Ramesh   Karri

Ramesh Karri

Professor, Electrical and Computer Engineering

Student Advising and Teaching

Ph.D. Students Advised
 

  1. Aurobindo Dasgupta, Computer-Aided Design-for-Reliability of Deep Sub-Micron Integrated Circuits, Ph.D. 1996. University of Massachusetts, Amherst; First position: IBM
  2. Kyosun Kim, Automatic Synthesis of Application Specific Programmable Processors, University of Massachusetts, Amherst, 1998, First position, Samsung, Korea; Associate Professor of EE, Incheon Universiy, Incheon, Korea
  3. Piyush Mishra, Towards Secure Embedded Systems Design, 2004; First position: Assistant Professor of ECE, Michigan Technological University
  4. Kaijie Wu, On Dependable and Secure Hardware Design, 2004; Best Dissertation Award, ECE Department, NYU-Poly; Outstanding Dissertation Award 2004 in "New directions in circuit and system test" awarded by European Design and Automation Association; First position: Assistant Professor of ECE, University of Illinois, Chicago
  5. Bo Yang, Secure Hardware Design, and Test, NYU-Poly, 2009; Third prize winner in the IEEE/ACM DAC-ISSSSC Student Design contest, 2004; Third prize winner in the IEEE Test Technology Technical Council Ph.D. Dissertation contest, 2009.
  6. Kurt Rosenfeld, VLSI Security and Test; First position: Google NYC, 2012.
  7. Arun Kanuparthi, Microarchitecture support for security and reliability; First job: intel, 2014
  8. Sacchidh Kannan (co-advised with O. Sinanoglu), Security and Reliability of Nanoscale architectures, First position: Intel;  IBM Great minds award, 2014
  9. Xiaofei Guo, Fault Attacks and Countermeasures for Symmetric Key Cryptographic Algorithms. First position Intel, 2014.
  10. Xueyang Wang, Reusing Hardware Performance Counters for System Security, 2015; First position: Intel.
  11. Jeyavijayan Rajendran,  Trustworthy Integrated Circuits: (NSF CAREER 2017, SIGDA Best PhD Dissertation 2017, Best Student Paper at ACM CCS, 2013, IEEE DFTS 2013, VLSI Design 2011; Most Popular Research Award, ACM Design Automation PhD Forum at DAC,  2014, Third place, ACM Student Research Competition - Grand Finals, 2013, Third place, ACM Student Research Competition for Design Automation at ICCAD,  2013, Third place, ACM Student Research Competition for Design Automation at DAC, 2012, Third place, IT security for next generation in Kaspersky American Cup,  2011, First place,  CyberSecurity Awareness Week - Embedded Systems Challenge,  2009), 2015, First position: Assistant Professor, UT Dallas.  Current: Texas A&M University
  12. Jerry Backer, Design for Introspection for Secure Systems on Chip, 2017, First position: Intel
  13. Vinayak Jyothi, Hardware Accelerated-and-Assisted Network Security Architectures, 2017.
  14. Jack Tang, Secure Digital Microfluidic Biochips (ongoing)
  15. M. Shayan, Secure Digital Microfluidic Biochips (ongoing)

Postdoctoral Research Scientists etc.

  1. Prof. Mohamad Zahran, Clinical Associate Professor, NYU
  2. Prof. Naghmeh Karimi, Assistant Professor, University of Maryland, Baltimore County
  3. Prof. Subidh Ali (joint with O. Sinanoglu); Assistant Professor,  IIT Tirupathi
  4. Dr. Kanad Basu
  5. Dr. Sukanta Bhattacharjee (joint with K. Chakrabarty)

