Saleh Mulhem

Saleh Mulhem
Bildnachweis: Saleh Mulhem/TU Braunschweig

Saleh Mulhem

Raum: 1114
Telefon:0531 391 9657
Mobile: +49 176 238 767 03
E-Mail: s.mulhem (at)tu-braunschweig.de


Institut für Datentechnik und Kommunikationsnetze
Hans-Sommer-Straße 66
38106 Braunschweig

Current Projects:

  • Clone resistant functions and tracking protocols.

In the last two decades, Physical Unclonable Functions (PUFs) were proposed as DNA-like born material properties mainly in electronic units. Such a physical function makes electronic units hard to clone and more robust by adding new properties or markers as well as makes them uniquely identifiable. This technology could offer the system a resilient security infrastructure that can trace and resolve cloning attacks efficiently. PUFs however, as analog entities, suffer from inconsistency due to aging and operational conditions. This leads to limiting the practical use of PUFs due to their high-complexity and inherent inconsistency.

The main objective of this project is to develop and analyze clone-resistant identities based on the so-called digital Secret Unknown Cipher (SUC). SUC concept was introduced a decade ago by a research team at the technical university of Braunschweig. The clone-resistant identities are considered as a low-cost and consistent alternative to the conventional analog PUFs.

 

Presentations:

  • W. Adi, A. Mars, and S. Mulhem, "Clone-resistant structures in Microsemi SoC units," presented at CryptArchi 2017, Smolenice, Slovakia, Jun 2017.

Publications:

Computer Engineering :( Clone-Resistant Functions Desing)

1.      Journal Papers

  • S. Mulhem, A. Mars, and W. Adi, “Low-Complexity Nonlinear Self-Inverse Permutation for Physically Clone-Resistant Identities,” Cryptogrphy, 2020.
  • S. Mulhem and W. Adi, “New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices,” Cryptogr. 2019, Vol. 3, Page 28, vol. 3, no. 4, p. 28, Dec. 2019

2.      Conference Papers

  • R. Zarrouk, S. Mulhem, L. Reich and W. Adi, "Non-Repeatable Clone-Resistant Group Device Identity," 2019 International Conference on Cyber Security for Emerging Technologies (CSET), Doha, Qatar, 2019, pp. 1-7.
  • Mulhem, S, Ayache, M, and Adi, W, " Mini-Block-Based Cipher Class for Physical Clone- Resistant Devices", 2019 Eighth International Conference on Emerging Security Technologies (EST), Colchester, United Kingdom, 2019, pp. 1-6.
  • Mulhem, S, Mohammad, M and Adi, W, "A New Low-Complexity Cipher Class for Clone-Resistant Identities", 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 2019, pp. 971-976.

  • Mulhem,S, Ahmad,A, and Adi,W,"Accelerometer-Based Joint User-Device Clone-Resistant Identity," 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2018, pp.230-237.

  • Mulhem,S, Mars,A, and Adi,W, "A Cipher Class Based on Golden S-Boxes for Creating Clone-Resistant Identities" In: Fournaris A., Lampropoulos K., Marín Tordera E. (eds) Information and Operational Technology Security Systems. IOSec 2018. Lecture Notes in Computer Science, vol 11398. Springer, Cham.

  • Mulhem,S, Zarrouk,R, and Adi,W, "Security and Complexity Bounds of SUC-Based Physical Identity" 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Edinburgh, 2018, pp. 317-322.

  • E. Hamadaqa, S. Mulhem, A. Mars, and W. Adi, "Clone-Resistant Joint Identity Technique for Secured Fleet Management Systems," in 12th NASA/ESA Conference on Adaptive Hardware and Systems, 2018.
  • Mulhem,S, Adi,W, Mars,A, and Prevelakis,V,"Chaining Trusted Links by Deploying Secured Physical Identities", 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, 2017, pp. 215-220.

  • Mars, A,Adi, W, Mulhem, S and Hamadaqa, E,"Random Stream Cipher as a PUF-like Identity in FPGA Environment", Conference: Seventh IEEE International Conference on Emerging Security Technologies - EST September 2017, At Canterbury, UK.

  • Hamadaqa, E, Mars,Adi, W, and Mulhem,S, "A Clone-Resistant Vehicular RKE by Deploying SUC",Conference: Seventh IEEE International Conference on Emerging Security Technologies - EST September 2017, At Canterbury, UK.

  • Adi, W, Mulhem, S and Mars, A, "Secured Remote Sensing by Deploying Clone-Resistant Secret Unknown Ciphers", Conference: 2017 IEEE International Conference on Consumer Electronics, Volume: Special Session 25_Cyber Security and Privacy of Mobile, Web and Internet of Things (SS-CWT), June 2017.

  • Adi, W, Mars, A and Mulhem, S, "Generic Identification Protocols by Deploying Secret Unknown Ciphers (SUCs)",conference: 2017 IEEE International Conference on Consumer Electronics-(ICCE-TW), At Taiwan, Volume: Special Session 07_Advanced Cryptography and Its Applications,june 2017.

Applied Mathematics: (Numerical Methods and Algorithms)

Journal Papers

  • A New Approach for solving the time independent Schrödinger Equation using DTM, Journal of AppliedSciences Research(2015). http://www.aensiweb.com.

  • Fast Differential Transform Method for the Solution of High Order Boundary-Value Problems, Far East Journal of Mathematical Sciences (FJMS-20 15). http://pphmj.com/journals/fjms.htm.
  • A Study of Modified Differential Transform's Method and convergence it toSolution of High Order Boundary ValueProblems, Journal of Basic Sciences ( 2014).
  • Solution of Twelfth Order Boundary Value Problems using Adomian decomposition method, Journal of Applied Sciences Research(2011). http://www.aensiweb.com/jasr/jasr_june_2011.html .

Patents:

  • S. Mulhem, W. Adi, A. Mars, V. Prevelakis and E. Hamadaqa "Verknüpfung vertrauenswürdiger Links durch Bereitstellung gesicherter physischer Identitäten" 10 2017 008 348.7, 2017.

  • A. Mars, W. Adi, S. Mulhem, and E. Hamadaqa, "Randomisierte Folge Chiffre in FPGA Umgebung" 10 2017 008 347.9, 2017.

  • W. Adi, A. Mars, and S. Mulhem, "Identifikationsprotokolle durch Anwendung von geheimen unbekannten Chiffren" 10 2017 005 422.3, 2017.

  • E. Hamadaqa, S. Mulhem, A. Mars, and W. Adi, "Secured Fleet Management Systems Using unclonable Units," 10 2018 006 168.0.