into a fun and stimulating educational puzzle game that supports teaching and motivates students to engage with biology. We illustrate the game design choices, the compromises and solutions that we applied to accomplish the desired learning outcomes. This paper aims to illustrate useful insights and inspirations in the context of educational game development for biology students.
△ Less
Submitted 3 May, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Differentially Private Data Publication with Multi-level Data Utility
Authors:
Honglu Jiang,
S M Sarwar,
Haotian Yu,
Sheikh Ariful Islam
Abstract:
Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data. Such data publication schemes implicitly assume that all data analysts and users have the same data access privilege levels. However, it is not applicable for the scenario that data users often have different levels of access to the same da…
▽ More
Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data. Such data publication schemes implicitly assume that all data analysts and users have the same data access privilege levels. However, it is not applicable for the scenario that data users often have different levels of access to the same data, or different requirements of data utility. The multi-level privacy requirements for different authorization levels pose new challenges for private data publication. Traditional PPDP mechanisms only publish one perturbed and private data copy satisfying some privacy guarantee to provide relatively accurate analysis results. To find a good tradeoff between privacy preservation level and data utility itself is a hard problem, let alone achieving multi-level data utility on this basis. In this paper, we address this challenge in proposing a novel framework of data publication with compressive sensing supporting multi-level utility-privacy tradeoffs, which provides differential privacy. Specifically, we resort to compressive sensing (CS) method to project a $n$-dimensional vector representation of users' data to a lower $m$-dimensional space, and then add deliberately designed noise to satisfy differential privacy. Then, we selectively obfuscate the measurement vector under compressive sensing by adding linearly encoded noise, and provide different data reconstruction algorithms for users with different authorization levels. Extensive experimental results demonstrate that ML-DPCS yields multi-level of data utility for specific users at different authorization levels.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Self-Excited Dynamics of Discrete-Time Lur'e Systems
Authors:
Juan A. Paredes,
Syed Aseem Ul Islam,
Omran Kouba,
Dennis S. Bernstein
Abstract:
Self-excited systems arise in numerous applications, such as biochemical systems, fluid-structure interaction, and combustion. This paper analyzes a discrete-time Lur'e system with a piecewise-linear saturation feedback nonlinearity. The main result provides sufficient conditions under which the Lur'e system is self-excited in the sense that its response is bounded and nonconvergent.
Self-excited systems arise in numerous applications, such as biochemical systems, fluid-structure interaction, and combustion. This paper analyzes a discrete-time Lur'e system with a piecewise-linear saturation feedback nonlinearity. The main result provides sufficient conditions under which the Lur'e system is self-excited in the sense that its response is bounded and nonconvergent.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
Regularization-Induced Bias and Consistency in Recursive Least Squares
Authors:
Brian Lai,
Syed Aseem Ul Islam,
Dennis S. Bernstein
Abstract:
Within the context of recursive least squares (RLS) parameter estimation, the goal of the present paper is to study the effect of regularization-induced bias on the transient and asymptotic accuracy of the parameter estimates. We consider this question in three stages. First, we consider regression with random data, in which case persistency is guaranteed. Next, we apply RLS to finite-impulse-resp…
▽ More
Within the context of recursive least squares (RLS) parameter estimation, the goal of the present paper is to study the effect of regularization-induced bias on the transient and asymptotic accuracy of the parameter estimates. We consider this question in three stages. First, we consider regression with random data, in which case persistency is guaranteed. Next, we apply RLS to finite-impulse-response (FIR) system identification and, finally, to infinite-impulse-response (IIR) system identification. For each case, we relate the condition number of the regressor matrix to the transient response and rate of convergence of the parameter estimates.
△ Less
Submitted 10 August, 2021; v1 submitted 16 June, 2021;
originally announced June 2021.
-
Data-Driven Retrospective Cost Adaptive Control for Flight Control Application
Authors:
Syed Aseem Ul Islam,
Tam W. Nguyen,
Ilya V. Kolmanovsky,
Dennis S. Bernstein
Abstract:
Unlike fixed-gain robust control, which trades off performance with modeling uncertainty, direct adaptive control uses partial modeling information for online tuning. The present paper combines retrospective cost adaptive control (RCAC), a direct adaptive control technique for sampled-data systems, with online system identification based on recursive least squares (RLS) with variable-rate forgetti…
▽ More
Unlike fixed-gain robust control, which trades off performance with modeling uncertainty, direct adaptive control uses partial modeling information for online tuning. The present paper combines retrospective cost adaptive control (RCAC), a direct adaptive control technique for sampled-data systems, with online system identification based on recursive least squares (RLS) with variable-rate forgetting (VRF). The combination of RCAC and RLS-VRF constitutes data-driven RCAC (DDRCAC), where the online system identification is used to construct the target model, which defines the retrospective performance variable. This paper investigates the ability of RLS-VRF to provide the modeling information needed for the target model, especially nonminimum-phase (NMP) zeros. DDRCAC is applied to single-input, single-output (SISO) and multiple-input, multiple-output (MIMO) numerical examples with unknown NMP zeros, as well as several flight control problems, namely, unknown transition from minimum-phase to NMP lateral dynamics, flexible modes, flutter, and nonlinear planar missile dynamics.
