Publications

Refine Results

(Filters Applied) Clear All

Digital pixel CMOS focal plane array with on-chip multiply accumulate units for low-latency image processing

Published in:
SPIE, Vol. 9070, Infrared Technology and Applications XL, 5 May 2014, 90703B.

Summary

A digital pixel CMOS focal plane array has been developed to enable low latency implementations of image processing systems such as centroid trackers, Shack-Hartman wavefront sensors, and Fitts correlation trackers through the use of in-pixel digital signal processing (DSP) and generic parallel pipelined multiply accumulate (MAC) units. Light intensity digitization occurs at the pixel level, enabling in-pixel DSP and noiseless data transfer from the pixel array to the peripheral processing units. The pipelined processing of row and column image data prior to off chip readout reduces the required output bandwidth of the image sensor, thus reducing the latency of computations necessary to implement various image processing systems. Data volume reductions of over 80% lead to sub 10us latency for completing various tracking and sensor algorithms. This paper details the architecture of the pixel-processing imager (PPI) and presents some initial results from a prototype device fabricated in a standard 65nm CMOS process hybridized to a commercial off-the-shelf short-wave infrared (SWIR) detector array.
READ LESS

Summary

A digital pixel CMOS focal plane array has been developed to enable low latency implementations of image processing systems such as centroid trackers, Shack-Hartman wavefront sensors, and Fitts correlation trackers through the use of in-pixel digital signal processing (DSP) and generic parallel pipelined multiply accumulate (MAC) units. Light intensity digitization...

READ MORE

Spectral subgraph detection with corrupt observations

Published in:
Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, 4-9 May 2014.

Summary

Recent work on signal detection in graph-based data focuses on classical detection when the signal and noise are both in the form of discrete entities and their relationships. In practice, the relationships of interest may not be directly observable, or may be observed through a noisy mechanism. The effects of imperfect observations add another layer of difficulty to the detection problem, beyond the effects of typical random fluctuations in the background graph. This paper analyzes the impact on detection performance of several error and corruption mechanisms for graph data. In relatively simple scenarios, the change in signal and noise power is analyzed, and this is demonstrated empirically in more complicated models. It is shown that, with enough side information, it is possible to fully recover performance equivalent to working with uncorrupted data using a Bayesian approach, and a simpler cost-optimization approach is shown to provide a substantial benefit as well.
READ LESS

Summary

Recent work on signal detection in graph-based data focuses on classical detection when the signal and noise are both in the form of discrete entities and their relationships. In practice, the relationships of interest may not be directly observable, or may be observed through a noisy mechanism. The effects of...

READ MORE

Adaptive attacker strategy development against moving target cyber defenses

Summary

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-day exploits into existence. Attacker response to two defender temporal platform migration scheduling policies are examined. In the first defender scheduling policy, the defender selects the active platform in each match uniformly at random from a pool of available platforms. In the second policy the defender schedules each successive platform to maximize the diversity of the source code presented to the attacker. Adaptive attacker response strategies are modeled by finite state machine (FSM) constructs that evolve during simulated play against defender strategies via an evolutionary algorithm. It is demonstrated that the attacker learns to invest heavily in exploit creation for the platform with the least similarity to other platforms when faced with a diversity defense, while avoiding investment in exploits for this least similar platform when facing a randomization defense. Additionally, it is demonstrated that the diversity-maximizing defense is superior for shorter duration attacker-defender engagements, but performs sub-optimally in extended attacker-defender interactions.
READ LESS

Summary

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the...

READ MORE

Wind Information Requirements for NextGen Applications - Phase 2 Final Report(7.63 MB)

Summary

Accurate wind information is of fundamental importance to some of the critical future air traffic concepts envisioned under the FAA’s Next Generation Air Transportation System (NextGen) initiative. In the first phase of this work, a Wind Information Analysis Framework was developed to help explore the relationship of wind information to NextGen application performance. A refined version of the framework has been developed for the Phase 2 work.
READ LESS

Summary

Accurate wind information is of fundamental importance to some of the critical future air traffic concepts envisioned under the FAA’s Next Generation Air Transportation System (NextGen) initiative. In the first phase of this work, a Wind Information Analysis Framework was developed to help explore the relationship of wind information to...

READ MORE

Impact ionization in AlxGa1-xASySb1-y avalanche photodiodes

Summary

Avalanche photodiodes (APDs) have been fabricated in order to determine the impact ionization coefficients of electrons (alpha) and holes (beta) in AlxGa1-xAsySb1-y lattice matched to GaSb for three alloy compositions: (x=0.40, y=0.035), (x=0.55, y=0.045), and (x=0.65, y=0.054). The impact ionization coefficients were calculated from photomultiplication measurements made on specially designed APDs, which allowed for both pure electron and pure hole injection in the same device. Photo-multiplication measurements were made at temperatures ranging from 77K to 300K for all three alloys. A quasi-physical model with an explicit temperature dependence was used to express the impact ionization coefficients as a function of electric-field strength and temperature. For all three alloys, it was found that alpha < beta at any given temperature. In addition, the values of the impact ionization coefficients were found to decrease as the aluminum concentration of the AlGaAsSb alloy was increased. A value between 1.2 and 4.0 was found for beta/x, which is dependent on temperature, alloy composition, and electric-field strength.
READ LESS

Summary

Avalanche photodiodes (APDs) have been fabricated in order to determine the impact ionization coefficients of electrons (alpha) and holes (beta) in AlxGa1-xAsySb1-y lattice matched to GaSb for three alloy compositions: (x=0.40, y=0.035), (x=0.55, y=0.045), and (x=0.65, y=0.054). The impact ionization coefficients were calculated from photomultiplication measurements made on specially designed...

