Secure Computation Laboratory

Professor Marten van Dijk

Advertisment

Hoda Maleki

PhD Student
Office: ITE 423
hodamaleki@uconn.edu

Biography

I am a PhD student in Computer Science and Engineering Department at UCONN. I currently work in the Secure Computation Lab. I received my Masters in Information Security from Amirkabir University of Technology in Tehran. Generally, I am interested in system security and Database Systems.

Research Interests

  • System Security
  • Database Systems
  • Cloud Computing
  • Cryptography

Current Projects

  • Security Inspection of OpenStack
    In collaboration with Boston University, we are investigating the security of OpenStack services according to the Universal Composability model. This project is one of the Modular Approach to Cloud Security (MACS) projects which involve MIT, BU, NEU, and UConn. Our project was chosen as one of the three outstanding projects among MACS projects as a result of a NSF site visit in 2016.
  • Moving Target Defense
    In collaboration with Boston University and UConn we propose a new model for evaluating the effectiveness of MTD systems. Specifically, we model MTD as a combinatorial game between an adversary and a defender. Our analysis shows that MTD can be a really effective approach in securing a system if MTD startegies are composed together and system paramers are chosen wisely.
  • Counterfeit Product Detection for RFID-Based Supply Chains
    Current RFID monitoring schemes are used either local databases or online persistent communication between the reader and the back-end database. We introduce a novel scheme, LightSource, which uses an onboard Non-Volatile Memory (NVM) in RFID tags to function as a tiny mobile database. It is implementable on inexpensive EPC Class 1 Gen 2 RFID tags and enables producers to trace and find fake product injection points without having any local databases on partner sites or not having to communicate with them while preserving supply chain partners' privacy. With all these features, LightSource goes beyond other counterfeit product detection mechanisms.

Publications

  • Hoda Maleki, Reza Rahaeimehr and Marten van Dijk, "SoK: A Survey of Clone Detection Approaches in RFID-based Supply Chains", Workshop on Attacks and Solutions in Hardware Security (ASHES 2017)
  • H. Maleki, R. Rahaeimehr, Ch. Jin, and M. Dijk, "New Clone-detection Approach for RFID-based supply chain", IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2017).
  • H. Maleki, S. Valizadeh, W. Koch, A. Bestavros, and M. van Dijk, "Markov modeling of moving target defense games." Proceedings of the 2016 ACM Workshop on Moving Target Defense. ACM, 2016.
  • H. Maleki, R. Rahaeimehr and M. van Dijk, "LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses", IACR Cryptology ePrint Archive 2016, 608 (2016). Link to paper
  • Maleki H, Sadeghiyan B,"Compound of reversible one-dimensional CA rules for two-dimensional CA with cryptographic applications", Computer Conference, 2009. CSICC 2009. 14th International CSI. IEEE , 2009.