Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Yasin, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.07142  [pdf, other

    cs.CR

    CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks

    Authors: Levent Aksoy, Muhammad Yasin, Samuel Pagliarini

    Abstract: Logic locking proposed to protect integrated circuits from serious hardware threats has been studied extensively over a decade. In these years, many efficient logic locking techniques have been proven to be broken. The state-of-the-art logic locking techniques, including the prominent corrupt and correct (CAC) technique, are resilient to satisfiability (SAT)-based and removal attacks, but vulnerab… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  2. arXiv:2311.05982  [pdf, other

    cs.CR

    KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking

    Authors: Levent Aksoy, Muhammad Yasin, Samuel Pagliarini

    Abstract: This paper introduces KRATT, a removal and structural analysis attack against state-of-the-art logic locking techniques, such as single and double flip locking techniques (SFLTs and DFLTs). KRATT utilizes powerful quantified Boolean formulas (QBFs), which have not found widespread use in hardware security, to find the secret key of SFLTs for the first time. It can handle locked circuits under both… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

  3. arXiv:2110.12078  [pdf, other

    cs.RO

    Feasibility of Remote Landmark Identification for Cricothyrotomy Using Robotic Palpation

    Authors: Neel Shihora, Rashid M. Yasin, Ryan Walsh, Nabil Simaan

    Abstract: Cricothyrotomy is a life-saving emergency intervention that secures an alternate airway route after a neck injury or obstruction. The procedure starts with identifying the correct location (the cricothyroid membrane) for creating an incision to insert an endotracheal tube. This location is determined using a combination of visual and palpation cues. Enabling robot-assisted remote cricothyrotomy ma… ▽ More

    Submitted 22 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS'2021)

  4. arXiv:2103.02480  [pdf, other

    cs.RO cs.MA

    Cellular Formation Maintenance and Collision Avoidance Using Centroid-Based Point Set Registration in a Swarm of Drones

    Authors: Jawad N. Yasin, Huma Mahboob, Mohammad-Hashem Haghbayan, Muhammad Mehboob Yasin, Juha Plosila

    Abstract: This work focuses on low-energy collision avoidance and formation maintenance in autonomous swarms of drones. Here, the two main problems are: 1) how to avoid collisions by temporarily breaking the formation, i.e., collision avoidance reformation, and 2) how do such reformation while minimizing the deviation resulting in minimization of the overall time and energy consumption of the drones. To add… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: Accepted to the Intelligent Systems Conference (IntelliSys) 2021

  5. arXiv:2011.08737  [pdf

    cs.SE

    One Stop Career Centre for People with Disabilities

    Authors: Salhazan Nasution, Mohd Hanafi Mohd Yasin, Noraidah Sahari

    Abstract: Career is a journey of life that made the field of profession or employment options as a way to live. Careers are basis to generate income to sustain the needs of everyday life. Disabled people also need a job and benefit from the job same as a normal person. However, the attitudes of some prejudice community against the disabled people to find a job. The purpose of this paper is to discuss about… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

  6. arXiv:2011.03883  [pdf, other

    cs.RO

    Swarm Formation Morphing for Congestion Aware Collision Avoidance

    Authors: Jawad N. Yasin, Mohammad-Hashem Haghbayan, Muhammad Mehboob Yasin, Juha Plosila

    Abstract: The focus of this work is to present a novel methodology for optimal distribution of a swarm formation on either side of an obstacle, when evading the obstacle, to avoid overpopulation on the sides to reduce the agents' waiting delays, resulting in a reduced overall mission time and lower energy consumption. To handle this, the problem is divided into two main parts: 1) the disturbance phase: how… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

  7. Night vision obstacle detection and avoidance based on Bio-Inspired Vision Sensors

    Authors: Jawad N. Yasin, Sherif A. S. Mohamed, Mohammad-hashem Haghbayan, Jukka Heikkonen, Hannu Tenhunen, Muhammad Mehboob Yasin, Juha Plosila

    Abstract: Moving towards autonomy, unmanned vehicles rely heavily on state-of-the-art collision avoidance systems (CAS). However, the detection of obstacles especially during night-time is still a challenging task since the lighting conditions are not sufficient for traditional cameras to function properly. Therefore, we exploit the powerful attributes of event-based cameras to perform obstacle detection in… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Accepted to IEEE SENSORS 2020

  8. Dynamic Formation Reshaping Based on Point Set Registration in a Swarm of Drones

    Authors: Jawad N. Yasin, Sherif A. S. Mohamed, Mohammad-Hashem Haghbayan, Jukka Heikkonen, Hannu Tenhunen, Muhammad Mehboob Yasin, Juha Plosila

    Abstract: This work focuses on the formation reshaping in an optimized manner in autonomous swarm of drones. Here, the two main problems are: 1) how to break and reshape the initial formation in an optimal manner, and 2) how to do such reformation while minimizing the overall deviation of the drones and the overall time, i.e., without slowing down. To address the first problem, we introduce a set of routine… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Accepted to the Future of Information and Communication Conference (FICC) 2021

  9. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  10. arXiv:1909.04428  [pdf, other

    cs.CR

    ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

    Authors: Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu

    Abstract: While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hides the transformation functions that map… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 16 pages, 14 figures, IEEE Transactions on Emerging Topics in Computing

  11. Medical Technologies and Challenges of Robot Assisted Minimally Invasive Intervention and Diagnostics

    Authors: Nabil Simaan, Rashid M. Yasin, Long Wang

    Abstract: Emerging paradigms furthering the reach of medical technology deeper into human anatomy present unique modeling, control and sensing problems. This paper discusses a brief history of medical robotics leading to the current trend of minimally invasive intervention and diagnostics in confined spaces. Robotics for natural orifice and single port access surgery, capsule and magnetically actuated robot… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

    Journal ref: Annual Review of Control, Robotics, and Autonomous Systems, Vol. 1:465-490, 2018

  12. arXiv:1610.07707  [pdf, other

    cs.DB

    Path discovery by Querying the federation of Relational Database and RDF Graph

    Authors: Xiaowang Zhang, Jiahui Zhang, Muhammad Qasim Yasin, Wenrui Wu, Zhiyong Feng

    Abstract: The class of queries for detecting path is an important as those can extract implicit binary relations over the nodes of input graphs. Most of the path querying languages used by the RDF community, like property paths in W3C SPARQL 1.1 and nested regular expressions in nSPARQL are based on the regular expressions. Federated queries allow for combining graph patterns and relational database that en… ▽ More

    Submitted 24 October, 2016; originally announced October 2016.

    Comments: 11 pages

    ACM Class: H.2.3

  13. arXiv:1212.6354  [pdf

    cs.NI cs.OS

    LNOS - Live Network Operating System

    Authors: Sajjad Haider, Mehboob Yasin, Naveed Hussain, Muhammad Imran

    Abstract: Operating Systems exists since existence of computers, and have been evolving continuously from time to time. In this paper we have reviewed a relatively new or unexplored topic of Live OS. From networking perspective, Live OS is used for establishing Clusters, Firewalls and as Network security assessment tool etc. Our proposed concept is that a Live OS can be established or configured for an orga… ▽ More

    Submitted 27 December, 2012; originally announced December 2012.

    Comments: 6th CIIT Workshop on Research in Computing (CWRC, 2007)