Category Archives: News

Engineering Alum’s Gift To Help Keep UConn Safe

UConn has installed a new system that can detect gunshots and explosions, and send live video feed to officers’ cellphones. (Sean Flynn/UConn Photo)

During active shooter events, the speed with which first responders get information is key to saving lives. Thanks to a donation from a UConn engineering alum, UConn police could learn about an event in a matter of seconds.

Robert Hotaling ’01, an electrical engineering alum and the founder of Verbi Security, is donating an intelligent gunshot detection and IP device unification platform to UConn. His company’s system detects gunshots or explosions, sends information to campus police through an automated system in a matter of seconds and links the location to maps and video cameras.

“That, to me is the difference here; we’re a mobile first solution. We leverage mobile devices to get instant notifications,” Hotaling said.

Hotaling was inspired to donate the system when a student worker made a routine alumni donation call. After considering the request, Hotaling decided to give something more than just money.

“I said ‘I could give you some money, but I’m the founder of this company, I’ve got this tech, and I could make a donation of that tech.’ If it wasn’t for that student, I might not have thought about the donation,” Hotaling said.

The platform, which Hotaling said is worth roughly $175,000, uses military grade intelligent shot detectors to search for specific sounds.

“The sensor listens, but not for the sound of

Electrical Engineering Alum Robert Hotaling ’01 meets with members of the UConn Police. (UConn Foundation Photo)

the human voice. The on board processing algorithm uses fuzzy logic to look for the acoustics of a gunshot or an explosion,” Hotaling said.

Hotaling stressed that there won’t be an invasion of privacy with the system.

“There are no privacy concerns here, all it’s doing is looking for the gunshot,” he said.

UConn has not had a problem with shooters, but recognized that the donation could enhance campus security.

“We’re using it to be very proactive,” says Hans Rhynhart, UConn’s interim director of public safety and chief of police. “This is a great opportunity to test a brand new system that has the potential to be really useful to our community.”

The system can notify officers in a variety of ways, including text messages, iPad notifications and text to speech automated phone calls- which officers are trained to look for.

“The officers get the notification, then click on the cameras in the zone and can get a live feed of what’s going on there,” he said.

The system is also capable of sending alerts to students, faculty and UConn employees with the same sort of fast turnaround.

Hotaling said that he’s excited by the chance to give back to UConn.

“I walked those halls,” He said. “I love UConn, I loved my time there, and I’m so happy to be a part of this process.”

Black Hats, Cyber Bots, Zombies, And You

The UConn Comcast Center of Excellence for Security Innovation houses researchers working to combat malicious hackers (Istockphoto).

The UConn Comcast Center of Excellence for Security Innovation houses researchers working to combat malicious hackers (Istockphoto).

By Colin Poitras, UConn Communications
This story originally appeared in UConn Magazine.

Cyberattacks come in all shapes and sizes. Experts say it could be only a matter of time before they pose a real threat to our daily lives. The electronic devices in our world today are interconnected like never before. Our cars are no longer machines but rolling PCs with different components constantly talking to one another. Our watches are telephones. Our telephones are high-speed computers. And with all this increased convenience comes greater vulnerability. In the constant rush to get new products to market, security can be an afterthought.

chandyFortunately, a crack team of cybersecurity specialists, led by John Chandy, an electrical and computer engineering professor, and Laurent Michel, an associate professor of computer science and engineering, is working to protect our information. UConn’s Comcast Center of Excellence for Security Innovation is advancing research to strengthen the nation’s electronic information networks and training a new generation of hardware, software, and network security engineers to protect the integrity of everything from small consumer electronics to the complex computer systems running our major industrial, financial, and transportation systems.

Secured behind passcode-protected entry doors, the Comcast lab is embedded deep inside one of UConn’s main academic buildings. Getting there can be an adventure.