READ MORE

LuminoCity: a 3D printed, illuminated city generated from LADAR data

Published in:
TePRA 2014: IEEE Int. Conf. on Tech. for Practical Robot Appl., 14-15 April 2014.

Summary

In this work, we describe LuminoCity, a novel three-dimensional data display. A 3D printed model of Cambridge, MA was generated from LADAR data. A translucent plastic model was then cast from a mold of the 3D printed model. We developed a display system to project data onto the translucent model, and we can project a wide range of analyses onto the city, including satellite imagery and network traffic.
READ LESS

Summary

In this work, we describe LuminoCity, a novel three-dimensional data display. A 3D printed model of Cambridge, MA was generated from LADAR data. A translucent plastic model was then cast from a mold of the 3D printed model. We developed a display system to project data onto the translucent model...

READ MORE

Strategic evolution of adversaries against temporal platform diversity active cyber defenses

Published in:
2014 Spring Simulation Multi-Confernece, SpringSim 2014, 13-16 April 2014.

Summary

Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this study, we develop a set of tools to model the adaptive strategy formulation of an intelligent actor against an active cyber defensive system. We encode strategies as binary chromosomes representing finite state machines that evolve according to Holland's genetic algorithm. We study the strategic considerations including overall actor reward balanced against the complexity of the determined strategies. We present a series of simulation results demonstrating the ability to automatically search a large strategy space for optimal resultant fitness against a variety of counter-strategies.
READ LESS

Summary

Adversarial dynamics are a critical facet within the cyber security domain, in which there exists a co-evolution between attackers and defenders in any given threat scenario. While defenders leverage capabilities to minimize the potential impact of an attack, the adversary is simultaneously developing countermeasures to the observed defenses. In this...

READ MORE

Finding focus in the blur of moving-target techniques

Published in:
IEEE Security and Privacy, Vol. 12, No. 2, March/April 2014, pp. 16-26.

Summary

Moving-target (MT) techniques seek to randomize system components to reduce the likelihood of a successful attack, add dynamics to a system to reduce the lifetime of an attack, and diversify otherwise homogeneous collections of systems to limit the damage of a large-scale attack. In this article, we review the five dominant domains of MT techniques, consider the advantages and weaknesses of each, and make recommendations for future research.
READ LESS

Summary

Moving-target (MT) techniques seek to randomize system components to reduce the likelihood of a successful attack, add dynamics to a system to reduce the lifetime of an attack, and diversify otherwise homogeneous collections of systems to limit the damage of a large-scale attack. In this article, we review the five...

READ MORE

Effective parallel computation of eigenpairs to detect anomalies in very large graphs

Published in:
SIAM Conference on Parallel Processing for Scientific Computing

Summary

The computational driver for an important class of graph analysis algorithms is the computation of leading eigenvectors of matrix representations of the graph. In this presentation, we discuss the challenges of calculating eigenvectors of modularity matrices derived from very large graphs (upwards of a billion vertices) and demonstrate the scaling properties of parallel eigensolvers when applied to these matrices.
READ LESS

Summary

The computational driver for an important class of graph analysis algorithms is the computation of leading eigenvectors of matrix representations of the graph. In this presentation, we discuss the challenges of calculating eigenvectors of modularity matrices derived from very large graphs (upwards of a billion vertices) and demonstrate the scaling...

READ MORE

Secondary Surveillance Phased Array Radar (SSPAR): initial feasibility study

Summary

The U.S. Federal Aviation Administration is deploying Automatic Dependent Surveillance-Broadcast (ADS-B) to provide next-generation surveillance derived through down- and cross-link of global positioning satellite (GPS) navigation data. While ADS-B will be the primary future surveillance system, FAA recognizes that backup surveillance capabilities must be provided to assure that air traffic control (ATC) services can continue to be provided when individual aircraft transponders fail and during localized, short-duration GPS outages. This report describes a potential ADS-B backup capability, Secondary Surveillance Phased Array Radar or SSPAR. SSPAR will interrogate aircraft transponders and receive replies using a sparse, non-rotating array of approximately 17 omnidirectional (in azimuth) antennae. Each array element will transmit and receive independently so as to form directional transmit beams for transponder interrogation, and support high-resolution direction finding for received signals. Because each SSPAR element is independently digitized, transponder returns from all azimuths can be equipped with Traffic Alert and Collision Avoidance System (TCAS) and ADS-B avionics to reduce spectrum usage and maintain the high surveillance update rate (~1 per second) achieved by ADS-B. Recurring costs for SSPAR will be low since it involves no moving parts and the number of array channels is small. This report describes an SSPAR configuration supporting terminal operations. We consider interrogation and receive approaches, antenna array configuration, signal processing and preliminary performance analysis. An analysis of SSPAR's impact on spectrum congestion in the beacon radar band is presented, as are concepts for integrating SSPAR and next generation primary radar to improve the efficiency and accuracy of aircraft and weather surveillance.
READ LESS

Summary

The U.S. Federal Aviation Administration is deploying Automatic Dependent Surveillance-Broadcast (ADS-B) to provide next-generation surveillance derived through down- and cross-link of global positioning satellite (GPS) navigation data. While ADS-B will be the primary future surveillance system, FAA recognizes that backup surveillance capabilities must be provided to assure that air traffic...

READ MORE