Patents by Inventor CHARLES A. KAMHOUA

CHARLES A. KAMHOUA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220309192
    Abstract: In one embodiment, the invention is a method and apparatus for designing combinational logics with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a design method such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several methods as shown in several embodiments. The methods include randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Application
    Filed: June 2, 2022
    Publication date: September 29, 2022
    Applicant: Government of the United States as Represented by the Secretary of the Air Force
    Inventors: YIYU SHI, TRAVIS SCHULZE, KEVIN KWIAT, CHARLES A. KAMHOUA
  • Patent number: 11354452
    Abstract: The invention is a secure logic chip with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a secure logic chip design such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several features including randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 7, 2022
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventors: Yiyu Shi, Travis Schulze, Kevin Kwiat, Charles Kamhoua
  • Patent number: 11354451
    Abstract: The invention is a secure logic chip with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a secure logic chip design such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several features including randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 7, 2022
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventors: Yiyu Shi, Travis Schulze, Kevin Kwiat, Charles Kamhoua
  • Patent number: 10812500
    Abstract: A cyberthreat detection method and system includes a distributed file system and a commodity cluster. The commodity cluster has a plurality of servers. A data array of key-value pairs related to social media is received; it stores a plurality of predetermined ground predicates. A ground predicate graph is constructed for each user then partitioned into balanced portions Pi each corresponding to a server and the ground predicates stored on that server. In parallel on each server, a plurality of leaned rules are determined for the files stored on that server. From a union of the plurality of learned rules, the system determines a respective weight for each of the learned rules. The plurality of rules are ranked in order of accuracy by the plurality of weights.
    Type: Grant
    Filed: January 30, 2018
    Date of Patent: October 20, 2020
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: Praveen Rao, Charles Kamhoua, Kevin Kwiat, Laurent Njilla
  • Publication number: 20200026887
    Abstract: The invention is a secure logic chip with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a secure logic chip design such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several features including randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Application
    Filed: October 30, 2018
    Publication date: January 23, 2020
    Inventors: YIYU SHI, TRAVIS SCHULZE, KEVIN KWIAT, CHARLES KAMHOUA
  • Publication number: 20200026886
    Abstract: The invention is a secure logic chip with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a secure logic chip design such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several features including randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Application
    Filed: October 30, 2018
    Publication date: January 23, 2020
    Inventors: YIYU SHI, TRAVIS SCHULZE, KEVIN KWIAT, CHARLES KAMHOUA
  • Publication number: 20190238564
    Abstract: A cyberthreat detection method and system includes a distributed file system and a commodity cluster configured in data communication via a network, wherein the commodity cluster is defined as a plurality m of servers, each including a computer processor and a non-transitory computer-readable storage medium. The system and method includes receiving a data array characterized by a key and a value in a set of pairs relating to social media posts and users, storing a plurality of predetermined ground predicates, constructing a ground predicate graph for each user reflected in the array, constructing a user centric graph having one or more vertices and one or more edges and wherein each vertex represents the ground predicate graph corresponding to each user. The method includes partitioning the user centric graph into balanced portions Pi corresponding to the number of servers and wherein the ground predicates of each vertex in partition Pi are stored as a file on a server associated with that partition Pi.
    Type: Application
    Filed: January 30, 2018
    Publication date: August 1, 2019
    Inventors: Praveen Rao, Charles Kamhoua, Kevin Kwiat, Laurent Njilla
  • Patent number: 10348752
    Abstract: The invention comprises a system and article of manufacture to discover potential cyber threats on Twitter. The invention provides a unified framework for modeling and reasoning about the veracity of tweets to discover suspicious users and malicious content. The invention builds on the concept of Markov logic networks (MLNs) for knowledge representation and reasoning under uncertainty.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: July 9, 2019
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: Praveen Rao, Charles Kamhoua, Laurent Njilla, Kevin Kwiat
  • Publication number: 20190087607
    Abstract: The invention is a method for designing combinational logics with resistance to hardware Trojan induced data leakage. The invention solves the untrustworthy fabrication risk problem by introducing a design method such that even when the design is entirely known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained. This invention contains several methods as shown in several embodiments. The methods include randomized encoding of binary logic, converting any combinational binary logic into one with randomized encoding, and partitioning a randomized encoded logic for split manufacturing.
    Type: Application
    Filed: October 30, 2018
    Publication date: March 21, 2019
    Inventors: YIYU SHI, TRAVIS SCHULZE, KEVIN KWIAT, CHARLES KAMHOUA
  • Publication number: 20180324196
    Abstract: The invention comprises a system and article of manufacture to discover potential cyber threats on Twitter. The invention provides a unified framework for modeling and reasoning about the veracity of tweets to discover suspicious users and malicious content. The invention builds on the concept of Markov logic networks (MLNs) for knowledge representation and reasoning under uncertainty.
    Type: Application
    Filed: May 3, 2017
    Publication date: November 8, 2018
    Inventors: PRAVEEN RAO, CHARLES KAMHOUA, LAURENT NJILLA, KEVIN KWIAT
  • Patent number: 10121011
    Abstract: Apparatus, method and article of manufacture providing a randomized encoding scheme for sequential logics, for resistance to data leakage. Invention employs dual-rail encoding to randomize the information in the chip, and employs three-dimensional integration technology to protect the critical information that is needed to decode the data anywhere on-chip. With the present invention, even when the entire design is completely known to the attacker who also has full access to the outsourced portion, it is still not always possible to identify the information in the chip using data leakage Trojans.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: November 6, 2018
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: Kevin Kwiat, Charles Kamhoua, Laurent Njilla, Yiyu Shi, Travis Schulze
  • Publication number: 20180137290
    Abstract: Apparatus, method and article of manufacture providing a randomized encoding scheme for sequential logics, for resistance to data leakage. Invention employs dual-rail encoding to randomize the information in the chip, and employs three-dimensional integration technology to protect the critical information that is needed to decode the data anywhere on-chip. With the present invention, even when the entire design is completely known to the attacker who also has full access to the outsourced portion, it is still not always possible to identify the information in the chip using data leakage Trojans.
    Type: Application
    Filed: January 3, 2017
    Publication date: May 17, 2018
    Inventors: KEVIN KWIAT, CHARLES KAMHOUA, LAURENT NJILLA, YIYU SHI, TRAVIS SCHULZE
  • Patent number: 9832220
    Abstract: A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention. The invention's methods include grouping virtual machines of similar loss potential on the same hypervisor, creating hypervisor environments of similar total loss, and implementing a risk tiered system of hypervisors based on expense factors.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: November 28, 2017
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: Luke Kwiat, Charles Kamhoua, Kevin Kwiat
  • Publication number: 20170085582
    Abstract: A method for enhancing security in a cloud computing system by allocating virtual machines over hypervisors, in a cloud computing environment, in a security-aware fashion. The invention solves the cloud user risk problem by inducing a state such that, unless there is a change in the conditions under which the present invention operates, the cloud users do not gain by deviating from the allocation induced by the present invention. The invention's methods include grouping virtual machines of similar loss potential on the same hypervisor, creating hypervisor environments of similar total loss, and implementing a risk tiered system of hypervisors based on expense factors.
    Type: Application
    Filed: September 22, 2015
    Publication date: March 23, 2017
    Inventors: LUKE KWIAT, CHARLES KAMHOUA, KEVIN KWIAT