Patents by Inventor Ioannis Savidis
Ioannis Savidis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240214803Abstract: A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.Type: ApplicationFiled: December 23, 2022Publication date: June 27, 2024Applicant: Drexel UniversityInventors: Kapil R. Dandekar, James J. Chacko, Kyle Joseph Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis
-
Patent number: 11971987Abstract: A proposed technique allows for the security of the logic cone through logic locking and secures the outputs of the circuit from the scan chain without modifications to the structure of the scan chain. Since the oracle responses in test mode do not correspond to the functional key, satisfiability (SAT) attacks are not able to leverage the responses from the scan chain. In addition, a charge accumulation circuit is developed to prevent and detect any attempt to enter the partitioned test mode while the correct circuit responses are still stored within the registers.Type: GrantFiled: September 21, 2021Date of Patent: April 30, 2024Assignee: Drexel UniversityInventors: Kyle Joseph Juretus, Ioannis Savidis
-
Publication number: 20230344431Abstract: A field-programmable analog array (FPAA) fabric includes a 6×6 matrix of configurable analog blocks (CABs). The implementation of programmable CABs eliminates the use of fixed analog subcircuits. A unique routing strategy is developed within the CAB units that supports both differential and single-ended mode circuit configurations. The bandwidth limitation due to the routing switches of each individual CAB unit is compensated for through the use of a switch-less routing network between CABs. Algorithms and methodologies facilitate rapid implementation of analog circuits on the FPAA. The proposed FPAA fabric provides high operating speeds as compared to existing FPAA topologies, while providing greater configuration in the CAB units as compared to switch-less FPAA. The FPAA core includes 498 programming switches and 14 global switchless interconnects, while occupying an area of 0.1 mm2 in a 65 nm CMOS process.Type: ApplicationFiled: March 16, 2023Publication date: October 26, 2023Applicant: Drexel UniversityInventors: Ioannis Savidis, Ziyi Chen
-
Publication number: 20230297750Abstract: A simulation-based optimization framework determines the sizing of components of an analog circuit to meet target design specifications while also satisfying the robustness specifications set by the designer. The robustness is guaranteed by setting a limit on the standard deviations of the variations in the performance parameters of a circuit across all process and temperature corners of interest Classifier chains are used that, in addition to modeling the relationship between inputs and outputs, learn the relationships among output labels. Additional design knowledge is inferred from the optimal ordering of the classifier chain.Type: ApplicationFiled: March 16, 2023Publication date: September 21, 2023Applicant: Drexel UniversityInventors: Zhengfeng Wu, Ioannis Savidis
-
Publication number: 20230299775Abstract: In this paper, a novel field-programmable analog array (FPAA) is proposed to secure the intellectual property (IP) of analog and mixed-signal circuits. A obfuscation technique is developed to efficiently mask the topology of both differential mode and single-ended mode analog circuits.Type: ApplicationFiled: April 24, 2023Publication date: September 21, 2023Applicant: Drexel UniversityInventors: Ioannis Savidis, Ziyi Chen
-
Patent number: 11641200Abstract: A method for the delivery of power to subthreshold (sub-Vt) circuits uses unused current during idle-mode operation of super-threshold (super-Vt) circuits is used to supply sub-Vt circuits. Algorithmic and circuit techniques use dynamic management of idle cores when reusing the leakage current of the idle cores. A scheduling algorithm, longest idle time-leakage reuse (LIT-LR) enables energy efficient reuse of leakage current, which generates a supply voltage of 340 mV with less than ±3% variation across the tt, ff, and ss process corners. The LIT-LR algorithm reduces the energy consumption of the switch and the peak power consumption by, respectively, 25% and 7.4% as compared to random assignment of idle cores for leakage reuse. Second, a usage ranking based algorithm, longest idle time-simultaneous leakage reuse and power gating (LIT-LRPG) enables simultaneous implementation of power gating (PG) and leakage reuse in a multiprocessor system-on-chip (MPSoC) platform.Type: GrantFiled: May 4, 2021Date of Patent: May 2, 2023Assignee: Drexel UniversityInventors: Md Shazzad Hossain, Ioannis Savidis
-