If you visit the lab via the building’s main door, you must go down a set of stairs, along a long hallway to the rear of the building, then it’s a quick left, quick right, another left, up a ramp, through some fire doors, past the locked doors of several large humming mechanical rooms, another right, another left, yet another right, and finally a quick left and you are there. Or you might be. It’s hard to be sure because there is absolutely no indication of where the lab is on any of the directional office signs. Even next to the lab’s main door there is only a small 9- by 6-inch plaque in letters slightly larger than what you are reading here.

FBI Alert Number I-031716-PSA: Motor Vehicles are Increasingly Vulnerable to Remote Exploits
“researchers could gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities”


Talk to Michel or Chandy for a few minutes and you begin to get a sense of what life is like in their world of electronic espionage. And if you leave feeling a little paranoid, well, that’s to be expected.

Michel will tell you that the world is filled with hackers and malicious machines

known as zombies, or computer bots, which hackers have seized via remote control and without their owners’ knowledge or permission. Those machines are constantly scouring the Internet trying to steal information from your, my, and everyone else’s computers. From the moment you open your laptop and connect to the Internet, your computer is likely getting assaulted by malicious attacks, Michel says. If your computer’s security is good and you keep current with all the latest security updates, chances are you’re successfully fending off most of them… for now. But hackers are a relentless and mischievous bunch. All it takes is one click on a bogus email, one click on an infected website, and the black hat hackers are in.

The good news is that amid the piles of green motherboards, electrical wiring, testing equipment, and computer consoles, Chandy, Michel, and a team of about a half-dozen very talented graduate and undergraduate students are playing the role of said hackers. Here, however, they are the good guys. Michel likes to describe the team as “ethical hackers,” white hats probing ever deeper into Comcast’s hardware and computing systems to expose potential vulnerabilities.

The battle between the white hats and the black hats is constant. Cybersecurity is an ever-shifting landscape as new technologies, system updates, viruses, worms, and attack strategies emerge on the Internet.

“John and I are constantly on the lookout for what’s happening,” says Michel. “What are the new vulnerabilities? What are the latest attacks? To do this properly, you have to be like a surfer. You have to be on top of the wave, not behind it. You have to keep moving and always stay a little bit ahead.”

If the lab is successful at breaking into a system, that’s a good thing. Exposing a vulnerability in the lab gives vendors the opportunity to correct a problem before a product goes to market or to fix a problem if the product is already in circulation.

If the research team fails to get into a system, well, that’s okay too. That means the system’s designers are on top of their game and did a great job protecting the system’s integrity and locking it tight.

Since it opened, Chandy says the lab has made significant discoveries that helped vendors and saved consumers considerable headache. But because of the often secretive nature of the lab’s work and its basis in security, the limelight of commercial success doesn’t always extend to the lab’s cubicles and workbenches.

When students find a potential vulnerability in a system, the lab immediately notifies the vendor or system provider so the weakness can be addressed. A lot of times, news of the discovery stops there. Chandy recounts a time when he and other lab members heard of a significant system vulnerability being discussed at a national cybersecurity conference. It sounded familiar. Chandy turned to his colleagues and whispered, “Didn’t we find that months ago?” Such is the nature of the business.

“The lab we have here is pretty unique for a university,” says Chandy. “A lot of times, the way we get into these systems is not necessarily through back doors. I would call them testing and debugging phases,” Chandy says. “One of the things a vendor wants to do when they release these systems is they want to test it. So they leave the interfaces open so we can do just that.”


FBI Alert Number I-091015-PSA: Internet of Things poses opportunities for cyber crime
“devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit”



Some of the latest technology on the market involves what Chandy calls the Internet of Things. People used to have a personal computer that did one job. A watch that did another. A telephone that had its uses and a TV or thermostat with separate functions. Now, with the Internet of Things, all of those devices are capable of interacting and talking to one another. You can turn up your home thermostat from work using your smart phone. You can check your email on your watch and pay your bills through your TV.

But with all that convenience and interconnectivity comes increased vulnerability. Keeping your information safe on all those different platforms is this team’s task.

