Skip to main content

Showing 1–24 of 24 results for author: Rahman, M T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06242  [pdf, other

    cs.CR cs.IR

    Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study

    Authors: Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman

    Abstract: In recent times, impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems. It leverages variations in the intrinsic impedance of a chip's internal structure across different logic states. In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  2. arXiv:2401.04411  [pdf, other

    cs.ET cs.CR

    Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: This article introduces a novel, low-cost technique for hiding data in commercially available resistive-RAM (ReRAM) chips. The data is kept hidden in ReRAM cells by manipulating its analog physical properties through switching ($\textit{set/reset}$) operations. This hidden data, later, is retrieved by sensing the changes in cells' physical properties (i.e., $\textit{set/reset}$ time of the memory… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2204.02104

  3. arXiv:2311.08494  [pdf, other

    cs.SE cs.CE cs.CR

    A New Paradigm in Blockchain-based Financial Aid Distribution

    Authors: Md. Raisul Hasan Shahrukh, Md. Tabassinur Rahman, Nafees Mansoor

    Abstract: Blockchain technology has emerged as a game-changer in a variety of industries, providing robust solutions that can supplant conventional procedures. The unique potential of this technology originates from its decentralized ledger systems, which enable enhanced security, transparency, and the validation of transactions without the need for intermediaries. Notably, the financial sector is making su… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  4. arXiv:2311.08483  [pdf, other

    cs.CR cs.CE cs.SE

    Exploration of Hyperledger Besu in Designing Private Blockchain-based Financial Distribution Systems

    Authors: Md. Raisul Hasan Shahrukh, Md. Tabassinur Rahman, Nafees Mansoor

    Abstract: Blockchain, a decentralized technology that provides unrivaled security, transparency, and process validation, is redefining the operational landscape across numerous industries. This article focuses on the development of an innovative consortium blockchain based financial distribution application. This paper illuminates the transformative role of blockchain technology in a variety of sectors by d… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  5. arXiv:2311.08372  [pdf, other

    cs.SE cs.CE cs.CR

    Aid Nexus : A Blockchain Based Financial Distribution System

    Authors: Md. Raisul Hasan Shahrukh, Md. Tabassinur Rahman, Nafees Mansoor

    Abstract: Blockchain technology has emerged as a disruptive force with transformative potential across numerous industries, promising efficient and automated solutions that can revolutionize traditional systems. By leveraging decentralized ledger systems, blockchain offers enhanced security, transparency, and transaction verification without the need for intermediaries. The finance sector is exploring block… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  6. arXiv:2310.03175  [pdf, other

    cs.CR cs.IR eess.SP

    Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software

    Authors: Md Sadik Awal, Md Tauhidur Rahman

    Abstract: Discovering new vulnerabilities and implementing security and privacy measures are important to protect systems and data against physical attacks. One such vulnerability is impedance, an inherent property of a device that can be exploited to leak information through an unintended side channel, thereby posing significant security and privacy risks. Unlike traditional vulnerabilities, impedance is o… ▽ More

    Submitted 13 December, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

  7. arXiv:2301.06799  [pdf, other

    cs.CR eess.SP

    Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

    Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman

    Abstract: The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop po… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  8. arXiv:2206.04754  [pdf, other

    cs.CR

    AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking

    Authors: Yadi Zhong, Ayush Jain, M. Tanjidur Rahman, Navid Asadizanjani, Jiafeng Xie, Ujjwal Guin

    Abstract: The outsourcing of the design and manufacturing of integrated circuits has raised severe concerns about the piracy of Intellectual Properties and illegal overproduction. Logic locking has emerged as an obfuscation technique to protect outsourced chip designs, where the circuit netlist is locked and can only be functional once a secure key is programmed. However, Boolean Satisfiability-based attack… ▽ More

    Submitted 12 October, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: text overlap with arXiv:2007.10512

