Category Archives: News

Embedded System Competition Award

 

A UConn team of students competed in a MITRE-sponsored embedded systems security capture the flag competition this semester and got first place. The team was led by UG ECE students Brian Marquis and Patrick Dunham with grad student Chenglu Jin and two CSE UG students.

UConn Chapter of HKN wins the Outstanding Chapter Award (2015-2016)

The IEEE-HKN Board of Governors has conferred on the UConn Chapter of HKN (Eta Kappa Nu: the electrical engineering honor society) the 2015-2016 IEEE-HKN Outstanding Chapter Award. This award is presented to IEEE-HKN chapters in recognition of excellence in their chapter administration and programs. Recipients are selected on the basis of their annual chapter report. Winning chapter reports not only showcase their chapter’s activities in an individualized manner, they provided multiple views and instances of their work, which really brought their chapter’s activities to life. Of critical concern to the Outstanding Chapter Awards evaluation committee in judging a chapter are activities to: improve professional development; raise instructional and institutional standards; encourage scholarship and creativity; provide a public service, and generally further the established 

goals of IEEE-HKN.

 

The UConn Chapter is one of 21 chapters selected for their outstanding performance and the value they bring to their members, peers, and university.

UConn Named to Advanced Robotics Manufacturing Institute

The new national initiative aims to increase small manufacturers’ use of robots by 500 percent. Researchers at UConn will focus on the aerospace and shipbuilding industries. (Getty Images)

The University of Connecticut is part of a new national institute designed to advance robotics manufacturing and maintain America’s global competitiveness in that arena. UConn researchers will help develop new sensing, software, artificial intelligence, and other technologies to improve the use of robotics in manufacturing for the aerospace and shipbuilding industries.

The institute, called the Advanced Robotics Manufacturing Institute (ARM), was announced earlier this month and will include several Connecticut businesses and academic institutions. The Connecticut portion of the proposal was led by UConn, the United Technologies Research Center, UTC Aerospace Systems, and ABB US Corporate Research. The institute will be led by American Robotics Inc., a nonprofit associated with Carnegie Mellon University in Pittsburgh, Penn.

The ARM institute is the 14th and final national institute created under President Obama’s Manufacturing USA initiative, according to Michael Accorsi, senior associate dean of engineering.

“The focus on robotics makes it a great fit for Connecticut, with our strong ties to the aerospace and shipbuilding industries – industries that can really benefit from the next generation of robotic innovation,” he said.

The new institute is supported by a total of $253 million in funding. Federal funding represents $80 million of that, with the remaining money coming from 123 industrial partners, 40 academic and academically affiliated partners, and 64 government and nonprofit partners.

At UConn, Ashwin P. Dani’s Robotics and Controls Lab is already performing research on interactions between robots and humans. Dani and his graduate students are creating algorithms so that industrial robots can learn what action a person will likely take in a given situation. By understanding where a person will move, a robot can work alongside a human and avoid injuring them.

“The new institute is designed to create an ecosystem of robotics,” said Dani, assistant professor of electrical and computer engineering. “That ecosystem will involve creating collaborative robotics that can do flexible, highly variable jobs efficiently and create advancements in artificial intelligence, particularly human-robotic interactions. That’s an area we already focus on here at UConn.”

The U.S. Department of Defense’s Manufacturing USA initiative is designed to encourage private industry, academia, and government collaboration to revitalize and enhance U.S. competitiveness in key areas. As a part of ARM, UConn will create a new, advanced robotics facility within the new UConn Tech Park, which will expand on UConn’s existing robotic capabilities.

The aerospace, automotive, and electronics industries will represent 75 percent of all robots used in the country by 2025. UConn and other Connecticut partners are focusing on the aerospace and ship building industries, which have been slower to adopt robotic technologies than the automotive industry. Dani said that because these industries create a smaller volume of products than the automotive industry, they need robots that can do a variety of tasks.