△ Less
Submitted 8 April, 2021; v1 submitted 14 February, 2021;
originally announced February 2021.
-
Experimental Implementation of an Adaptive Digital Autopilot
Authors:
Ankit Goel,
Juan Augusto Paredes,
Harshil Dadhaniya,
Syed Aseem Ul Islam,
Abdulazeez Mohammed Salim,
Sai Ravela,
Dennis Bernstein
Abstract:
This paper develops an adaptive digital autopilot for quadcopters and presents experimental results. The adaptive digital autopilot is constructed by augmenting the PX4 autopilot control system architecture with adaptive digital control laws based on retrospective cost adaptive control (RCAC). In order to investigate the performance of the adaptive digital autopilot, the default gains of the fixed…
▽ More
This paper develops an adaptive digital autopilot for quadcopters and presents experimental results. The adaptive digital autopilot is constructed by augmenting the PX4 autopilot control system architecture with adaptive digital control laws based on retrospective cost adaptive control (RCAC). In order to investigate the performance of the adaptive digital autopilot, the default gains of the fixed-gain autopilot are scaled by a small factor, which severely degrades its performance. This scenario thus provides a venue for determining the ability of the adaptive digital autopilot to compensate for the detuned fixed-gain autopilot. The adaptive digital autopilot is tested in simulation and physical flight tests, and the resulting performance improvements are examined.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Output-Feedback Model Predictive Control with Online Identification
Authors:
Tam W. Nguyen,
Syed Aseem Ul Islam,
Dennis S. Bernstein,
Ilya V. Kolmanovsky
Abstract:
Model predictive control (MPC) is a widely used modern control technique with numerous successful application in diverse areas. Much of this success is due to the ability of MPC to enforce state and control constraints, which are crucial in many applications of control. In order to avoid the need for an observer, output-feedback model predictive control with online identification (OFMPCOI) uses th…
▽ More
Model predictive control (MPC) is a widely used modern control technique with numerous successful application in diverse areas. Much of this success is due to the ability of MPC to enforce state and control constraints, which are crucial in many applications of control. In order to avoid the need for an observer, output-feedback model predictive control with online identification (OFMPCOI) uses the block observable canonical form whose state consists of past values of the control inputs and measured outputs. Online identification is performed using recursive least squares (RLS) with variable-rate forgetting. The article describes the algorithmic details of OFMPCOI and numerically investigates its performance through a collection of numerical examples that highlight various control challenges, such as model order uncertainty, sensor noise, prediction horizon, stabilization, magnitude and move-size saturation, and stabilization. The numerical examples are used to probe the performance of OFMPCOI in terms of persistency, consistency, and exigency. Since OFMPCOI does not employ a separate control perturbation to enhance persistency, the focus is on self-generated persistency during transient operation. For closed-loop identification using RLS, sensor noise gives rise to bias in the identified model, and the goal is to determine the effect of the lack of consistency. Finally, the numerical examples reveal exigency, which is the extent to which the online identification emphasizes model characteristics that are most relevant to meeting performance objectives.
△ Less
Submitted 22 September, 2020;
originally announced September 2020.
-
Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs
Authors:
Sheikh Ariful Islam,
Love Kumar Sah,
Srinivas Katkoori
Abstract:
Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with varia…
▽ More
Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and postsilicon. Although the nets with variable switching probability less than a threshold are primarily chosen as a good candidate for Trojan triggering, there is no systematic fine-grained approach for earlier detection of rare nets from word-level measures of input signals. In this paper, we propose a high-level technique to estimate the nets with the rare activity of arithmetic modules from word-level information. Specifically, for a given module, we use the knowledge of internal construction of the architecture to detect "low activity" and "local regions" without resorting to expensive RTL and other low-level simulations. The presented heuristic method abstracts away from the low-level details of design and describes the rare activity of bits (modules) in a word (architecture) as a function of signal statistics. The resulting quick estimates of nets in rare regions allows a designer to develop a compact test generation algorithm without the knowledge of the bit-level activity. We determine the effect of different positions of the breakpoint in the input signal to calculate the accuracy of the approach. We conduct a set of experiments on six adder architectures and four multiplier architectures. The average error to calculate the rare nets between RTL simulation and estimated values are below 2% in all architectures.
