Publications
In situ microfluidic SERS assay for monitoring enzymatic breakdown of organophosphates
Summary
Summary
In this paper, we report on a method to probe the breakdown of the organophosphate (OP) simulants o, s-diethyl methyl phosphonothioate (OSDMP) and demeton S by the enzyme organophosphorous hydrolase (OPH) in a microfluidic device by surface enhanced Raman spectroscopy (SERS). SERS hotspots were formed on-demand inside the microfluidic device...
Fabrication process and properties of fully planarized deep-submicron Nb/Al-AlOx/Nb Josephson junctions for VLSI circuits
Summary
Summary
A fabrication process for Nb/Al-AlOx/Nb Josephson junctions (JJs) with sizes down to 200 nm has been developed on a 200-mm-wafer tool set typical for CMOS foundry. This process is the core of several nodes of a roadmap for fully-planarized fabrication processes for superconductor integrated circuits with 4, 8, and 10...
Inductance of circuit structures for MIT LL superconductor electronics fabrication process with 8 niobium layers
Summary
Summary
Inductance of superconducting thin-film inductors and structures with linewidth down to 250 nm has been experimentally evaluated. The inductors include various striplines and microstrips, their 90 degree bends and meanders, interlayer vias, etc., typically used in superconducting digital circuits. The circuits have been fabricated by a fully planarized process with...
Silicon Geiger-mode avalanche photodiode arrays for photon-starved imaging
Summary
Summary
Geiger-mode avalanche photodiodes (GMAPDs) are capable of detecting single photons. They can be operated to directly trigger all-digital circuits, so that detection events are digitally counted or time stamped in each pixel. An imager based on an array of GMAPDs therefore has zero readout noise, enabling quantum-limited sensitivity for photon-starved...
Revised multifunction phased array radar (MPAR) network siting analysis
Summary
Summary
As part of the NextGen Surveillance and Weather Radar Capability (NSWRC) program, the Federal Aviation Administration (FAA) is currently developing the solution for aircraft and meteorological surveillance in the future National Airspace System (NAS). A potential solution is a multifunction phased array radar (MPAR) that would replace some or all...
Missing the point(er): on the effectiveness of code pointer integrity
Summary
Summary
Memory corruption attacks continue to be a major vector of attack for compromising modern systems. Numerous defenses have been proposed against memory corruption attacks, but they all have their limitations and weaknesses. Stronger defenses such as complete memory safety for legacy languages (C/C++) incur a large overhead, while weaker ones...
Simultaneous transmit and receive (STAR) system architecture using multiple analog cancellation layers
Summary
Summary
Simultaneous Transmit and Receive operation requires a high amount of transmit-to-receive isolation in order to avoid self-interference. This isolation is best achieved by utilizing multiple cancellation techniques. The combination of adaptive multiple-input multiple-output spatial cancellation with a high-isolation antenna and RF canceller produces a novel system architecture that focuses on...
Repeatable reverse engineering for the greater good with PANDA
Summary
Summary
We present PANDA, an open-source tool that has been purpose-built to support whole system reverse engineering. It is built upon the QEMU whole system emulator, and so analyses have access to all code executing in the guest and all data. PANDA adds the ability to record and replay executions, enabling...
Coherent beam-combining of quantum cascade amplifier arrays
Summary
Summary
We present design, packaging and coherent beam combining of quantum cascade amplifier (QCA) arrays, measurements of QCA phase noise, the drive-current-to-optical-phase transfer function, and the small signal gain for QCAs.
Unifying leakage classes: simulatable leakage and pseudoentropy
Summary
Summary
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect. In this work, we consider the memory leakage...