  9. Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: Electronic counterfeiting is a longstanding problem with adverse long-term effects for many sectors, remaining on the rise. This article presents a novel low-cost technique to embed watermarking in devices with resistive-RAM (ReRAM) by manipulating its analog physical characteristics through switching (set/reset) operation to prevent counterfeiting. We develop a system-level framework to control m… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  10. arXiv:2111.09488  [pdf, other

    cs.CR cs.LG

    Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation

    Authors: Mehdi Sadi, B. M. S. Bahar Talukder, Kaniz Mishty, Md Tauhidur Rahman

    Abstract: Universal Adversarial Perturbations are image-agnostic and model-independent noise that when added with any image can mislead the trained Deep Convolutional Neural Networks into the wrong prediction. Since these Universal Adversarial Perturbations can seriously jeopardize the security and integrity of practical Deep Learning applications, existing techniques use additional neural networks to detec… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  11. arXiv:2107.09199  [pdf, other

    cs.CR

    A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips

    Authors: B. M. S. Bahar Talukder, Farah Ferdaus, Md Tauhidur Rahman

    Abstract: Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a… ▽ More

    Submitted 5 May, 2023; v1 submitted 19 July, 2021; originally announced July 2021.

    Journal ref: ACM Journal on Emerging Technologies in Computing Systems, 2023

  12. Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Md Tauhidur Rahman

    Abstract: Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be used to enhance performance and save power significan… ▽ More

    Submitted 14 March, 2022; v1 submitted 28 May, 2021; originally announced May 2021.

  13. arXiv:2104.00198  [pdf, other

    cs.ET

    True Random Number Generation using Latency Variations of Commercial MRAM Chips

    Authors: Farah Ferdaus, B. M. S. Bahar Talukder, Mehdi Sadi, Md Tauhidur Rahman

    Abstract: The emerging magneto-resistive RAM (MRAM) has considerable potential to become a universal memory technology because of its several advantages: unlimited endurance, lower read/write latency, ultralow-power operation, high-density, and CMOS compatibility, etc. This paper will demonstrate an effective technique to generate random numbers from energy-efficient consumer-off-the-shelf (COTS) MRAM chips… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

    Journal ref: 22nd International Symposium for Quality in Electronic Design (ISQED), CA, USA, 2021

  14. arXiv:2007.02661  [pdf

    cs.CY cs.CR

    An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data from Mobile Cellular Networks

    Authors: Md. Tanvir Rahman, Risala T. Khan, Muhammad R. A. Khandaker, Md. Sifat Ar Salan

    Abstract: The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant i… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Submitted to IEEE Access

  15. arXiv:2002.04210  [pdf, other

    eess.IV cs.CR

    Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives

    Authors: Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte

    Abstract: In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent… ▽ More

    Submitted 7 April, 2021; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: It is essential not to reduce the size of the figures as high quality ones are required to discuss the image processing algorithms and methods

  16. Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin

    Authors: B. M. S. Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt Neal, Md Tauhidur Rahman

    Abstract: Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor performance, and shorter life span. Besides, studies sugg… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

    Journal ref: IEEE Hardware-Oriented Security and Trust Symposium (HOST), 2020

  17. arXiv:1907.08863  [pdf, other

    cs.CR

    Defense-in-Depth: A Recipe for Logic Locking to Prevail

    Authors: M Tanjidur Rahman, M Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor

    Abstract: Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

  18. arXiv:1903.04677  [pdf, other

    cs.CR cs.LG

    Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

    Authors: Kyle Worley, Md Tauhidur Rahman

    Abstract: With the globalization of the semiconductor manufacturing process, electronic devices are powerless against malicious modification of hardware in the supply chain. The ever-increasing threat of hardware Trojan attacks against integrated circuits has spurred a need for accurate and efficient detection methods. Ring oscillator network (RON) is used to detect the Trojan by capturing the difference in… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