“The automotive industry makes millions of cars every year, so each robot can be highly specialized. The aerospace industry creates far fewer individual products, so each robot needs to be able to quickly learn and perform multiple tasks,” Dani said. “UConn and ARM will make the innovations necessary to create agile, dexterous, and collaborative robotics.”

The new institute aims to increase small manufacturers’ use of robots by 500 percent. UConn will work with community colleges around the state to provide training in robotic jobs within existing STEM programs, to meet the increasing demands for the robotic manufacturing industry.

Engineering Alum’s Gift To Help Keep UConn Safe

UConn has installed a new system that can detect gunshots and explosions, and send live video feed to officers’ cellphones. (Sean Flynn/UConn Photo)

During active shooter events, the speed with which first responders get information is key to saving lives. Thanks to a donation from a UConn engineering alum, UConn police could learn about an event in a matter of seconds.

Robert Hotaling ’01, an electrical engineering alum and the founder of Verbi Security, is donating an intelligent gunshot detection and IP device unification platform to UConn. His company’s system detects gunshots or explosions, sends information to campus police through an automated system in a matter of seconds and links the location to maps and video cameras.

“That, to me is the difference here; we’re a mobile first solution. We leverage mobile devices to get instant notifications,” Hotaling said.

Hotaling was inspired to donate the system when a student worker made a routine alumni donation call. After considering the request, Hotaling decided to give something more than just money.

“I said ‘I could give you some money, but I’m the founder of this company, I’ve got this tech, and I could make a donation of that tech.’ If it wasn’t for that student, I might not have thought about the donation,” Hotaling said.

The platform, which Hotaling said is worth roughly $175,000, uses military grade intelligent shot detectors to search for specific sounds.

“The sensor listens, but not for the sound of

Electrical Engineering Alum Robert Hotaling ’01 meets with members of the UConn Police. (UConn Foundation Photo)

the human voice. The on board processing algorithm uses fuzzy logic to look for the acoustics of a gunshot or an explosion,” Hotaling said.

Hotaling stressed that there won’t be an invasion of privacy with the system.

“There are no privacy concerns here, all it’s doing is looking for the gunshot,” he said.

UConn has not had a problem with shooters, but recognized that the donation could enhance campus security.

“We’re using it to be very proactive,” says Hans Rhynhart, UConn’s interim director of public safety and chief of police. “This is a great opportunity to test a brand new system that has the potential to be really useful to our community.”

The system can notify officers in a variety of ways, including text messages, iPad notifications and text to speech automated phone calls- which officers are trained to look for.

“The officers get the notification, then click on the cameras in the zone and can get a live feed of what’s going on there,” he said.

The system is also capable of sending alerts to students, faculty and UConn employees with the same sort of fast turnaround.

Hotaling said that he’s excited by the chance to give back to UConn.

“I walked those halls,” He said. “I love UConn, I loved my time there, and I’m so happy to be a part of this process.”

Black Hats, Cyber Bots, Zombies, And You

The UConn Comcast Center of Excellence for Security Innovation houses researchers working to combat malicious hackers (Istockphoto).

The UConn Comcast Center of Excellence for Security Innovation houses researchers working to combat malicious hackers (Istockphoto).

By Colin Poitras, UConn Communications
This story originally appeared in UConn Magazine.

Cyberattacks come in all shapes and sizes. Experts say it could be only a matter of time before they pose a real threat to our daily lives. The electronic devices in our world today are interconnected like never before. Our cars are no longer machines but rolling PCs with different components constantly talking to one another. Our watches are telephones. Our telephones are high-speed computers. And with all this increased convenience comes greater vulnerability. In the constant rush to get new products to market, security can be an afterthought.

chandyFortunately, a crack team of cybersecurity specialists, led by John Chandy, an electrical and computer engineering professor, and Laurent Michel, an associate professor of computer science and engineering, is working to protect our information. UConn’s Comcast Center of Excellence for Security Innovation is advancing research to strengthen the nation’s electronic information networks and training a new generation of hardware, software, and network security engineers to protect the integrity of everything from small consumer electronics to the complex computer systems running our major industrial, financial, and transportation systems.