Publication number: 20230090772Abstract: A proposed technique allows for the security of the logic cone through logic locking and secures the outputs of the circuit from the scan chain without modifications to the structure of the scan chain. Since the oracle responses in test mode do not correspond to the functional key, satisfiability (SAT) attacks are not able to leverage the responses from the scan chain. In addition, a charge accumulation circuit is developed to prevent and detect any attempt to enter the partitioned test mode while the correct circuit responses are still stored within the registers.Type: ApplicationFiled: September 21, 2021Publication date: March 23, 2023Applicant: Drexel UniversityInventors: Kyle Joseph Juretus, Ioannis Savidis
-
Patent number: 11540120Abstract: A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.Type: GrantFiled: June 5, 2019Date of Patent: December 27, 2022Assignee: Drexel UniversityInventors: Kapil R. Dandekar, James J. Chacko, Kyle Joseph Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis
-
Patent number: 11444210Abstract: The increasing power density and, therefore, current consumption of high performance integrated circuits (ICs) results in increased challenges in the design of a reliable and efficient on-chip power delivery network. In particular, meeting the stringent on-chip impedance of the IC requires circuit and system techniques to mitigate high frequency noise that results due to resonance between the package inductance and the onchip capacitance. In this paper, a novel circuit technique is proposed to suppress high frequency noise through the use of a hyperabrupt junction tuning varactor diode as a decoupling capacitor for noise critical functional blocks. With the proposed circuit technique, the voltage droops and overshoots on the onchip power distribution network are suppressed by up to 60% as compared to MIM or deep trench decoupling capacitors of the same capacitance.Type: GrantFiled: June 21, 2019Date of Patent: September 13, 2022Assignee: Drexel UniversityInventors: Divya Pathak, Ioannis Savidis
-
Patent number: 11435802Abstract: A real-time workload scheduling heuristic assigns tasks to the cores such that the total load current consumption of the cores is always less than the total current capability of the under-provisioned on-chip voltage regulators. In addition, the energy-efficient scheduling of the tasks on to the cores ensures that the reconfiguration of the power delivery network is minimized. The heuristic includes DVFS management based on the unique constraints of the under provisioned voltage regulators.Type: GrantFiled: May 1, 2018Date of Patent: September 6, 2022Assignee: Drexel UniversityInventors: Ioannis Savidis, Divya Pathak, Houman Homayoun
-
Patent number: 11282414Abstract: There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. One of the approaches provides a circuit having a gate topology comprising a logic gate with integrated key transistors, where the key transistors comprise at least a PMOS stack and an NMOS stack. The PMOS stack comprises a first PMOS switch and a second PMOS switch, where the first and the second PMOS switches have sources to a voltage source and drains that serve as a source to a third PMOS switch. The NMOS stack comprises a first NMOS switch and a second NMOS switch, where the first and the second NMOS switches have sources to ground and drains that serve as a source to a third NMOS switch. Each of the above approaches may encrypt a circuit with certain advantages in delay and power consumption.Type: GrantFiled: October 24, 2016Date of Patent: March 22, 2022Assignee: Drexel UniversityInventors: Ioannis Savidis, Kyle Juretus
-
Patent number: 11270031Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.Type: GrantFiled: April 29, 2020Date of Patent: March 8, 2022Assignee: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Joseph Juretus
-
Publication number: 20210359675Abstract: A method for the delivery of power to subthreshold (sub-Vt) circuits uses unused current during idle-mode operation of super-threshold (super-Vt) circuits is used to supply sub-Vt circuits. Algorithmic and circuit techniques use dynamic management of idle cores when reusing the leakage current of the idle cores. A scheduling algorithm, longest idle time-leakage reuse (LIT-LR) enables energy efficient reuse of leakage current, which generates a supply voltage of 340 mV with less than ±3% variation across the tt, ff, and ss process corners. The LIT-LR algorithm reduces the energy consumption of the switch and the peak power consumption by, respectively, 25% and 7.4% as compared to random assignment of idle cores for leakage reuse. Second, a usage ranking based algorithm, longest idle time-simultaneous leakage reuse and power gating (LIT-LRPG) enables simultaneous implementation of power gating (PG) and leakage reuse in a multiprocessor system-on-chip (MPSoC) platform.Type: ApplicationFiled: May 4, 2021Publication date: November 18, 2021Applicant: Drexel UniversityInventors: MD Shazzad Hossain, Ioannis Savidis
-
