Publications
Iris biometric security challenges and possible solutions: for your eyes only? Using the iris as a key
Summary
Summary
Biometrics were originally developed for identification, such as for criminal investigations. More recently, biometrics have been also utilized for authentication. Most biometric authentication systems today match a user's biometric reading against a stored reference template generated during enrollment. If the reading and the template are sufficiently close, the authentication is...
Operational exercise integration recommendations for DoD cyber ranges
Summary
Summary
Cyber-enabled and cyber-physical systems connect and engage virtually every mission-critical military capability today. And as more warfighting technologies become integrated and connected, both the risks and opportunities from a cyberwarfare continue to grow--motivating sweeping requirements and investments in cybersecurity assessment capabilities to evaluate technology vulnerabilities, operational impacts, and operator effectiveness...
Comparison of gate dielectric plasma damage from plasma-enhanced atomic layer deposited and magnetron sputtered TiN metal gates
Summary
Summary
Fully depleted silicon-on-insulator transistors were fabricated using two different metal gate deposition mechanisms to compare plasma damage effects on gate oxide quality. Devices fabricated with both plasma-enhanced atomic-layer-deposited (PE-ALD) TiN gates and magnetron plasma sputtered TiN gates showed very good electrostatics and short-channel characteristics. However, the gate oxide quality was...
Versatile alignment layer method for new types of liquid crystal photonic devices
Summary
Summary
Liquid crystal photonic devices are becoming increasingly popular. These devices often present a challenge when it comes to creating a robust alignment layer in pre-assembled cells. In this paper, we describe a method of infusing a dye into a microcavity to produce an effective photo-definable alignment layer. However, previous research...
Simulation based evaluation of a code diversification strategy
Summary
Summary
Periodic randomization of a computer program's binary code is an attractive technique for defending against several classes of advanced threats. In this paper we describe a model of attacker-defender interaction in which the defender employs such a technique against an attacker who is actively constructing an exploit using Return Oriented...
Vehicle-mounted STAR antenna isolation performance
Summary
Summary
Vehicle-to-vehicle communication systems promise enhanced safety for passengers, but require access to a crowded wireless spectrum to enable their data links. Simultaneous Transmit and Receive (STAR) systems can facilitate this spectrum access by increasing the number of users within a given frequency band. Since high isolation is needed for STAR...
A modification of the two-antenna method to determine the phase center location as well as the gain of a wideband antenna
Summary
Summary
A technique is presented for determining the amplitude center or phase center location of a wideband Vivaldi antenna at measurement distances of a few wavelengths. It is based on the well known two-antenna gain measurement technique but makes the antenna separation a variable. The phase center separation is shown to...
Guaranteeing spoof-resilient multi-robot networks
Summary
Summary
Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them particularly vulnerable to cyber-attacks. Specifically, such networks can be gravely disrupted by the Sybil attack, where even a single malicious robot can spoof a...
Temporal and multi-source fusion for detection of innovation in collaboration networks
Summary
Summary
A common problem in network analysis is detecting small subgraphs of interest within a large background graph. This includes multi-source fusion scenarios where data from several modalities must be integrated to form the network. This paper presents an application of novel techniques leveraging the signal processing for graphs algorithmic framework...
Thermal and residual excited-state population in a 3D transmon qubit
Summary
Summary
Remarkable advancements in coherence and control fidelity have been achieved in recent years with cryogenic solid-state qubits. Nonetheless, thermalizing such devices to their milliKelvin environments has remained a long-standing fundamental and technical challenge. In this context, we present a systematic study of the first-excited-state population in a 3D transmon superconducting...