Sample MS Projects/Theses

  1. Z. Ghodsi, Hardware performance counters
  2. S. Dondeti, Protecting Stream ciphers against fault attack
  3.  H. Borad, Slide: A CED architecture for AES against fault attacks
  4. E. Feyngold, Computer aided netlist obfuscation
  5. R. Somasekharan, Secure sensor platform for smartphones
  6. J. Yogarasa, Secure medical sensor platform for smartphones
  7. D. Ng, Secure environmental sensor platform for smartphones
  8. X. Wang, Hardware evaluation of round 2 SHA-‐3 competition
  9. P. Tetteh, VHDL models of NIST HASH function candidates
  10. D. Chandrasekharan, Hardware support for memory virtualization
  11. A. Kozak, VHDL models of NIST HASH function candidates
  12. P. Mathur, Hardware support for I/O virtualization
  13. C. Rao, VHDL model of a NIST HASH function candidate
  14. M. Makhdoom, Trivium hash function optimization
  15. A. Chiu, VHDL Models for the 8051 microcontroller
  16. V. Lee, Implementing LEX stream cipher in 8051 assembly
  17. A. Gupta, Logic obfuscation of the Tiny 64 processor
  18. M. Pawel, Logic obfuscation of the Sparc processor
  19. M. Istomin, Scan attack on mosquito stream cipher,
  20. R. Stern, VHDL models for the ECRYPT stream ciphers, Best MS student
  21. M. Hsia, Logic obfuscation of the 8051 microcontroller
  22. S. Mantravadi, Slide based CED, diagnosis and reconfiguration techniques for symmetric block ciphers
  23. N.  Joshi, Concurrent error detection architectures for symmetric block ciphers
  24. J. Chandran, Involution based CED of symmetric block ciphers
  25. 24. T. Wei, Fault tolerant quantum cellular array design using triple modular redundancy with shifted operands
  26. S. Mishra, High-speed architectures for Galois Counter Mode (GCM)

Sample BS Senior Design projects 

1. C. Bautista and S. Rodriguez, The Smart belt, an aid for the visually impaired; Best ECE senior design project.
2. I. Brutman, E. Poon and A. Ivannikov, ISwiffer.
3. Best ECE senior design project.
4. W. Lam, Implementation of the SHA-‐256 Cryptographic Hash Algorithm on the 8051 Microcontroller
5. second prize winner in the ECE senior design project contest
6. M. Chow, D. Hernandez and S. Tanios, VHDL modeling of the Trivium Stream Cipher
7. A. Kabeera and M. Policastro, VHDL modeling of the Mickey-‐128 stream Cipher
8. L. Narciso and J. Ma, VHDL modeling of the Mickey-‐128 stream cipher
9. M. Thiam and K. Pryce, Optimized implementation of Dragon stream cipher in 8051 Assembly Language
10. C. Roos and O. Uysal, Optimized implementation of the SOSEMANUK stream cipher in 8051 Assembly Language
11. J. Sanchez and M. Moise, Optimized implementation of the RC6 block cipher in 8051 Assembly Language
12. J.  Ortiz, B.  Lee and C. Valencia, VHDL Modeling of RC6 Private Key Encryption
13. E. Chan and Y. Paliwal, Optimization of RC6 Encryption for 8051 Embedded Processor
14. M. Pawel and F. Orlov, VHDL Modeling of DES Private Key Encryption
15. S. John and A. Raju, VHDL Modeling of RC6 Private Key Encryption
16. S.  Ma, H. Lall, and F.  Khan, Optimization of RC6 Encryption for 8051 Embedded Processor
17. R. Kumar, M. Istomin, and S. Cheng, VHDL Modeling of SHA-‐1 Message Authentication Code
18. E. Levenstein, F. Ferrer and A. Vaynshteyn, VHDL Modeling of SHA-‐1 Message Authentication Code
19. A. Gondal and X. Wu, Optimization of DES Private Key Encryption for 8051 Embedded Processor
20. I. Deck and M. Darmetko, Optimization of MD5 Message Authentication Code for 8051 Embedded Processor
21. D. Sharma, B. Goldinger and J. Jeudy, Optimization of RSA Public Key Encryption for 8051 Embedded Processor
22. D. Furniss and J. Raggio, Optimization of MD5 Message Authentication Code for 8051 Embedded Processor
23. B.  Chan, K.  Liu and D. Roman, Optimization of SHA-‐256 Message Authentication Code for 8051 Embedded Processors

Courses Taught

EL 6463 (Formerly EL 5493): Advanced Computer Design using VHDL (lecture and lab),  EL 9423: Special Topics in Computer Engineering: Introduction to Secure and Trustworthy Hardware, EE 4313 and EE 4323: Computer Engineering Design Project I and II.