{"674012":{"#nid":"674012","#data":{"type":"event","title":"Ph.D. Dissertation Defense - Kevin Hutto","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETitle\u003C\/span\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cspan\u003E:\u0026nbsp; \u003C\/span\u003E\u003C\/em\u003E\u003Cem\u003E\u003Cspan\u003ERemote Sensor Security Through Encoded Computation and Cryptographic Signatures\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ECommittee:\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EVincent Mooney, ECE, Chair\u003C\/span\u003E\u003Cspan\u003E, Advisor\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ESantiago Grijalva, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EAngelos Keromytis, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EFabian Monrose, ECE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ENagi Gebraeel, ISyE\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPhysically vulnerable devices have additional security concerns due to an attacker\u0027s potential ability to obtain memory contents from a device which they would not be able to do with software-only attacks. An adversary may be able to extract all data including volatile run-time memory. Commonly utilized software protections such as encryption may not secure data received from Analog-to-Digital Converters (ADCs) placed into buffer memories, and storage of data in an encrypted format may preclude the ability to perform computation on the data. To address the vulnerabilities of the remote devices, this dissertation presents three mechanisms used to improve security of these physically vulnerable remote devices. The first mechanism protects analog sensed data through the construction of a novel ADC architecture which creates data in an encoded format uninterpretable by an observer. Our approach can be utilized for various base ADC architectures, and never stores unencoded data in any memory location on the device. We present architectures targeting three different types of ADCs and show synthesis results and security analyses for all three. The second mechanism provides the capability for a remote device to perform computations on encoded data produced by our novel ADC architecture via the development of a privacy homomorphism. Detailed examples of how the privacy homomorphism functions are provided as well as real-world examples of computations performed on imagery. The third and last mechanism utilizes a Physical Uncloneable Function (PUF) to enforce a two-factor authentication scheme, securing the software and firmware update mechanisms for the device. We utilize public-private keys split between multiple organizations as well as a PUF integrated with the deployed device to ensure a high level of trust between the remote device and a connected server. The three contributions when utilized together provide a robust framework enhancing the security of physically-vulnerable remote sensor devices.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Remote Sensor Security Through Encoded Computation and Cryptographic Signatures "}],"uid":"28475","created_gmt":"2024-04-04 22:00:58","changed_gmt":"2024-04-04 22:02:12","author":"Daniela Staiculescu","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2024-04-23T09:30:00-04:00","event_time_end":"2024-04-23T11:30:00-04:00","event_time_end_last":"2024-04-23T11:30:00-04:00","gmt_time_start":"2024-04-23 13:30:00","gmt_time_end":"2024-04-23 15:30:00","gmt_time_end_last":"2024-04-23 15:30:00","rrule":null,"timezone":"America\/New_York"},"location":"Room 2350, Klaus","extras":[],"groups":[{"id":"434381","name":"ECE Ph.D. Dissertation Defenses"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"},{"id":"1808","name":"graduate students"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}