Patent number: 11177902Abstract: A physical layer based technique secures wireless communication between a transmitter and receiver. The technique involves obfuscating the preamble data of the baseband signal through unique keys that are generated at the transmitter and the receiver based on channel characteristics known only to them.Type: GrantFiled: January 15, 2018Date of Patent: November 16, 2021Assignee: Drexel UniversityInventors: James J. Chacko, Kapil R. Dandekar, Marko Jacovic, Kyle Joseph Juretus, Nagarajan Kandasamy, Cem Sahin, Ioannis Savidis
-
Patent number: 11157674Abstract: An approach is described for enhancing the security of analog circuits using Satisfiability Modulo Theory (SMT) based design space exploration. The technique takes as inputs generic circuit equations and performance constraints and, by exhaustively exploring the design space, outputs transistor sizes that satisfy the given constraints. The analog satisfiability (aSAT) methodology is applied to parameter biasing obfuscation, where the width of a transistor is obfuscated to mask circuit properties, while also limiting the number of keys that produce the target performance requirements.Type: GrantFiled: January 31, 2020Date of Patent: October 26, 2021Assignee: Drexel UniversityInventors: Vaibhav Venugopal Rao, Ioannis Savidis
-
Publication number: 20210247839Abstract: An on-chip voltage delivery method for a system includes multiple processor cores operating at multiple voltage levels. Distributed on-chip DC-DC converters as voltage regulators may deliver point of load current to the different units of a processor core operating at the same voltage level. Distributed timing sensors calibrated to generate digitized clock edge location. A power management unit may take input from the timing sensors, processes it through a particle swarm optimizer and generates digitized voltage identification code as reference to the distributed voltage regulators. The particle swarm optimizer may provide disparate voltage levels feasible for a given frequency of operation of the processor core with a provision to operate at multiple frequencies. The run-time assignment of the voltage through the particle swarm optimizer may negate the effects of transistor aging, process, temperature, and power supply noise induced variation in the load circuits, voltage regulators and sensors.Type: ApplicationFiled: September 3, 2019Publication date: August 12, 2021Applicant: Drexel UniversityInventors: Divya Pathak, Ioannis Savidis
-
Patent number: 10923442Abstract: A key based technique that targets obfuscation of critical circuit parameters of an analog circuit block by masking physical characteristics of a transistor (width and length) and the circuit parameters reliant upon these physical characteristics (i.e. circuit biasing conditions, phase noise profile, bandwidth, gain, noise figure, operating frequency, etc.). The proposed key based obfuscation technique targets the physical dimensions of the transistors used to set the optimal biasing conditions. The widths and/or lengths of a transistor are obfuscated and, based on an applied key sequence, provides a range of potential biasing points. Only when the correct key sequence is applied and certain transistor(s) are active, are the correct biasing conditions at the target node set.Type: GrantFiled: March 12, 2018Date of Patent: February 16, 2021Assignee: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Juretus
-
Publication number: 20210019449Abstract: A state machine system on a chip presents hidden state transitions to create IC knowledge not available in a logical netlist and temporal key dependencies to increase the difficulty of executing the SAT attack. The change in the state space of a circuit over time may be used to increase circuit security. Hidden transitions that are frequency dependent, state dependent keys, and temporally dependent transition keys may be used as ways to increase security against SAT based attacks.Type: ApplicationFiled: March 13, 2019Publication date: January 21, 2021Applicant: Drexel UniversityInventors: Kyle Joseph Juretus, Ioannis Savidis
-
Publication number: 20200342142Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.Type: ApplicationFiled: April 29, 2020Publication date: October 29, 2020Applicant: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Joseph Juretus
-
Publication number: 20200250365Abstract: An approach is described for enhancing the security of analog circuits using Satisfiability Modulo Theory (SMT) based design space exploration. The technique takes as inputs generic circuit equations and performance constraints and, by exhaustively exploring the design space, outputs transistor sizes that satisfy the given constraints. The analog satisfiability (aSAT) methodology is applied to parameter biasing obfuscation, where the width of a transistor is obfuscated to mask circuit properties, while also limiting the number of keys that produce the target performance requirements.Type: ApplicationFiled: January 31, 2020Publication date: August 6, 2020Applicant: Drexel UniversityInventors: Vaibhav Venugopal Rao, Ioannis Savidis