Papers by Muhtasim Chowdhury
Securing On-Chip Learning: Navigating Vulnerabilities and Potential Safeguards in Spiking Neural Network Architectures

arXiv (Cornell University), May 20, 2024
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) a... more Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process. The proposed framework accepts hardware design netlists and key sizes as inputs, and autonomously generates obfuscated code tailored to enhance security. To evaluate the effectiveness of our approach, we employ the Trust-Hub Obfuscation Benchmark for comparative analysis. We employed SAT attacks to assess the security of the design, along with functional verification procedures to ensure that the obfuscated design remains consistent with the original. Our results demonstrate the efficacy and efficiency of the proposed framework in fortifying hardware IP against potential threats, thus providing a valuable contribution to the field of hardware security.
Sensitivity Analysis of SOT-MTJs to Manufacturing Process Variation: A Hardware Security Perspective
Optimized and Automated Secure IC Design Flow: A Defense-in-Depth Approach
IEEE transactions on circuits and systems. I, Regular papers, 2024
A 60 GHz and 2.08 mW Active Quasi-Circulator in 22 nm FDSOI Technology

arXiv (Cornell University), Dec 19, 2023
The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecu... more The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is still challenging without the application of suitable technological methodologies. Previous efforts have mostly concentrated on software vulnerabilities; however, a holistic strategy incorporates approaches for mitigating vulnerabilities, score prediction, and a knowledge-generating system that may extract relevant insights from the Common Weakness Enumeration (CWE) and Common Vulnerability Exchange (CVE) databases is notably absent. As the number of hardware attacks on Internet of Things (IoT) devices continues to rapidly increase, we present the Hardware Vulnerability to Weakness Mapping (HW-V2W-Map) Framework, which is a Machine Learning (ML) framework focusing on hardware vulnerabilities and IoT security. The architecture that we have proposed incorporates an Ontology-driven Storytelling framework, which automates the process of updating the ontology in order to recognize patterns and evolution of vulnerabilities over time and provides approaches for mitigating the vulnerabilities. The repercussions of vulnerabilities can be mitigated as a result of this, and conversely, future exposures can be predicted and prevented. Furthermore, our proposed framework utilized Generative Pre-trained Transformer (GPT) Large Language Models (LLMs) to provide mitigation suggestions.

Near-field Communication enabled Voice and Touch integrated Home Automation for Elderly and Disabled
2020 IEEE Region 10 Symposium (TENSYMP), 2020
Home Automation is such sector which is being developed to ensure safety and comfort for the peop... more Home Automation is such sector which is being developed to ensure safety and comfort for the people. We wanted to integrate the same technology for the elderly and disabled and in doing so we sought to make an energy efficient, affordable and a reliable system. The voice and touch assisted home automation system uses an Arduino Mega 2560 as the processor. The system builds upon the utilization of an existing smartphone technology where a smartphone application is used, which allows the users to control up to 44 devices in addition of multiple smoke detectors and PIR motion sensors, using Bluetooth technology. Unlike other systems, for the ease of use, the entire system can be launched and controlled via NFC tags. The cost has been kept under USD 30, for the entire construction, thus enabling its use for the masses, with potential to modernize each and every old home. Since the system requires low power to operate, automating homes shall also reduce power usage.
A structured Krylov subspace approach based model reduction of periodic control system in lifted form
2021 6th International Conference on Inventive Computation Technologies (ICICT)
In this paper, a reduced order model technique based on Krylov subspace for linear discrete-time ... more In this paper, a reduced order model technique based on Krylov subspace for linear discrete-time periodic (LDTP) control system has been proposed. The proposed iterative algorithm conserves the exact structure of the original solution of LDTP Lyapunov functions while approximating them using Krylov iterations. This paper also exhibits how this proposed structure preserving algorithm generates a reduced order LDTP model. For confirming the efficiency and accuracy of this proposed algorithm numerical results are presented herewith this paper.