Secured behind passcode-protected entry doors, the Comcast lab is embedded deep inside one of UConn’s main academic buildings. Getting there can be an adventure.

If you visit the lab via the building’s main door, you must go down a set of stairs, along a long hallway to the rear of the building, then it’s a quick left, quick right, another left, up a ramp, through some fire doors, past the locked doors of several large humming mechanical rooms, another right, another left, yet another right, and finally a quick left and you are there. Or you might be. It’s hard to be sure because there is absolutely no indication of where the lab is on any of the directional office signs. Even next to the lab’s main door there is only a small 9- by 6-inch plaque in letters slightly larger than what you are reading here.

FBI Alert Number I-031716-PSA: Motor Vehicles are Increasingly Vulnerable to Remote Exploits
“researchers could gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities”

WHITE HAT HACKERS

Talk to Michel or Chandy for a few minutes and you begin to get a sense of what life is like in their world of electronic espionage. And if you leave feeling a little paranoid, well, that’s to be expected.

Michel will tell you that the world is filled with hackers and malicious machines

known as zombies, or computer bots, which hackers have seized via remote control and without their owners’ knowledge or permission. Those machines are constantly scouring the Internet trying to steal information from your, my, and everyone else’s computers. From the moment you open your laptop and connect to the Internet, your computer is likely getting assaulted by malicious attacks, Michel says. If your computer’s security is good and you keep current with all the latest security updates, chances are you’re successfully fending off most of them… for now. But hackers are a relentless and mischievous bunch. All it takes is one click on a bogus email, one click on an infected website, and the black hat hackers are in.

The good news is that amid the piles of green motherboards, electrical wiring, testing equipment, and computer consoles, Chandy, Michel, and a team of about a half-dozen very talented graduate and undergraduate students are playing the role of said hackers. Here, however, they are the good guys. Michel likes to describe the team as “ethical hackers,” white hats probing ever deeper into Comcast’s hardware and computing systems to expose potential vulnerabilities.

The battle between the white hats and the black hats is constant. Cybersecurity is an ever-shifting landscape as new technologies, system updates, viruses, worms, and attack strategies emerge on the Internet.

“John and I are constantly on the lookout for what’s happening,” says Michel. “What are the new vulnerabilities? What are the latest attacks? To do this properly, you have to be like a surfer. You have to be on top of the wave, not behind it. You have to keep moving and always stay a little bit ahead.”

If the lab is successful at breaking into a system, that’s a good thing. Exposing a vulnerability in the lab gives vendors the opportunity to correct a problem before a product goes to market or to fix a problem if the product is already in circulation.

If the research team fails to get into a system, well, that’s okay too. That means the system’s designers are on top of their game and did a great job protecting the system’s integrity and locking it tight.

Since it opened, Chandy says the lab has made significant discoveries that helped vendors and saved consumers considerable headache. But because of the often secretive nature of the lab’s work and its basis in security, the limelight of commercial success doesn’t always extend to the lab’s cubicles and workbenches.

When students find a potential vulnerability in a system, the lab immediately notifies the vendor or system provider so the weakness can be addressed. A lot of times, news of the discovery stops there. Chandy recounts a time when he and other lab members heard of a significant system vulnerability being discussed at a national cybersecurity conference. It sounded familiar. Chandy turned to his colleagues and whispered, “Didn’t we find that months ago?” Such is the nature of the business.

“The lab we have here is pretty unique for a university,” says Chandy. “A lot of times, the way we get into these systems is not necessarily through back doors. I would call them testing and debugging phases,” Chandy says. “One of the things a vendor wants to do when they release these systems is they want to test it. So they leave the interfaces open so we can do just that.”

