Loading [MathJax]/extensions/MathZoom.js
Nima Karimian - IEEE Xplore Author Profile

Showing 1-25 of 36 results

Results

Large Language Models (LLMs) like ChatGPT have become the most popular regenerative AI applications, used for obtaining responses for queries in different domains. The responses of ChatGPT are already becoming mainstream and are challenging conventional methods of learning. This article focuses on the application of ChatGPT for academic instructional purposes in the field of computer engineering a...Show More
This paper presents a novel approach to noninvasive hyperglycemia monitoring utilizing electrocardiograms (ECG) from an extensive database comprising 1119 subjects. Previous research on hyperglycemia or glucose detection using ECG has been constrained by challenges related to generalization and scalability, primarily due to using all subjects’ ECG in training without considering unseen subjects—a ...Show More
Imagine a world where a copy of your face could trick the most advanced security systems. This isn’t science fiction; it’s a real challenge today. LivDet-Face is a competition that aims to advance the detection of attacks at the biometric sensor, known as Presentation Attack Detection (PAD). This international contest is a key benchmark in biometric security, offering an unbiased look at the lates...Show More
Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable to presentation attacks, such as photo-paper, paper printout, and various display attacks, making it more challenging to implement in biometric systems compared to contact-based modalities. Limited research has been conducted on presentation...Show More
An increasing array of intelligent computing devices operate within vulnerable environments where they are susceptible to capture or physical assault. The data and intellectual property (IP) stored within these devices are often compassionate. This paper explores the potential advantages and challenges of integrating biometrics into electronic devices. By combining cutting-edge biometrics, such as...Show More
In the era of Artificial Intelligence, Deepfake technology has become one of the major threats to privacy, creativity, and authenticity. Deepfakes initially gained attention in the context of manipulated adult content. However, they have extended their influence across various domains, involving the manipulation of texts, audios, videos, images, political and creative contents. With growing concer...Show More
In today’s world, embedded systems and microcontroller-based modules have become increasingly integrated into our daily lives. However, the security of these embedded devices and the assurance of hardware authenticity have raised concerns within the expanding realm of the Internet of Things (IoT). In this study, we established an experimental environment to observe the disturbance of SLC flash mem...Show More
With the increasing integration of smartphones into our daily lives, fingerphotos are becoming a potential contactless authentication method. While it offers convenience, it is also more vulnerable to spoofing using various presentation attack instruments (PAI). The contactless fingerprint is an emerging biometric authentication but has not yet been heavily investigated for anti-spoofing. While ex...Show More
Machine learning-based side-channel attacks (MLSCAs) have demonstrated the capability to extract secret keys from AES by learning the correlation between leakages from power traces or timing of AES execution. Previous work has focused on unmasked AES, the captured power traces for profiling and testing have been collected from the same device, and they are primarily implemented on microcontrollers...Show More
Implantable medical devices, such as pacemakers, cardiac defibrillators, and insulin pumps, play a crucial role in monitoring patients’ vital signs within healthcare systems. However, these networked devices are susceptible to external attacks and breaches of trust, hindering the potential innovation and social benefits of eHealth services. To address these concerns, we propose a novel ECG-based k...Show More
Implantable medical devices (IMD) such as pace-makers, and cardiac defibrillators are becoming increasingly interconnected to networks for remote patient monitoring. However, networked devices are vulnerable to external attacks that could allow adversaries to gain unauthorized access to devices/data and break patient privacy. To design a lightweight computational trustworthy of IMD, we propose nov...Show More
In the recent era, adoption of IoT technology can be seen in nearly every other field. However, with its fast growth rate, the IoT brings several advanced security challenges. To alleviate these problems, we propose an inventive framework that could be introduced into the IoT package to gather side-channel information (execution timing) for inconsistency and attack location. We observed that when ...Show More
