Publications
SoK: cryptographically protected database search
Summary
Summary
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly, systems are offered by academia, start-ups...
Strong effect of azodye layer thickness on RM-stabilized photoalignment
Summary
Summary
We have previously proposed a process for stabilizing azodye photo-alignment layers using a surface localized reactive mesogen (RM) layer applied by dissolving the monomer in a liquid crystal prior to filling the cell. Surprisingly, thin azodye layers (~3 nm) exhibit improved stability upon exposure to polarized light compared to thicker...
Broadband transparent optical phase change materials
Summary
Summary
We report a new group of optical phase change materials Ge-Sb-Se-Te (GSST) with low loss from telecom bands to LWIR. We further demonstrated GSST-integratedSiN photonics with significantly improved switching performance over conventional GST alloys.
Fabrication security and trust of domain-specific ASIC processors
Summary
Summary
Application specific integrated circuits (ASICs) are commonly used to implement high-performance signal-processing systems for high-volume applications, but their high development costs and inflexible nature make ASICs inappropriate for algorithm development and low-volume DoD applications. In addition, the intellectual property (IP) embedded in the ASIC is at risk when fabricated in...
Wind turbine interference mitigation using a waveform diversity radar
Summary
Summary
Interference from the proliferation of wind turbines is becoming a problem for ground-based medium-to-high pulse repetition frequency (PRF) pulsed–Doppler air surveillance radars. This paper demonstrates that randomizing some parameters of the transmit waveform from pulse to pulse, a filter can be designed to suppress both the wind turbine interference and...
Seismic barrier protection of critical infrastructure
Summary
Summary
Each year, on average a major magnitude-8 earthquake strikes somewhere in the world. In addition, 10,000 earthquake related deaths occur annually, where collapsing buildings claim by far most lives. Moreover, in recent events, industry activity of oil extraction and wastewater reinjection are suspected to cause earthquake swarms that threaten high-value...
Effect of surface roughness and H-termination chemistry on diamond's semiconducting surface conductance
Summary
Summary
The H-terminated surface of diamond when activated with NO2 produces a surface conduction layer that has been used to make FETs. Variations in processing can significantly affect this conduction layer. This article discusses the effect of diamond surface preparation and H termination procedures on surface conduction. Surface preparations that generate...
Twitter language identification of similar languages and dialects without ground truth
Summary
Summary
We present a new method to bootstrap filter Twitter language ID labels in our dataset for automatic language identification (LID). Our method combines geolocation, original Twitter LID labels, and Amazon Mechanical Turk to resolve missing and unreliable labels. We are the first to compare LID classification performance using the MIRA...
Bounded-collusion attribute-based encryption from minimal assumptions
Summary
Summary
Attribute-based encryption (ABE) enables encryption of messages under access policies so that only users with attributes satisfying the policy can decrypt the ciphertext. In standard ABE, an arbitrary number of colluding users, each without an authorized attribute set, cannot decrypt the ciphertext. However, all existing ABE schemes rely on concrete...
Predicting exploitation of disclosed software vulnerabilities using open-source data
Summary
Summary
Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and users quickly install those patches as soon as they are available. However, most vulnerabilities are...