 

FBI Alert Number I-091015-PSA: Internet of Things poses opportunities for cyber crime
“devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit”

 

THE INTERNET OF THINGS

Some of the latest technology on the market involves what Chandy calls the Internet of Things. People used to have a personal computer that did one job. A watch that did another. A telephone that had its uses and a TV or thermostat with separate functions. Now, with the Internet of Things, all of those devices are capable of interacting and talking to one another. You can turn up your home thermostat from work using your smart phone. You can check your email on your watch and pay your bills through your TV.

But with all that convenience and interconnectivity comes increased vulnerability. Keeping your information safe on all those different platforms is this team’s task.

“We’re mainly looking at things from a hardware level, those devices that are going out in the field and whether they are properly protected. We try to come up with scenarios that make sense from an attacker’s perspective,” says Chandy. “We take on the role of the hacker because if we can do it, that means a hacker can do it, too.”

As an academic lab, the Comcast Center is also a place of learning. The testing that is done here is not a matter of repetitive trial-and-error assaults, but a more deliberative, targeted, scientific process.

“Think of it like a game of Clue,” says Michel. “It’s not like we try something just to find out if it works or not. As we attempt an attack, we gather evidence along the way. That evidence may betray something about the platform, the device, the software that we are trying to test. Once we have that information, we regroup and discuss what we have learned and its implications, and then we try to develop more experiments and high-end scenarios so we can learn more. So it’s not like we have this dictionary of twenty different attacks and we try them all sequentially. It’s a much more principled approach.”

The students working in the lab operate in silence. A young woman types away intently on her keyboard. A bearded student in a New York Giants T-shirt sighs heavily, steps away from his computer for a brief break, then returns. Focused. Once again engrossed with the task before him at his work station. Two sage green walls in the rear of the lab are covered with black ink diagrams and hastily scrawled text.

An eviscerated teddy bear sits on a desktop.

“Stress relief, John?” a visitor asks, pointing to the multicolored wires ripped out of the bear’s abdomen.

“Side project,” Chandy answers with a sly grin. Then he explains that even a children’s toy as innocuous as a teddy bear can be a personal security threat. In this case, the interactive bear has a small computer inside that Chandy’s lab found lacked authentication protection. It could be hacked, potentially exposing the owner’s and other bear owners’ personal information with a few strokes of cyber sleight-of-hand.

“The students here are developing skills that none of them had a year ago,” says Chandy. “The skills they are developing would make them great hackers. But it is also making them great engineers.”

 

Lisa wasn’t looking forward to the confrontation. Her aging mother, bedridden with different ailments and dependent on care, was really angry this time. For months she had suspected Sarah, her live-in nurse, was stealing her money. And now, the latest bank statement confirmed it. On top of it all, Sarah always seemed to be on her iPad when her mother needed her. The chest pains were back. The small automatic defibrillator under her mother’s skin activated twice in the past two months. The stress wasn’t good.

Lisa enters the house. She eyes Sarah, who is standing, her back to her, at the kitchen counter – again, on her computer. Lisa walks into her mother’s room, careful to speak softly so their conversation won’t be overheard. Within a few minutes, Lisa notices her mother’s color start to change. She seems to have trouble breathing. Sweat builds on her upper lip. She tells Lisa she feels strange, like her heart is racing out of control. The device in her chest keeps vibrating, sending sharp shocks into her heart muscles. The shocks are getting stronger. Her mother cries out in pain. Lisa calls frantically for Sarah. No response. Her mother goes limp.

Back in the kitchen, Sarah quietly shuts down her iPad and walks toward the bedroom.

 
 

CSI CYBER — UCONN

More than 20 faculty members and more than 100 graduate students in the schools of Engineering and Business are conducting research through the Connecticut Cybersecurity Center at UConn. They are examining cryptography and cryptanalysis; data security and privacy; information fusion and data mining for Homeland Security; and trustable computing systems.