“We’re mainly looking at things from a hardware level, those devices that are going out in the field and whether they are properly protected. We try to come up with scenarios that make sense from an attacker’s perspective,” says Chandy. “We take on the role of the hacker because if we can do it, that means a hacker can do it, too.”

As an academic lab, the Comcast Center is also a place of learning. The testing that is done here is not a matter of repetitive trial-and-error assaults, but a more deliberative, targeted, scientific process.

“Think of it like a game of Clue,” says Michel. “It’s not like we try something just to find out if it works or not. As we attempt an attack, we gather evidence along the way. That evidence may betray something about the platform, the device, the software that we are trying to test. Once we have that information, we regroup and discuss what we have learned and its implications, and then we try to develop more experiments and high-end scenarios so we can learn more. So it’s not like we have this dictionary of twenty different attacks and we try them all sequentially. It’s a much more principled approach.”

The students working in the lab operate in silence. A young woman types away intently on her keyboard. A bearded student in a New York Giants T-shirt sighs heavily, steps away from his computer for a brief break, then returns. Focused. Once again engrossed with the task before him at his work station. Two sage green walls in the rear of the lab are covered with black ink diagrams and hastily scrawled text.

An eviscerated teddy bear sits on a desktop.

“Stress relief, John?” a visitor asks, pointing to the multicolored wires ripped out of the bear’s abdomen.

“Side project,” Chandy answers with a sly grin. Then he explains that even a children’s toy as innocuous as a teddy bear can be a personal security threat. In this case, the interactive bear has a small computer inside that Chandy’s lab found lacked authentication protection. It could be hacked, potentially exposing the owner’s and other bear owners’ personal information with a few strokes of cyber sleight-of-hand.

“The students here are developing skills that none of them had a year ago,” says Chandy. “The skills they are developing would make them great hackers. But it is also making them great engineers.”


Lisa wasn’t looking forward to the confrontation. Her aging mother, bedridden with different ailments and dependent on care, was really angry this time. For months she had suspected Sarah, her live-in nurse, was stealing her money. And now, the latest bank statement confirmed it. On top of it all, Sarah always seemed to be on her iPad when her mother needed her. The chest pains were back. The small automatic defibrillator under her mother’s skin activated twice in the past two months. The stress wasn’t good.

Lisa enters the house. She eyes Sarah, who is standing, her back to her, at the kitchen counter – again, on her computer. Lisa walks into her mother’s room, careful to speak softly so their conversation won’t be overheard. Within a few minutes, Lisa notices her mother’s color start to change. She seems to have trouble breathing. Sweat builds on her upper lip. She tells Lisa she feels strange, like her heart is racing out of control. The device in her chest keeps vibrating, sending sharp shocks into her heart muscles. The shocks are getting stronger. Her mother cries out in pain. Lisa calls frantically for Sarah. No response. Her mother goes limp.

Back in the kitchen, Sarah quietly shuts down her iPad and walks toward the bedroom.



More than 20 faculty members and more than 100 graduate students in the schools of Engineering and Business are conducting research through the Connecticut Cybersecurity Center at UConn. They are examining cryptography and cryptanalysis; data security and privacy; information fusion and data mining for Homeland Security; and trustable computing systems.

The academic research building that houses the Comcast Center of Excellence for Security Innovation houses two other major cyber- security labs. The Center for Hardware Assurance, Security, and Engineering (CHASE) contains some of the most advanced equipment available to conduct security analysis on nanoelectronics. Its research focuses on counterfeit device detection and preserving the integrity of silicon microchips, the very cornerstones of the worldwide computer industry. The building also is home to the Center for Voting Technology Research (VoTeR Center), which investigates new technologies to ensure the integrity of the electronic voting process.


Questions And Answers with UConn Alum Dipayan Ghosh

Dipayan GhoshDipayan Ghosh is a UConn alum who currently works in privacy and public policy for Facebook. He’ll be a part of our Engineering Centennial Lecture Series, speaking on April 11 in Laurel Hall, room 101.

He was previously a technology and economic policy advisor at the White House and was recently named to Forbes “30 under 30” list, which celebrates influential individuals in a variety of fields who are under 30 years old. UConn Engineering asked him a few questions, as a prelude to his talk.

