Displaying all 3 publications

Abstract:
Sort:
  1. Veeraiyah Thangasamy, Vinesh Thiruchelvam, Shaiful Jahari Hashim, Noor Ain Kamsani
    MyJurnal
    Multimode multiband connectivity has become a de-facto requirement for smartphones with 3G
    WCDMA/4G LTE applications. In transceivers, multiband operation is achieved by selecting an output from two or more signal path targeting for a specific frequency range in parallel or by using switched capacitor/inductor. In this paper, design methodology of 280nm CMOS switch is presented. Design optimization of RF CMOS switch is presented which is deciding proper selection of CMOS transistor parameters and switch size as per external circuit parameters. The CMOS switch of a 5-transistor stack with W/L=1200μm/280nm provides insertion loss < 0.6dB and isolation loss >14dB. The switches designed when implemented in a multiband power amplifier (PA) exhibits 36dB gain at 1900MHz high-band and 34.5dB gain at 900MHz low-band with 27.5dBm peak power at both bands. The switch design methodologies presented in this paper should be of use in designing various blocks in emerging multiband transceiver applications.
  2. Yew, Teh Jia, Khairulmizam Samsudin, Nur Izura Udzir, Shaiful Jahari Hashim
    MyJurnal
    Recent rootkit-attack mitigation work neglected to address the integrity of the mitigation tool itself. Both detection and prevention arms of current rootkit-attack mitigation solutions can be given credit for the advancement of multiple methodologies for rootkit defense but if the defense system itself is compromised, how is the defense system to be trusted? Another deficiency not addressed is how platform integrity can be preserved without availability of current RIDS or RIPS solutions, which operate only upon the loading of the kernel i.e. without availability of a trusted boot environment. To address these deficiencies, we present our architecture for solving rootkit persistence – Rootkit Guard (RG). RG is a marriage between TrustedGRUB (providing trusted boot), IMA (Integrity Measurement Architecture) (serves as RIDS) and SELinux (serves as RIPS). TPM hardware is utilised to provide total integrity of our platform via storage of the aggregate of the clean snapshot of our platform OS kernel into TPM hardware registers (i.e. the PCR) – of which no software attacks have been demonstrated to date. RG solves rootkit persistence by leveraging on one vital but simple strategy: the mounting of rootkit defense via prevention of the execution of configuration binaries or build initialisation scripts. We adopted the technique of rootkit persistence prevention via thwarting the initialisation of a rootkit’s installation procedure; if the rootkit is successfully installed, proper deployment via thwarting of the rootkit’s
    configuration is prevented. We had subjected the RG to 8 real world Linux 2.6 rootkits and the RG was successful in solving rootkit persistence in all 8 evaluated rootkits. In terms of performance, the RG introduced a maximum of 11% overhead and an average of 4% overhead, hence permitting deployment in production environments.
  3. Najih, Abdulmawla, Syed Abdul Rahman Al-Haddad Syed Mohamed, Abdul Rahman Ramli, Shaiful Jahari Hashim, Nabila Albannai
    MyJurnal
    The use of biometric features, to authenticate users of different applications, is growing rapidly in recent years, according to the high sensitivity of the protected information and the good security that biometric authentication provides. In this study, a method is proposed to measure the similarity between two fingerprint images, using convolutional neural networks, instead of classifying them. Thus, modifying the users that the proposed method can recognize is a matter of adding or removing model images of the users’ fingerprints. The similarity between the fingerprint image and every model image was measured in order to select the user with the highest similarity to the input image as the recognized user, where that similarity measure was compared to a threshold value in order to authenticate that user. The evaluation results of the proposed method, using FVC2002_DB1 and FVC2004_DB1 showed that the proposed method had 99.97% accuracy with 0.035% False Acceptance Rate (FAR) and 0% False Rejection Rate (FRR). Hence, the proposed method has been able to maintain high accuracy while eliminating the vulnerabilities of biometric authentication systems imposed by the use of separate stages for features extraction and similarity measurement.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links