The academic research building that houses the Comcast Center of Excellence for Security Innovation houses two other major cyber- security labs. The Center for Hardware Assurance, Security, and Engineering (CHASE) contains some of the most advanced equipment available to conduct security analysis on nanoelectronics. Its research focuses on counterfeit device detection and preserving the integrity of silicon microchips, the very cornerstones of the worldwide computer industry. The building also is home to the Center for Voting Technology Research (VoTeR Center), which investigates new technologies to ensure the integrity of the electronic voting process.

 

Questions And Answers with UConn Alum Dipayan Ghosh

Dipayan GhoshDipayan Ghosh is a UConn alum who currently works in privacy and public policy for Facebook. He’ll be a part of our Engineering Centennial Lecture Series, speaking on April 11 in Laurel Hall, room 101.

He was previously a technology and economic policy advisor at the White House and was recently named to Forbes “30 under 30” list, which celebrates influential individuals in a variety of fields who are under 30 years old. UConn Engineering asked him a few questions, as a prelude to his talk.

How did your time at UConn help to prepare you for the interesting directions your career has taken?

My career has been grounded in my technology background, which I have attempted to apply in the business and policy world. I made my first steps at UConn as an undergraduate in electrical and computer engineering. During my time in Storrs, three aspects of my education really inspired and motivated me. The first was the quality of the academic community in the electronic and computer engineering (ECE) department. I had a chance to work with Professor Peter Luh, a chair of the department and former department head, who gave me the incredible opportunity to work at his lab as an undergraduate researcher. That exposed me to difficult research problems in mathematics and optimization, and gave me access to a brilliant group of lab mates. Second, the quality of the education. I found myself working quite a lot as an undergrad – and that was not only because the subject material itself was difficult, but also because our professors really challenged us to think outside the box. I recall a couple classes in particular that had my ECE class stumped more often than not. I was part of the honors and University Scholars programs through the undergraduate center, as well, which kept me busy with technical research alongside regular coursework. And third, the quality of my classmates and peers at the school; the ECE pool was a close-knit group of very talented students that worked as a team. That type of support network really helps you as an undergraduate.

You’ve had a very interesting career path so far, going from the White House to Facebook. What has led you down this path? Discuss the different work environments, and the process of adapting to the change between the two.

I have been very fortunate to have had these experiences, and am thankful for the start I got in college to get here. Having the opportunity to work at both the White House and Facebook has been incredibly valuable – it has given me a close view into the ways that both organizations make key decisions.  The end goal of each is to create value for people – and both are incredibly effective at doing just that. But they do so in very different ways; whereas the White House works through a bureaucracy across the federal agencies to develop policy recommendations or make decisions, Facebook operates on a somewhat different timeline and structure. Both systems are highly influential and impact millions or billions of people with every action they take – but the two systems actually teach you very different things about decision-making and management.  That’s been the most interesting dynamic for me, and while it takes time to adjust to any new experience I have really enjoyed my experience at Facebook.

Your research interests during grad school focused on the practical limitations of technological privacy due to competing stakeholders. Where did your interest in this topic come from? What about that intersection fascinates you?

Privacy is one of the most critical issues to consider in the context of modern commerce over the Internet – perhaps the most critical. The Internet ecosystem and much of global commerce are driven by data and, to a large extent, personal information. Companies and government organizations that collect such sensitive personal information have to take care to give individuals the appropriate access to and control over their data. Otherwise, they both run the risk of losing public trust, and the Internet ecosystem can be eroded. This understanding has driven me to this field. Without consumer privacy, the Internet as we know it would not exist at all. I first started examining privacy in detail at Cornell, under the supervision of Professor Stephen Wicker. Previously, I had primarily studied fields in mathematics, including optimization and nonlinear programming. As I became more interested in the field of information theory, I saw the fundamental relevance of privacy and computer security. I found that both government and industry have to take steps to make sure they transmit, use, and store sensitive data in ways that respect consumer privacy. Some of that falls into cybersecurity, and making sure that organizations uphold an adequate level of data protection. But part of that also comes down to the choices those organizations make about consumer data. When the Snowden disclosures occurred some years later, the public eye really turned toward these issues in a big way.