How did your time at UConn help to prepare you for the interesting directions your career has taken?

My career has been grounded in my technology background, which I have attempted to apply in the business and policy world. I made my first steps at UConn as an undergraduate in electrical and computer engineering. During my time in Storrs, three aspects of my education really inspired and motivated me. The first was the quality of the academic community in the electronic and computer engineering (ECE) department. I had a chance to work with Professor Peter Luh, a chair of the department and former department head, who gave me the incredible opportunity to work at his lab as an undergraduate researcher. That exposed me to difficult research problems in mathematics and optimization, and gave me access to a brilliant group of lab mates. Second, the quality of the education. I found myself working quite a lot as an undergrad – and that was not only because the subject material itself was difficult, but also because our professors really challenged us to think outside the box. I recall a couple classes in particular that had my ECE class stumped more often than not. I was part of the honors and University Scholars programs through the undergraduate center, as well, which kept me busy with technical research alongside regular coursework. And third, the quality of my classmates and peers at the school; the ECE pool was a close-knit group of very talented students that worked as a team. That type of support network really helps you as an undergraduate.

You’ve had a very interesting career path so far, going from the White House to Facebook. What has led you down this path? Discuss the different work environments, and the process of adapting to the change between the two.

I have been very fortunate to have had these experiences, and am thankful for the start I got in college to get here. Having the opportunity to work at both the White House and Facebook has been incredibly valuable – it has given me a close view into the ways that both organizations make key decisions.  The end goal of each is to create value for people – and both are incredibly effective at doing just that. But they do so in very different ways; whereas the White House works through a bureaucracy across the federal agencies to develop policy recommendations or make decisions, Facebook operates on a somewhat different timeline and structure. Both systems are highly influential and impact millions or billions of people with every action they take – but the two systems actually teach you very different things about decision-making and management.  That’s been the most interesting dynamic for me, and while it takes time to adjust to any new experience I have really enjoyed my experience at Facebook.

Your research interests during grad school focused on the practical limitations of technological privacy due to competing stakeholders. Where did your interest in this topic come from? What about that intersection fascinates you?

Privacy is one of the most critical issues to consider in the context of modern commerce over the Internet – perhaps the most critical. The Internet ecosystem and much of global commerce are driven by data and, to a large extent, personal information. Companies and government organizations that collect such sensitive personal information have to take care to give individuals the appropriate access to and control over their data. Otherwise, they both run the risk of losing public trust, and the Internet ecosystem can be eroded. This understanding has driven me to this field. Without consumer privacy, the Internet as we know it would not exist at all. I first started examining privacy in detail at Cornell, under the supervision of Professor Stephen Wicker. Previously, I had primarily studied fields in mathematics, including optimization and nonlinear programming. As I became more interested in the field of information theory, I saw the fundamental relevance of privacy and computer security. I found that both government and industry have to take steps to make sure they transmit, use, and store sensitive data in ways that respect consumer privacy. Some of that falls into cybersecurity, and making sure that organizations uphold an adequate level of data protection. But part of that also comes down to the choices those organizations make about consumer data. When the Snowden disclosures occurred some years later, the public eye really turned toward these issues in a big way.

Describe your current role at Facebook and what you hope to accomplish as a privacy and public policy advisor.

Facebook works diligently to protect its users’ privacy, and the company’s development of public policy on privacy issues reflects the steps it takes internally to assure protection. This work starts with making the right choices for internal data policies – that is, with respect to the kinds of data we might collect and how we might secure it on our systems to ensure that malicious hackers do not gain illegal access to it.  But it also means that we need to actively survey the public’s current sentiment around privacy and security issues, and try to address these sentiments on our site. That, for a large part, is my job – to understand public sentiment and, working with our team in California, support the development of the policies and standards that we uphold on our site. That policy development process manifests itself in a number of ways – including in how we assure privacy and security for users on the platform, or how we might deal with uploaded content that doesn’t meet the standards of our public statement of rights.