As the Covid-19 pandemic becomes a nationwide problem, physical contact is no longer acceptable. Therefore, biometric technology can be used for practicing social distancing to prevent the spread of the virus. However, face and fingerprint are vulnerable to presentation attacks. Hence alternative modalities such as ECG based biometric become popular. In this paper, we develop a novel presentation ...Show More
In this paper, we propose a novel method, "Lift and Shift" (LISH), where it can generate a unique true random number based on the patient's unique ECG noise signal. The advantage of the proposed LISH method is that the ECG signal noise is nearly impossible to replicate or measure without the user's consent, and it is a readily available signal in most modern health sensors. To validate LISH, multi...Show More
We propose a novel multi-scale continuous wavelet transform feature method to accurately obtain micro-texture and multi-scale ECG characteristics and demonstrate how it could benefit from the state-of-the-art deep convolutional neural network techniques. In other words, we performed transfer learning with popular CNN architectures such as InceptionV3, VGG16, VGG19, Inception ResNetV2, MobileNetV2,...Show More
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. Although deep learning is being widely adopted for computer vision, less research has been prominent in template-based profiling power SCA attacks. In addition, most of the existing works fall into a one-dimensional (1-D) CNN technique rather ...Show More
GPUs have been increasingly adopted as hardware accelerators for neural networks (NN). Prior studies show that the unique execution model and many DC-DC units on GPUs make it uneasy to reverse engineer detailed information of encryption algorithms through power side-channel attacks. However, we observe that a few core parameters of NN can be acquired through power profiling when victim and attacke...Show More
Authentication is the act of proving that an integrated circuit (IC) is not counterfeit. One application of a physical unclonable function (PUF) circuit is to authenticate the identity of the chip using raw bits of the memory. However, several previous works present machine learning-based modeling attacks on PUFs. To alleviate this issue, we propose a novel authentication scheme involving unique D...Show More
Electrocardiogram (ECG) biometric authentication (EBA) is a promising approach for human identification, particularly in consumer devices, due to the individualized, ubiquitous, and easily identifiable nature of ECG signals. Thus, computing architectures for EBA must be accurate, fast, energy efficient, and secure. In this article, first, we implement an EBA algorithm to achieve 100% accuracy in u...Show More
Robust authentication and identification methods become an indispensable urgent task to protect the integrity of the devices and the sensitive data. Passwords have provided access control and authentication, but have shown their inherent vulnerabilities. The speed and convenience factor are what makes biometrics the ideal authentication solution as they could have a low probability of circumventio...Show More
The increased need for access control has motivated a widespread deployment of biometric systems in the last few years. However, recent works indicate that some modalities are fragile and more susceptible to malicious presentation attacks. This has in turn led to the exploration of alternative modalities such as electrocardiogram (ECG) due to its individualized and ubiquitous nature, difficulty in...Show More
With the emergence of the Internet-of-Things, there is a growing need for access control and data protection on low-power, pervasive devices. Key-based biometric cryptosystems are promising for IoT due to its convenient nature and lower susceptibility to attacks. However, the costs associated with biometric processing and template protection are nontrivial for smart cards, and so forth. In this pa...Show More
Nowadays, the consumer electronic (CE) market has grown to include smart devices for the Internet of Things. With increased adoption of these smart IoT devices, there is a high demand for safe and secure authentication for the purpose of maintaining effective access control. This paper addresses the concerns of authenticating consumer electronic devices using low-cost methods for implementation wi...Show More
True random number generators (TRNGs) are central to many computing applications, particularly in security domains such as cryptography. In this paper, we consider the design and implementation of a low-cost and lightweight TRNG. In the interest of being thorough, we examined six different power supplies in order to verify the noncyclostationary behavior of the voltage sources. Our novel TRNG mode...Show More
Electrocardiogram (ECG) has long been regarded as a biometric modality which is impractical to copy, clone, or spoof. However, it was recently shown that an ECG signal can be replayed from arbitrary waveform generators, computer sound cards, or off-the-shelf audio players. In this paper, we develop a novel presentation attack where a short template of the victim's ECG is captured by an attacker an...Show More