Describe your current role at Facebook and what you hope to accomplish as a privacy and public policy advisor.

Facebook works diligently to protect its users’ privacy, and the company’s development of public policy on privacy issues reflects the steps it takes internally to assure protection. This work starts with making the right choices for internal data policies – that is, with respect to the kinds of data we might collect and how we might secure it on our systems to ensure that malicious hackers do not gain illegal access to it.  But it also means that we need to actively survey the public’s current sentiment around privacy and security issues, and try to address these sentiments on our site. That, for a large part, is my job – to understand public sentiment and, working with our team in California, support the development of the policies and standards that we uphold on our site. That policy development process manifests itself in a number of ways – including in how we assure privacy and security for users on the platform, or how we might deal with uploaded content that doesn’t meet the standards of our public statement of rights.

How does a company or government agency balance privacy and the need for rich data?

I think both kinds of organizations – the federal government and tech companies – think hard about collecting personal data before they do it. The reason for that is simple: at the end of the day, the U.S. government and publicly traded companies are responsible to their individual constituents – whether the American people, or individual users of Facebook. That brings a very real element to balancing privacy. Companies and governments always have to take care to secure and protect data, and live by certain principles in their use of that data – principles that are known to and agreed upon by the persons to which that data pertains.

What are reasonable expectations of privacy now? How proactive does an individual need to be to ensure their own privacy (this is in relation to your research interests, not just in relation to your new role at Facebook)?

In my view, people play an important role in ensuring their privacy. Every day, we make choices about the digital presence we create for ourselves. Those choices define our online activity, but also inherently our digital privacy and security. For instance, some people might decide against using online banking or payment applications because they do not wish to share their financial information. Ultimately, I find that organizations collect data to make the world more interconnected and deliver richer content and greater value to us. That’s the fundamental nature of the Internet ecosystem, and it goes beyond only the federal government or technology companies, and extends to health care, finance, and educations – all of these are areas in which organizations are increasingly accessing sensitive data. What is most critical is that they give consumers the appropriate choice and control over how their data is used.

 

International Conference on Complex Systems Engineering (ICCSE 2015) Held in UConn

The University of Connecticut (UCONN) organized a two-day international conference on complex systems engineering (ICCSE 2015) on November 9-10, 2015 at the UConn’s main campus in Storrs, CT. The conference organization committee was led by Dr. Krishna Pattipati as the general chair and Dr. Shalabh Gupta as the program chair. The conference was focused on latest developments in analysis and modeling of complex systems that are built from, and depend upon, the synergy of computational and physical components, the so-called cyber physical systems. The conference featured talks by plenary speakers from industry and academia, panel discussions, technical paper sessions, student poster sessions and industry exhibits. The conference was a 2nd year initiative by the recently established UTC Institute for Advanced Systems Engineering (UTC-IASE). The conference was financially co-sponsored by UTC and Aptima and technically sponsored by IEEE-Systems Man and Cybernetics Society. The conference served one of the institute’s goals of making it a hub for world-class research, project-based learning by globally-distributed teams of researchers, and industrial outreach activities.UTCmeeting3_1