Near-field Communication enabled Voice and Touch integrated Home Automation for Elderly and Disabled
2020 IEEE Region 10 Symposium (TENSYMP), 2020
Home Automation is such sector which is being developed to ensure safety and comfort for the peop... more Home Automation is such sector which is being developed to ensure safety and comfort for the people. We wanted to integrate the same technology for the elderly and disabled and in doing so we sought to make an energy efficient, affordable and a reliable system. The voice and touch assisted home automation system uses an Arduino Mega 2560 as the processor. The system builds upon the utilization of an existing smartphone technology where a smartphone application is used, which allows the users to control up to 44 devices in addition of multiple smoke detectors and PIR motion sensors, using Bluetooth technology. Unlike other systems, for the ease of use, the entire system can be launched and controlled via NFC tags. The cost has been kept under USD 30, for the entire construction, thus enabling its use for the masses, with potential to modernize each and every old home. Since the system requires low power to operate, automating homes shall also reduce power usage.

ExoArm: Patient Rehabilitation, Mobility and Heavy-lifting using COTS Components
2020 11th IEEE Control and System Graduate Research Colloquium (ICSGRC), 2020
This paper proposes an independent and automated mechanical exoskeleton arm for the rehabilitatio... more This paper proposes an independent and automated mechanical exoskeleton arm for the rehabilitation of physically disabled individuals. Additionally, it aims to provide a performance enhancing solution for the physically disabled people to aid in their daily chores, particularly in lifting heavy objects for a longer period of time. The proposed system uses Commercial Off The Shelf (COTS) components such as: Arduino, Myo-ware Muscle Sensor and Linear Actuator. The aim of this paper is to present the design and fabrication of a light weight, controllable, reliable, wearable and low-cost exoskeleton for the human arm. This device has two modes of operation, the rehabilitation purpose and weightlifting for disabled individuals. The paper is particularly designed in line to the context of Bangladesh, affordability is a priority alongside reliability, to increase availability for the masses.

Performance Comparison of Full Adder Cells in 45nm Technology Node
2021 International Conference on Computer Communication and Informatics (ICCCI), 2021
Full Adder (FA) being an integral part of Arithmetic Logic Unit (ALU) of modern integrated circui... more Full Adder (FA) being an integral part of Arithmetic Logic Unit (ALU) of modern integrated circuits (IC) has gained massive research interest by academicians and industrial IC designers. Therefore, a large number of FA cell designs have been innovated, each of them having their respective pros and cons. As a result, it becomes quite necessary to examine the FA cells under a common environment in order to compare their performance parameters which will facilitate IC designers to choose the right FA topology required by the nature of ALU. This paper presents a comparison among 23 different FA cells. Performance comparison of the FAs has been conducted using Cadence design toolkits. The technology node used for the performance analysis and comparison is 45nm.
Smart parking systems: comprehensive review based on various aspects
Heliyon, 2021
Parking allocation has become a major problem in modern cities for which numerous smart parking s... more Parking allocation has become a major problem in modern cities for which numerous smart parking systems (SPS) have been developed. This paper aims to provide comprehensive study, comparison and extensive analysis of SPSs in terms of technological approach, sensors utilized, networking technologies, user interface, computational approaches, and service provided. Moreover, the paper fills up the research gap by providing a clear insight into the suitability of SPSs in various environmental conditions and highlights their advantages/disadvantages. The extensive comparison among multiple aspects of SPSs would enable researchers, designers, and policymakers to identify the best suited SPS and understand the current trends in this sector.
Results in Control and Optimization, 2021
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

Smart Transformer Theft Protection and Maintenance Monitoring System
2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), 2021
The countries of South East Asia are going through a rapid growth in the economy over the last de... more The countries of South East Asia are going through a rapid growth in the economy over the last decade. Much of this economic development is fueled by the development of their power generation. Unfortunately, transformer theft is a common scenario in these countries, which is a key impediment in the way of advancement in the power sector. Therefore, to solve this problem, a GSM based transformer theft protection and monitoring system has been developed in order to protect the distribution transformers from thieves. In addition, the system can also monitor the health parameters of a transformer. The system developed in this paper utilizes several sensors such as a magnetic sensor, IR sensors and weight sensors in order to detect nearby person who wants to steal or vandalize the transformer by notifying the incident to the authority via SMS service of the GSM technology. Moreover, the authority can also monitor transformer health parameters such as transformer temperature and oil level.
Uploads
Papers by Muhtasim Chowdhury