DRACO Design of Resilient Architectures for Computing

Projects

Polymorphic Encrypted Components
Polymorphic Encrypted Components Design Fundamental Building Blocks with Polymorphic Properties

Using techniques common in malware detection evasion create encrypted components that perform standard operations with a constantly changing key.

Blocks of Code (v3)
Blocks of Code (v3) Physical block programming.

Create a block that based on orientation and manipulations performs one of several fundamental operations. When blocks are placed together they form more complex actions. Blocks should be ultra low-power and cost under five dollar per unit. End product should contain at least 25 blocks. See results from V1 completed by PDX Senior Capstone team circa 2015 and V2 completed by UCF 2024 team.

OpenSense Platform (v3)
OpenSense Platform (v3) Unmask the secrets of data collection and logging

Create a data collection platform that allows for basic environmental data collection for at least three different properties (e.g., temperature, weight/pressure, brightness). Trading off sensor accuracy for simplicity is critical. Platform should allow end user to input the model that converts raw data measurements into known units. See results from V1 completed by PDX Senior Capstone team circa 2015 and V2 completed by UCF 2024 team.

3D Projection Title
3D Projection Title

Develop a 2^n x 2^n Grid of RGBW+ LEDs that is fed from the simulation output of a cycle/turn-based multi-agent simulator. Enable connectable components to increase the grid-size. Basic version should feature fixed 3D printed topology with each unit square being illuminated via an RGB+ led - stretch goal should feature pneumatically controlled tube structures and a flexible membrane.

WiFi Jammer Detector and Audible Peer-to-Peer Backup
WiFi Jammer Detector and Audible Peer-to-Peer Backup

Create a co-processor unit that detects WiFi jamming activities and then broadcasts and establishes an audible frequency link between mesh of devices.

FPGA-based Memristor Pattern Generator and Tester
FPGA-based Memristor Pattern Generator and Tester

Create a FPGA-based system that can generate and test memristors. The system should be able to generate a pattern, write it to a memristor, read the pattern back, and compare it to the original pattern.

Converting Scan Dumps to Gold
Converting Scan Dumps to Gold Locating regions based on scan dump results

TBA

Attacks on Memristor Devices
Attacks on Memristor Devices Understanding the Security Implications of Memristor Devices

This research project focuses on understanding the security implications of memristor devices. The goal is to identify potential vulnerabilities in memristor devices and develop countermeasures to mitigate these vulnerabilities.

Trojan Detection Using Side Channel Analysis
Trojan Detection Using Side Channel Analysis Detecting Hardware Trojans Using Side Channel Analysis

This research project focuses on detecting hardware trojans using side channel analysis and machine learning. The goal is to develop a methodology to detect hardware trojans using side channel analysis and evaluate the effectiveness of the methodology on different hardware trojans.

Detect AI Workloads Using Side Channel Analysis
Detect AI Workloads Using Side Channel Analysis Detecting AI Workloads Using Side Channel Analysis

This research project focuses on detecting AI workloads using side channel analysis. The goal is to develop a methodology to detect AI workloads using side channel analysis and evaluate the effectiveness of the methodology on different AI workloads.

Secure, Heterogeneous, Autonomous, and Rotational Knowledge for Swarms
Secure, Heterogeneous, Autonomous, and Rotational Knowledge for Swarms SHARKS

This research project focuses on developing drones in a given swarm with limited compute resources and little memory, so developing efficient behaviors is necessary for the agents to work within these restrictions. In addition to positioning behaviors, this project investigates safety protocols to protect the swarm from adversarial swarms and environmental obstacles.