There were four plenary speakers, viz., Dr. Michael McQuade (Senior Vice President of Science and Technology at UTC), Dr. Edward Lee (Robert S. Pepper Distinguished Professor in the Electrical Engineering and Computer Sciences (EECS) department at U.C. Berkeley), Dr. George Pappas (Joseph Moore Professor in the Department of Electrical and Systems Engineering at the University of Pennsylvania), and Dr. Chris Paredis (Program Director for the Engineering and Systems Design (ESD) and Systems Science (SYS) programs at the National Science Foundation). Dr. Michael McQuade outlined the mega-trends that are impacting systems engineering and highlighted technology and talent needs of the industry and more specifically of UTC. Dr. Edward Lee provided an overview of the need for models with time and concurrency requirements, model-based design and analysis, domain-specific languages, architectures for real-time computing, schedulability analysis, and modeling and programming of distributed real-time systems. Dr. George Pappas gave a talk on formal synthesis and analysis for supervisory control of hierarchical hybrid systems using linear temporal logic. Dr. Chris Paredis spoke about the theoretical foundations for Systems Engineering, the role of modeling in Systems Engineering  and gave the audience a glimpse of opportunities for research in Systems Engineering and model based systems engineering (MBSE) being sponsored by NSF.

In addition to the plenary speakers, many representatives from industry and academia presented their latest research along three tracks of embedded systems, complex networked systems: control and inference, and model based systems engineering and applications. There was an education panel where educators from UConn, Stevens Institute of Technology, and Worcester Polytechnic Institute and UTC exchanged lessons learned and discussed the standardization of Systems Engineering education. The conference was truly international with representation from Asia, Europe and North America. More than 80 people participated in the conference which led to a healthy exchange of ideas. Planning for next year’s conference on the Avery Point campus of the University of Connecticut is already underway.

 

Bahram Javidi Wins Prestigious EPS Prize

Bahram Javidi, Board of Trustees Distinguished Professor in Electrical and Computer Engineering, has been awarded the prestigious European Physical Society for Applied Aspects of Quantum Electronics and Optics.

javidi1

These prizes, awarded only once every two years, recognize the highest level of achievements in fundamental and applied research in optical physics. Prof. Javidi’s prize was awarded specifically for his “pioneering contributions to information optics, including 3D imaging, 3D displays, and 3D imaging of photon starved scenes.”

Prof. Javidi’s interests are in a broad range of transformative imaging approaches that use optics and photonics, and he has made seminal contributions to passive and active multi-dimensional imaging from nano- to micro- and macroscales. His recent research activities include 3D visualization and recognition of objects in photon-starved environments using passive imaging; automated disease identification using biophotonics with low cost compact sensors to be used in developing countries; information security, encryption, and authentication using quantum imaging; non-planar flexible 3D image sensing, and bio-inspired imaging.

Prof. Javidi recently received international attention for his work with QR codes and their potential to increase the security of computer microchips.
   
Prof. Javidi has been recognized for his outstanding achievements in many other ways. He has been named Fellow of eight societies, including IEEE, OSA, SPIE, EOS, and IoP. Early in his career, the National Science Foundation named him a Presidential Young Investigator. Prof. Javidi has received the SPIE Dennis Gabor Award in Diffractive Wave Technologies (2005) and the SPIE Technology Achievement Award (2008). In 2008, he was awarded the IEEE Donald G. Fink Paper Prize (2008), and the John Simon Guggenheim Foundation Fellow Award. In 2007, the Alexander von Humboldt Foundation (Germany) awarded Prof. Javidi the Humboldt Prize

IEEE Honors UConn Alum Marshall Greenspan

Marshall Greenspan, who received his Ph.D. in electrical engineering from the University of Connecticut in 1969, has been awarded by the Institute of Electrical and Electronics Engineers (I.E.E.E.) the Dennis J. Picard Medal for Radar Technologies and Applications.

Officials from I.E.E.E., the largest technical society in the world, honored Greenspan for his “contributions to the development of multiple phase-center airborne surface surveillance and targeting radars.”

Greenspan_300DPI_Color_AK5A9948

Greenspan, an IEEE Fellow, received the award at the IEEE Honors Ceremony Gala June 20th at the Waldorf Astoria Hotel in New York.