  19. arXiv:1902.09652  [pdf, other

    eess.SP cs.NI

    Decimeter Ranging with Channel State Information

    Authors: Navid Tadayon, Muhammed T. Rahman, Shuo Han, Shahrokh Valaee, Wei Yu

    Abstract: This paper aims at the problem of time-of-flight (ToF) estimation using channel state information (CSI) obtainable from commercialized MIMO-OFDM WLAN receivers. It was often claimed that the CSI phase is contaminated with errors of known and unknown natures rendering ToF-based positioning difficult. To search for an answer, we take a bottom-up approach by first understanding CSI, its constituent b… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

  20. Interference Mitigation and Capacity Enhancement based on Dynamic Frequency Reuse for Femtocell Networks

    Authors: Md. Tashikur Rahman, Md. Didarul Alam, Mostafa Zaman Chowdhury

    Abstract: Wireless networks employing small cells like femtocells are considered to be the choice of network deployment for 4G or advanced networks. This hierarchical deployment of cells introduces the necessity of effective frequency planning for mitigation of interference between different layers of network. As the scarce spectrum resources are likely to be reused to increase spectral efficiency, interfer… ▽ More

    Submitted 5 October, 2018; originally announced October 2018.

    Comments: IEEE International Conference on Telecommunications and Photonics (ICTP), December, 2015, Dhaka, Bangladesh

  21. PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures

    Authors: B. M. S. Bahar Talukder, Biswajit Ray, Domenic Forte, Md Tauhidur Rahman

    Abstract: Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data),… ▽ More

    Submitted 31 July, 2019; v1 submitted 7 August, 2018; originally announced August 2018.

    Journal ref: IEEE Access, vol. 7, pp. 81106-81120, 2019

  22. Exploiting DRAM Latency Variations for Generating True Random Numbers

    Authors: B. M. S. Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas Morris, Md Tauhidur Rahman

    Abstract: True random number generator (TRNG) plays a vital role in a variety of security applications and protocols. The security and privacy of an asset rely on the encryption, which solely depends on the quality of random numbers. Memory chips are widely used for generating random numbers because of their prevalence in modern electronic systems. Unfortunately, existing Dynamic Random-access Memory (DRAM)… ▽ More

    Submitted 7 November, 2018; v1 submitted 6 August, 2018; originally announced August 2018.

  23. arXiv:1603.03502  [pdf, other

    cs.DC

    Checkpointing to minimize completion time for Inter-dependent Parallel Processes on Volunteer Grids

    Authors: Mohammad Tanvir Rahman, Hien Nguyen, Jaspal Subhlok, Gopal Pandurangan

    Abstract: Volunteer computing is being used successfully for large scale scientific computations. This research is in the context of Volpex, a programming framework that supports communicating parallel processes in a volunteer environment. Redundancy and checkpointing are combined to ensure consistent forward progress with Volpex in this unique execution environment characterized by heterogeneous failure pr… ▽ More

    Submitted 10 March, 2016; originally announced March 2016.

    Comments: This paper has 10 pages, 4 figures. The paper was accepted in ccgrid 2016 as a short paper; We are kee** the longer version here

  24. arXiv:1306.5209  [pdf

    cs.NI

    Review Study For Inter-Operability Of Manet Protocols In Wireless Sensor Networks

    Authors: Gurpreet Singh Saini, Priyanka Dubey, Md Tanzilur Rahman

    Abstract: Wireless Networks are most appealing in terms of deployment over a wide range of applications. The key areas are disaster management, industrial unit automation and battlefield surveillance. The paper presents a study over inter-operability of MANET (Mobile Ad-Hoc Network) protocols i.e DSDV, OLSR, ZRP, AODV over WSN (Wireless Sensor Network) [10]. The review here covers all the prevailing protoco… ▽ More

    Submitted 21 June, 2013; originally announced June 2013.

    Journal ref: International Journal of Computer Trends and Technology (IJCTT), Volume 4, Issue 6 May 2013