How does a company or government agency balance privacy and the need for rich data?

I think both kinds of organizations – the federal government and tech companies – think hard about collecting personal data before they do it. The reason for that is simple: at the end of the day, the U.S. government and publicly traded companies are responsible to their individual constituents – whether the American people, or individual users of Facebook. That brings a very real element to balancing privacy. Companies and governments always have to take care to secure and protect data, and live by certain principles in their use of that data – principles that are known to and agreed upon by the persons to which that data pertains.

What are reasonable expectations of privacy now? How proactive does an individual need to be to ensure their own privacy (this is in relation to your research interests, not just in relation to your new role at Facebook)?

In my view, people play an important role in ensuring their privacy. Every day, we make choices about the digital presence we create for ourselves. Those choices define our online activity, but also inherently our digital privacy and security. For instance, some people might decide against using online banking or payment applications because they do not wish to share their financial information. Ultimately, I find that organizations collect data to make the world more interconnected and deliver richer content and greater value to us. That’s the fundamental nature of the Internet ecosystem, and it goes beyond only the federal government or technology companies, and extends to health care, finance, and educations – all of these are areas in which organizations are increasingly accessing sensitive data. What is most critical is that they give consumers the appropriate choice and control over how their data is used.


International Conference on Complex Systems Engineering (ICCSE 2015) Held in UConn

The University of Connecticut (UCONN) organized a two-day international conference on complex systems engineering (ICCSE 2015) on November 9-10, 2015 at the UConn’s main campus in Storrs, CT. The conference organization committee was led by Dr. Krishna Pattipati as the general chair and Dr. Shalabh Gupta as the program chair. The conference was focused on latest developments in analysis and modeling of complex systems that are built from, and depend upon, the synergy of computational and physical components, the so-called cyber physical systems. The conference featured talks by plenary speakers from industry and academia, panel discussions, technical paper sessions, student poster sessions and industry exhibits. The conference was a 2nd year initiative by the recently established UTC Institute for Advanced Systems Engineering (UTC-IASE). The conference was financially co-sponsored by UTC and Aptima and technically sponsored by IEEE-Systems Man and Cybernetics Society. The conference served one of the institute’s goals of making it a hub for world-class research, project-based learning by globally-distributed teams of researchers, and industrial outreach activities.UTCmeeting3_1

There were four plenary speakers, viz., Dr. Michael McQuade (Senior Vice President of Science and Technology at UTC), Dr. Edward Lee (Robert S. Pepper Distinguished Professor in the Electrical Engineering and Computer Sciences (EECS) department at U.C. Berkeley), Dr. George Pappas (Joseph Moore Professor in the Department of Electrical and Systems Engineering at the University of Pennsylvania), and Dr. Chris Paredis (Program Director for the Engineering and Systems Design (ESD) and Systems Science (SYS) programs at the National Science Foundation). Dr. Michael McQuade outlined the mega-trends that are impacting systems engineering and highlighted technology and talent needs of the industry and more specifically of UTC. Dr. Edward Lee provided an overview of the need for models with time and concurrency requirements, model-based design and analysis, domain-specific languages, architectures for real-time computing, schedulability analysis, and modeling and programming of distributed real-time systems. Dr. George Pappas gave a talk on formal synthesis and analysis for supervisory control of hierarchical hybrid systems using linear temporal logic. Dr. Chris Paredis spoke about the theoretical foundations for Systems Engineering, the role of modeling in Systems Engineering  and gave the audience a glimpse of opportunities for research in Systems Engineering and model based systems engineering (MBSE) being sponsored by NSF.

In addition to the plenary speakers, many representatives from industry and academia presented their latest research along three tracks of embedded systems, complex networked systems: control and inference, and model based systems engineering and applications. There was an education panel where educators from UConn, Stevens Institute of Technology, and Worcester Polytechnic Institute and UTC exchanged lessons learned and discussed the standardization of Systems Engineering education. The conference was truly international with representation from Asia, Europe and North America. More than 80 people participated in the conference which led to a healthy exchange of ideas. Planning for next year’s conference on the Avery Point campus of the University of Connecticut is already underway.