△ Less
Submitted 29 March, 2020;
originally announced March 2020.
-
A Discrete-Time, Time-Delayed Lur'e Model with Biased Self-Excited Oscillations
Authors:
Juan Paredes,
Syed Aseem Ul Islam,
Omran Kouba,
Dennis S. Bernstein
Abstract:
Self-excited systems arise in many applications, such as biochemical systems, mechanical systems with fluid-structure interaction, and fuel-driven systems with combustion dynamics. This paper presents a Lur'e model that exhibits biased self-excited oscillations under constant inputs. The model involves asymptotically stable linear dynamics, time delay, a washout filter, and a saturation nonlineari…
▽ More
Self-excited systems arise in many applications, such as biochemical systems, mechanical systems with fluid-structure interaction, and fuel-driven systems with combustion dynamics. This paper presents a Lur'e model that exhibits biased self-excited oscillations under constant inputs. The model involves asymptotically stable linear dynamics, time delay, a washout filter, and a saturation nonlinearity. For all sufficiently large scalings of the loop transfer function, these components cause divergence under small signal levels and decay under large signal amplitudes, thus producing an oscillatory response. A bias-generation mechanism is used to specify the mean of the oscillation. The main contribution of the paper is a detailed analysis of a discrete-time version of this model.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs
Authors:
Sheikh Ariful Islam,
Love Kumar Sah,
Srinivas Katkoori
Abstract:
Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it…
▽ More
Intellectual Property (IP) infringement including piracy and over production have emerged as significant threats in the semiconductor supply chain. Key based obfuscation techniques (i.e., logic locking) are widely applied to secure legacy IP from such attacks. However, the fundamental question remains open whether an attacker is allowed an exponential amount of time to seek correct key or could it be useful to lock out the design in a non-destructive manner after several incorrect attempts. In this paper, we address this question with a robust design lockout technique. Specifically, we perform comparisons on obfuscation logic output that reflects the condition (correct or incorrect) of the applied key without changing the system behaviour. The proposed approach, when combined with key obfuscation (logic locking) technique, increases the difficulty of reverse engineering key obfuscated RTL module. We provide security evaluation of DLockout against three common side channel attacks followed by a quantitative assessment of the resilience. We conducted a set of experiments on four datapath intensive IPs and one crypto core for three different key lengths (32-, 64-, and 128-bit) under typical design corner. On average, DLockout incurs negligible area, power, and delay overheads.
△ Less
Submitted 4 January, 2020;
originally announced January 2020.
-
Socio-network Analysis of RTL Designs for Hardware Trojan Localization
Authors:
Sheikh Ariful Islam,
Farha Islam Mime,
S M Asaduzzaman,
Farzana Islam
Abstract:
The recent surge in hardware security is significant due to offshoring the proprietary Intellectual property (IP). One distinct dimension of the disruptive threat is malicious logic insertion, also known as Hardware Trojan (HT). HT subverts the normal operations of a device stealthily. The diversity in HTs activation mechanisms and their location in design brings no catch-all detection techniques.…
▽ More
The recent surge in hardware security is significant due to offshoring the proprietary Intellectual property (IP). One distinct dimension of the disruptive threat is malicious logic insertion, also known as Hardware Trojan (HT). HT subverts the normal operations of a device stealthily. The diversity in HTs activation mechanisms and their location in design brings no catch-all detection techniques. In this paper, we propose to leverage principle features of social network analysis to security analysis of Register Transfer Level (RTL) designs against HT. The approach is based on investigating design properties, and it extends the current detection techniques. In particular, we perform both node- and graph-level analysis to determine the direct and indirect interactions between nets in a design. This technique helps not only in finding vulnerable nets that can act as HT triggering signals but also their interactions to influence a particular net to act as HT payload signal. We experiment the technique on 420 combinational HT instances, and on average, we can detect both triggering and payload signals with accuracy up to 97.37%.
△ Less
Submitted 21 December, 2019;
originally announced December 2019.