Recently retired from Northrop Grumman Corporation, where he worked as a senior consulting systems engineer, Greenspan began his 50-year career developing modes for the radars on the Navy’s A6-E aircraft. Originally designed for navigation, targeting and terrain avoidance, the A-6E radar was upgraded under Dr. Greenspan’s guidance to become the Radar Guided Weapon System (RGWS). The RGWS was a groundbreaking system that generated high resolution images of the beam area and pinpointed the location of moving targets. The Defense Advanced Research Projects Agency (DARPA) adopted the RGWS technology into the Pave Mover program, which put side-looking radar into the EF-111 aircraft to detect and track armored surface vehicles at long range, while simultaneously guiding precision munitions to a target.

This technology became part of the U.S. Air Force/Army E-8 Joint Surveillance Target Attack Radar System (JSTARS), which provides ground surveillance to military commanders to support attack operations. With Dr. Greenspan’s expertise, JSTARS enabled US forces to map the position of the retreating Iraqi army during Operation Desert Storm. This work helped demonstrate the feasibility of GMTI space-time adaptive processing (STAP) for air-to-surface moving target radars at a time when computing technology was inferior to what is currently available. STAP’s importance to the radar community continues to grow as computing technology and radar hardware improve.

Besides getting his Ph.D. at UConn (he received his bachelor’s and master’s at MIT), Greenspan said UConn played a role in his role his IEEE award in another way: UConn’s Prof. Peter Willett was the one who nominated him as an IEEE Fellow.

QR Codes Engineered Into Cybersecurity Protection

QR, or Quick Response, codes – those commonly black and white boxes that people scan with a smartphone to learn more about something – have been used to convey information about everything from cereals to cars and new homes.

But, University of Connecticut (UConn) researchers think the codes have a greater potential: protecting national security.

Using advanced 3-D optical imaging and extremely low light photon counting encryption, Board of Trustees Distinguished Professor Bahram Javidi and his research team have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can be used to protect the integrity of computer microchips. The findings were published in IEEE Photonics Journal.

QRCode1[1]

“An optical code or QR code can be manufactured in such a way that it is very difficult to duplicate,” said Javidi, whose team is part of UConn’s Center for Hardware Assurance, Security, and Engineering (CHASE) in the School of Engineering. “But if you have the right keys, not only can you authenticate the chip, but you can also learn detailed information about the chip and what its specifications are.

“And, that is important to the person using it.”

Corrupted and recycled integrated circuits or microchips posed a significant threat to the international electronics supply chain. Bogus or used computer chips may not matter much when they cause poor cell phone reception or an occasional laptop computer crash in personal use. But the problem becomes exponentially more serious when counterfeit or hacked chips turn up in the U.S. military.

The problem has been exacerbated in recent years by the fact that much of the national production of microcircuits has moved offshore, where prices are lower but ensuring quality control is more difficult.

In 2012, a Senate Armed Services Committee report found that more than 100 cases of suspected counterfeit electronics parts from China had made their way into the Department of Defense supply chain. In one notable example, officials said counterfeit circuits were used in a high-altitude missile meant to destroy incoming missiles. Fixing the problem cost the government $2.675 million, the report said.

Unlike commercial QR codes, Javidi’s little black and white boxes can be scaled as small as microns or a few millimeters and would replace the electronic part number that is currently stamped on most microchips.

Javidi says he can compress vital information about a chip – its functionality, capacity, and part number – directly into the QR code so it can be obtained by the reader without accessing the Internet. This is important in cybersecurity circles, because linking to the Internet greatly increases vulnerability to hacking or corruption. Javidi’s work with QR codes was supported in part by the National Science Foundation.

To further protect the information in the QR code, Javidi applies an optical imaging “mask” that scrambles the QR code design into a random mass of black-and-white pixels that look similar to the snowy images one might see on a broken TV. He then adds yet another layer of security through a random phase photon-based encryption that turns the snowy image into a darkened nighttime sky with just a few random stars or dots of pixilated light.

The end result is a self-contained, highly secure, information-laden microscopic design that is nearly impossible to duplicate. Only individuals who have the special corresponding codes could decrypt the QR image.

And that is important to all of us.