Bahram Javidi Wins Prestigious EPS Prize

Bahram Javidi, Board of Trustees Distinguished Professor in Electrical and Computer Engineering, has been awarded the prestigious European Physical Society for Applied Aspects of Quantum Electronics and Optics.


These prizes, awarded only once every two years, recognize the highest level of achievements in fundamental and applied research in optical physics. Prof. Javidi’s prize was awarded specifically for his “pioneering contributions to information optics, including 3D imaging, 3D displays, and 3D imaging of photon starved scenes.”

Prof. Javidi’s interests are in a broad range of transformative imaging approaches that use optics and photonics, and he has made seminal contributions to passive and active multi-dimensional imaging from nano- to micro- and macroscales. His recent research activities include 3D visualization and recognition of objects in photon-starved environments using passive imaging; automated disease identification using biophotonics with low cost compact sensors to be used in developing countries; information security, encryption, and authentication using quantum imaging; non-planar flexible 3D image sensing, and bio-inspired imaging.

Prof. Javidi recently received international attention for his work with QR codes and their potential to increase the security of computer microchips.
Prof. Javidi has been recognized for his outstanding achievements in many other ways. He has been named Fellow of eight societies, including IEEE, OSA, SPIE, EOS, and IoP. Early in his career, the National Science Foundation named him a Presidential Young Investigator. Prof. Javidi has received the SPIE Dennis Gabor Award in Diffractive Wave Technologies (2005) and the SPIE Technology Achievement Award (2008). In 2008, he was awarded the IEEE Donald G. Fink Paper Prize (2008), and the John Simon Guggenheim Foundation Fellow Award. In 2007, the Alexander von Humboldt Foundation (Germany) awarded Prof. Javidi the Humboldt Prize

IEEE Honors UConn Alum Marshall Greenspan

Marshall Greenspan, who received his Ph.D. in electrical engineering from the University of Connecticut in 1969, has been awarded by the Institute of Electrical and Electronics Engineers (I.E.E.E.) the Dennis J. Picard Medal for Radar Technologies and Applications.

Officials from I.E.E.E., the largest technical society in the world, honored Greenspan for his “contributions to the development of multiple phase-center airborne surface surveillance and targeting radars.”


Greenspan, an IEEE Fellow, received the award at the IEEE Honors Ceremony Gala June 20th at the Waldorf Astoria Hotel in New York.

Recently retired from Northrop Grumman Corporation, where he worked as a senior consulting systems engineer, Greenspan began his 50-year career developing modes for the radars on the Navy’s A6-E aircraft. Originally designed for navigation, targeting and terrain avoidance, the A-6E radar was upgraded under Dr. Greenspan’s guidance to become the Radar Guided Weapon System (RGWS). The RGWS was a groundbreaking system that generated high resolution images of the beam area and pinpointed the location of moving targets. The Defense Advanced Research Projects Agency (DARPA) adopted the RGWS technology into the Pave Mover program, which put side-looking radar into the EF-111 aircraft to detect and track armored surface vehicles at long range, while simultaneously guiding precision munitions to a target.

This technology became part of the U.S. Air Force/Army E-8 Joint Surveillance Target Attack Radar System (JSTARS), which provides ground surveillance to military commanders to support attack operations. With Dr. Greenspan’s expertise, JSTARS enabled US forces to map the position of the retreating Iraqi army during Operation Desert Storm. This work helped demonstrate the feasibility of GMTI space-time adaptive processing (STAP) for air-to-surface moving target radars at a time when computing technology was inferior to what is currently available. STAP’s importance to the radar community continues to grow as computing technology and radar hardware improve.

Besides getting his Ph.D. at UConn (he received his bachelor’s and master’s at MIT), Greenspan said UConn played a role in his role his IEEE award in another way: UConn’s Prof. Peter Willett was the one who nominated him as an IEEE Fellow.