-
On the (In)security of Approximate Computing Synthesis
Authors:
Sheikh Ariful Islam
Abstract:
The broad landscape of new applications requires minimal hardware resources without any sacrifice in Quality-of-Results. Approximate Computing (AC) has emerged to meet the demands of data-rich applications. Although AC applies techniques to improve the energy efficiency of error-tolerant applications at the cost of computational accuracy, new challenges in security threats of AC should be simultan…
▽ More
The broad landscape of new applications requires minimal hardware resources without any sacrifice in Quality-of-Results. Approximate Computing (AC) has emerged to meet the demands of data-rich applications. Although AC applies techniques to improve the energy efficiency of error-tolerant applications at the cost of computational accuracy, new challenges in security threats of AC should be simultaneously addressed. In this paper, we introduce the security vulnerability of the concurrent AC synthesis. We analyze the threat landscape and provide a broader view of the attack and defense strategy. As a case study, we utilize AC synthesis technique to perform malicious modifications in the synthesized approximate netlist. Similarly, we provide a scalable defense framework for trustworthy AC synthesis.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Machine Learning based IoT Edge Node Security Attack and Countermeasures
Authors:
Vishalini R. Laguduva,
Sheikh Ariful Islam,
Sathyanarayanan Aakur,
Srinivas Katkoori,
Robert Karam
Abstract:
Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the secu…
▽ More
Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the security of IoT nodes. Malicious modeling of PUF architectures has proven to be difficult due to the inherently stochastic nature of PUF architectures. Extant approaches to malicious PUF modeling assume that a priori knowledge and physical access to the PUF architecture is available for malicious attack on the IoT node. However, many IoT networks make the underlying assumption that the PUF architecture is sufficiently tamper-proof, both physically and mathematically. In this work, we show that knowledge of the underlying PUF structure is not necessary to clone a PUF. We present a novel non-invasive, architecture independent, machine learning attack for strong PUF designs with a cloning accuracy of 93.5% and improvements of up to 48.31% over an alternative, two-stage brute force attack model. We also propose a machine-learning based countermeasure, discriminator, which can distinguish cloned PUF devices and authentic PUFs with an average accuracy of 96.01%. The proposed discriminator can be used for rapidly authenticating millions of IoT nodes remotely from the cloud server.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
Authors:
Love Kumar Sah,
Sheikh Ariful Islam,
Srinivas Katkoori
Abstract:
We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables sp…
▽ More
We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT). Dedicated memory space is used to automatically record base and bound information of variables extracted during runtime. We instrument frame pointer and function(s) related registers to decode variable memory space in stack and heap. We have modified Simplescalar/PISA simulator to extract variables space of six (6) benchmark suites from MiBench. We have tested 290 small C programs (MIT corpus suite) having 22 different buffer overflow vulnerabilities in stack and heap. Experimental results show that our approach can detect buffer overflow attack with zero instruction overhead with the memory space requirement up to 13Kb to maintain VRT for a program with 324 variables.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
An SR Flip-Flop based Physical Unclonable Functions for Hardware Security
Authors:
Rohith Prasad Challa,
Sheikh Ariful Islam,
Srinivas Katkoori
Abstract:
Physical Unclonable Functions (PUFs) have emerged as a promising solution to identify and authenticate Integrated Circuits (ICs). In this paper, we propose a novel NAND-based Set-Reset (SR) Flip-flop (FF) PUF design for security enclosures of the area- and power-constrained Internet-of-Things (IoT) edge node. Such SR-FF based PUF is constructed during a unique race condition that is (normally) avo…
▽ More
Physical Unclonable Functions (PUFs) have emerged as a promising solution to identify and authenticate Integrated Circuits (ICs). In this paper, we propose a novel NAND-based Set-Reset (SR) Flip-flop (FF) PUF design for security enclosures of the area- and power-constrained Internet-of-Things (IoT) edge node. Such SR-FF based PUF is constructed during a unique race condition that is (normally) avoided due to inconsistency. We have shown, when both inputs (S and R) are logic high ('1') and followed by logic zero ('0'), the outputs Q and Qbar can settle down to either 0 or 1 or vice-versa depending on statistical delay variations in cross-coupled paths. We incorporate the process variations during SPICE-level simulations to leverage the capability of SR-FF in generating the unique identifier of an IC. Experimental results for 90nm, 45nm, and 32nm process nodes show the robustness of SR-FF PUF responses in terms of uniqueness, randomness, uniformity, and bit(s) biases. Furthermore, we perform physical synthesis to evaluate the applicability of SR FF PUF on five designs from OpenCores in three design corners. The estimated overhead for power, timing, and area in three design corners are negligible.
△ Less
Submitted 11 September, 2019;
originally announced September 2019.