{"id":559,"date":"2024-07-09T02:10:32","date_gmt":"2024-07-09T02:10:32","guid":{"rendered":"https:\/\/amsaad.com\/?page_id=559"},"modified":"2024-07-09T15:37:53","modified_gmt":"2024-07-09T15:37:53","slug":"projects","status":"publish","type":"page","link":"https:\/\/wright-smart-lab.site\/?page_id=559","title":{"rendered":"Projects"},"content":{"rendered":"<h2>Golden References Free Hardware Trojan Detection<\/h2>\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"e05b2ca6-a7fa-486c-96bf-178090ca9ae6\">\n<div class=\"flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-560 alignright\" src=\"https:\/\/amsaad.com\/wp-content\/uploads\/2024\/07\/htd-1024x378.png\" alt=\"\" width=\"1024\" height=\"378\" srcset=\"https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/htd-1024x378.png 1024w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/htd-300x111.png 300w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/htd-768x284.png 768w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/htd-1140x421.png 1140w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/htd.png 1413w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>This project led by Ashutosh Ghimire was accepted for Lecture Presentation in IEEE NAECON conference held on 2023 in Dayton OH. It presents a novel approach to detect Hardware Trojans by combining unsupervised machine learning and side-channel analysis, leveraging unique features from on-chip ring-oscillator networks to identify anomalies through unsupervised clustering. Evaluation on FPGA chips with Trojan insertion demonstrated exceptional accuracy, surpassing alternative methods with a 99% accuracy rate. The centroid-based clustering model exhibited superior performance, with a slight edge in false positive rate and an f1 score. This project contributes to enhancing trust in semiconductor IC supply chains by offering a fresh perspective on Hardware Trojan detection, eliminating the dependency on golden chips, and providing a reliable and practical solution for identifying compromised ICs.<\/p>\n<h2>SRAM PUF Manufacturer Identification<\/h2>\n<p>This project led by Harshdeep Singh received the Best Poster Award at the IEEE VLSID 2024 conference held in July 2024 in Knoxville, TN. It addresses the critical issue of identifying counterfeit SRAM memory chips manufactured in untrustworthy facilities, which compromise the integrity and security of the supply chain for microelectronic systems. By developing an AI-assisted hardware-oriented solution, this project leverages<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-561 aligncenter\" src=\"https:\/\/amsaad.com\/wp-content\/uploads\/2024\/07\/sram-1024x199.png\" alt=\"\" width=\"1024\" height=\"199\" srcset=\"https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram-1024x199.png 1024w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram-300x58.png 300w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram-768x149.png 768w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram-1536x299.png 1536w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram-1140x222.png 1140w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/sram.png 1789w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Physical Unclonable Functions (PUFs) and specifically SRAM PUF technology to authenticate devices and generate secret keys. The innovative framework uses machine learning models to exploit process variations in SRAM memory cells, enabling efficient identification of microelectronic device manufacturers without cumbersome procedures. Validated through a study involving 345 SRAM chips from five reputable manufacturers, the AI-driven technique achieved high accuracy and an F1 score of 97% in identifying device manufacturers, significantly enhancing the reliability and trustworthiness of the IC supply chain.<\/p>\n<h2>Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-565 alignright\" src=\"https:\/\/amsaad.com\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9-1024x731.jpg\" alt=\"\" width=\"1024\" height=\"731\" srcset=\"https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9-1024x731.jpg 1024w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9-300x214.jpg 300w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9-768x548.jpg 768w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9-1140x813.jpg 1140w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/thumbnail_pro-vJPYvBB9.jpg 1434w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The project led by Mohammed Alkurdi and Ashutosh Ghimire was presented at the IEEE VLSID 2024 conference held in July 2024 in Knoxville, TN. It aims on improving the resilience of hardware Trojan detection machine learning models against adversarial attacks. The methodology being followed is to create a surrogate machine learning mode that has the same accuracy as recent research. Afterwards, perform a feature-space adversarial attack on the model, to generate adversarial examples, which are then used in the retraining of the model to increase its resiliency against similar attacks. The threat model of our current project is that an adversary can modify his Trojan, then insert it into the chip design, afterwards check if the Trojan is detected by the machine learning model. If the trojan is detected, then modify the Trojan again and insert it again, else we can consider the adversarial attack a success.<\/p>\n<h2>Object detection with Tiny ML<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-566 alignright\" src=\"https:\/\/amsaad.com\/wp-content\/uploads\/2024\/07\/Picture1-1024x393.png\" alt=\"\" width=\"1024\" height=\"393\" srcset=\"https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-1024x393.png 1024w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-300x115.png 300w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-768x295.png 768w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-1536x589.png 1536w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-2048x786.png 2048w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture1-1140x437.png 1140w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>The project \u201cObject detection with tiny ML\u201d is led by Mounika Thatikonda. It aims to detect Vehicle Number plate and Helmet . It is implemented using Tiny ML Yolov8 model with the help of Raspberry pi through optimization techniques like neural architecture search and model compression, focusing on perceptible metrics like inference latency and energy consumption.\u00a0 To verify the performance of the YOLOv8, the experiments are conducted on a\u00a0 RHNP dataset, which contains four categories: rider, helmet, no-helmet, and license plate. The accuracy(mAP) of the Yolo V8 model without optimization is 56%. The future work includes adding security to this.<\/p>\n<h2>Explainable AI and Chronic Kidney Diseases<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-568 aligncenter\" src=\"https:\/\/amsaad.com\/wp-content\/uploads\/2024\/07\/Picture2.png\" alt=\"\" width=\"936\" height=\"333\" srcset=\"https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture2.png 936w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture2-300x107.png 300w, https:\/\/wright-smart-lab.site\/wp-content\/uploads\/2024\/07\/Picture2-768x273.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/p>\n<p>The research study was led by <span style=\"background-color: var(--colorlight); color: var(--colorfont); font-size: 1rem; letter-spacing: 0.02em;\">K M Tawsik <span class=\"OZZZK\">Jawad which <\/span><\/span>largely focuses on interpreting the decision-making process of the ensemble tree models for the prediction of chronic kidney disease. This research is organized to aid the physicians and patients in general to make them understand the factors affecting the kidneys for the chronic kidney disease. The end goal is to explain to them from the biological features on why this disease has been diagnosed in their body and what factors have played stronger roles in the occurrence of this disease. The research findings are analyzed, validated with nephrologists and also compared with existing methodologies.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Golden References Free Hardware Trojan Detection This project led by Ashutosh Ghimire was accepted for Lecture Presentation in IEEE NAECON<span class=\"more-dots\">&#8230;<\/span><\/p>\n","protected":false},"author":201,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-559","page","type-page","status-publish","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/users\/201"}],"replies":[{"embeddable":true,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=559"}],"version-history":[{"count":6,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/559\/revisions"}],"predecessor-version":[{"id":571,"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=\/wp\/v2\/pages\/559\/revisions\/571"}],"wp:attachment":[{"href":"https:\/\/wright-smart-lab.site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}