QR Codes Engineered Into Cybersecurity Protection

QR, or Quick Response, codes – those commonly black and white boxes that people scan with a smartphone to learn more about something – have been used to convey information about everything from cereals to cars and new homes.

But, University of Connecticut (UConn) researchers think the codes have a greater potential: protecting national security.

Using advanced 3-D optical imaging and extremely low light photon counting encryption, Board of Trustees Distinguished Professor Bahram Javidi and his research team have taken the ordinary QR code and transformed it into a high-end cybersecurity application that can be used to protect the integrity of computer microchips. The findings were published in IEEE Photonics Journal.


“An optical code or QR code can be manufactured in such a way that it is very difficult to duplicate,” said Javidi, whose team is part of UConn’s Center for Hardware Assurance, Security, and Engineering (CHASE) in the School of Engineering. “But if you have the right keys, not only can you authenticate the chip, but you can also learn detailed information about the chip and what its specifications are.

“And, that is important to the person using it.”

Corrupted and recycled integrated circuits or microchips posed a significant threat to the international electronics supply chain. Bogus or used computer chips may not matter much when they cause poor cell phone reception or an occasional laptop computer crash in personal use. But the problem becomes exponentially more serious when counterfeit or hacked chips turn up in the U.S. military.

The problem has been exacerbated in recent years by the fact that much of the national production of microcircuits has moved offshore, where prices are lower but ensuring quality control is more difficult.

In 2012, a Senate Armed Services Committee report found that more than 100 cases of suspected counterfeit electronics parts from China had made their way into the Department of Defense supply chain. In one notable example, officials said counterfeit circuits were used in a high-altitude missile meant to destroy incoming missiles. Fixing the problem cost the government $2.675 million, the report said.

Unlike commercial QR codes, Javidi’s little black and white boxes can be scaled as small as microns or a few millimeters and would replace the electronic part number that is currently stamped on most microchips.

Javidi says he can compress vital information about a chip – its functionality, capacity, and part number – directly into the QR code so it can be obtained by the reader without accessing the Internet. This is important in cybersecurity circles, because linking to the Internet greatly increases vulnerability to hacking or corruption. Javidi’s work with QR codes was supported in part by the National Science Foundation.

To further protect the information in the QR code, Javidi applies an optical imaging “mask” that scrambles the QR code design into a random mass of black-and-white pixels that look similar to the snowy images one might see on a broken TV. He then adds yet another layer of security through a random phase photon-based encryption that turns the snowy image into a darkened nighttime sky with just a few random stars or dots of pixilated light.

The end result is a self-contained, highly secure, information-laden microscopic design that is nearly impossible to duplicate. Only individuals who have the special corresponding codes could decrypt the QR image.

And that is important to all of us.


Prof. Park wins an NSF CAREER Award

Four Engineering faculty members have won CAREER awards, each receiving $500,000 from the National Science Foundation (NSF). One of them is Prof. Sung Yeul Park, from our department.


According to the NSF, CAREER awards are the “most prestigious awards in support of junior faculty who exemplify the role of teacher-scholars through outstanding research, excellent education and the integration of education and research within the context of the mission of their organizations. Such activities should build a firm foundation for a lifetime of leadership in integrating education and research.”

“This award will shape significantly the research direction of our group and lays the foundation for fruitful collaborations across various disciplines, including mechanics, chemistry, polymer-science and liberal arts,” said Dr. Kay Wille, one of the recipients. “It feels like a dream came true, and I am so grateful to the National Science Foundation for their financial support and their trust in our research.”


–  Sung Yeul Park, Assistant Professor, Electrical and Computer Engineering: “Enabling Higher-Performance Battery Charging Systems: Adaptive and Optimal Charging Algorithms Based on Dynamic Battery Characteristics”

This project aims to provide a new, innovative battery charging systems for greater efficiency and longer life in electric vehicles, renewable energy storage, and back-up power applications. The research promises a better understanding of the complex behavior occurring within high-power batteries, which will lead to significantly improving the performance and affordability of such systems.

