Peer-reviewed

YOLO: Frequently Resetting Cyber-Physical Systems for Security

A Cyber-Physical System (CPS) is defined by its unique interactions between digital (cyber) computation and physical motion. Their hybrid nature introduces new attack vectors, but also provides an opportunity to design new security defenses. In this …

CryptoImg: Privacy Preserving Processing Over Encrypted Images

Cloud computing services provide a scalable solution for the storage and processing of images and multimedia files. However, concerns about privacy risks prevent users from sharing their personal images with third-party services. In this paper, we …

Accelerating Electromagnetic Simulations: a Hardware Emulation Approach

Electromagnetic (EM) simulation is an important tool for modeling and studying high frequency systems in modern industry. However, the solver part in EM simulations represents a serious bottleneck because its execution time rapidly increases as …

On Kernel Acceleration of Electromagnetic Solvers via Hardware Emulation

Finding new techniques to accelerate electromagnetic (EM) simulations has become a necessity nowadays due to its frequent usage in industry. As they are mainly based on domain discretization, EM simulations require solving enormous systems of linear …

On Hardware Solution of Dense Linear Systems via Gauss-Jordan Elimination

Gauss-Jordan Elimination (GJE) is a popular method for solving systems of linear equations. Much work has been done to design high throughput, low cost, FPGA-based architectures for GJE. However, as the interest in energy efficient designs increases, …

Homomorphic Data Isolation for Hardware Trojan Protection

The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content. In this work, we suggest using homomorphism for Hardware …

Finite Element Emulation-based Solver for Electromagnetic Computations

Electromagnetic (EM) computations are the cornerstone in the design process of several real-world applications, such as radar systems, satellites, and cell-phones. Unfortunately, these computations are mainly based on numerical techniques that …

E-Voting Attacks and Countermeasures

Electronic voting (e-voting) systems have been in use since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges, as it may contain malicious back-doors that can affect …