Results of this research will not only improve the capabilities of today’s state-of-the-art energy storage technologies, but also will be applicable to all battery chemistries because of similarities in other electrochemical devices. The research will benefit energy storage system designers, regardless of their choice of materials and design. This also has the secondary benefit of improving the efficiency and lifespan of integrated renewable energy sources featuring electrochemical storage as a constituent component.


Prof. Tehranipoor elected to CASE

Three UConn engineering faculty members – Drs. Alexander Shvartsman, Mark Tehranipoor and Ki Chon – will be inducted into the Connecticut Academy of Science and Engineering (CASE). They are among the 23 members who will be inducted at a ceremony May 19 at the Crowne Plaza Hotel in Cromwell (invitations & RSVP forms will be e-mailed to members in early March). This year’s keynote address will be a Conversation with Dr. Edison T. Liu, President & CEO, The Jackson Laboratory. The ceremony will be hosted by Documentary Producer Christina DeFranco.



Dr. Mark Tehranipoor,  Founding Director for both the Center for Hardware Assurance, Security, and Engineering (CHASE) and the Comcast Center of Excellence in Security Innovation (CSI) at UConn. 

Dr. Tehranipoor’s research has been supported by federal and industrial grants, gifts, and donations worth approximately $20 million. His groundbreaking scholarly contributions to the field have resulted in six books, 10 book chapters, 54 journal articles, and 180 conference papers.

In 2012, he established the Center for Hardware Assurance, Security, and Engineering (CHASE) to provide the University with the physical and intellectual environment necessary for interdisciplinary hardware-oriented research and to meet future challenges  in the field of assurance and security. CHASE is a research consortium with



Experts Talk Cybersecurity At CSI Panel Discussion

Given the fact that the most common password for computer users is “password,” and the second most common is “12345,” cybersecurity is an issue for everyone – not just corporations that handle personal information.

That was the message recently conveyed by a panel of cybersecurity experts hosted by the Center of Excellence for Security Innovation (CSI), a collaboration between UConn School of Engineering and Comcast.


Donna Dodson, chief cybersecurity advisor for the National Institute of Standards and Technology (NIST), told the audience at the Wilbur Cross Building that getting companies and individuals to think about cybersecurity is the first step toward a more secure network.

“I may not understand the mechanics of my car, but I know it’s my responsibility to keep it safe,” said Dodson, the featured speaker at the event.


Toward that end, the NIST wrote a guidebook for the public, titled “Framework for Improving Critical Infrastructure Cybersecurity.” “It’s helpful because it provides a common language for people,” she said. “And it promotes concepts of resiliency and protecting your environment.”

UConn’s Mark Tehranipoor, Director of CSI, and the Center for Hardware Assurance, Security, and Engineering (CHASE), said education about cybersecurity should begin early. “We really have to take it down to the undergraduate level and even bring it down to high school level.”

Everyone is needed in the effort to prevent cyberattacks, according to Liam Randall, of Critical Stack, an Ohio-based company that specializes in network security. For every person working on preventing attacks, he said, someone else is working on new ways to  carry out such attacks.

“When you look at the impact that one person can have, that really keeps me up at night,” he said.

Steve Mace, Associate Vice President for Systems Technology in the Science & Technology Department of the National Cable & Telecommunications Association (NCTA), said the sophistication of cyber-attacks is now “very high,” so raising the level of counterattacks is all the more crucial.

Panel moderator Dr. Laurent Michel, Associate Professor, UConn Dept. of Computer Science & Engineering and Associate Director of CSI, suggested that today’s cyber-attacks are a combination of ingeniously executed ones and cruder efforts that succeed because of poor security.

As recent attacks against Anthem, Target and Home Depot indicate, the size of a company is no guarantee of security.

“We’ve seen some smaller companies that are well-versed in controlling their networks, and we’ve seen the opposite with large companies,” said Matthew Scholl, Chief of the Computer Security Division, ITL at NIST. “There’s no correlation between size and cybersecurity.”