Papers by Athanasios Kakarountas

Mimicking Biometrics on Smart Devices and Its Application in IoT Security for Health Systems
EAI/Springer Innovations in Communication and Computing, 2020
The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applicat... more The Internet of Things (IoT) encompasses cyber and physical objects in multidisciplinary applications such as home automation, industrial process, environmental monitoring, and human health, to mention a few. Especially the latter systems have seen rapid growth in hospitals and health centers over the last decade. The wireless healthcare monitoring devices of various technologies are presenting global interest, since they offer valuable health metrics to users and physicians and also they are easy to use on a day-to-day basis. This chapter refers to security issues associated to IoT devices in general and how a technique of bio-mimicking on smart devices may reveal potential attacks or malfunctions. The case of systems for healthcare and health monitoring is considered, in order to highlight the techniques’ benefits in this topic. The approach is bio-inspired by human biometrics and adopted to fit the cyber world, referring to a device’s state; specifically the paradigm of side channel attack is exploited. This introduces the notion that to secure devices for healthcare, the designer has to consider the “health status” of the device itself. Taking into consideration that these devices are limited by their functionality and functional characteristics, it is expected that any deviation from the expected normal operation would result in a similar deviation in any operational parameter.
Low Power and High Throughput Implementation of SHA-256 Hash Function
A low power fault secure timer implementation based on the Gray encoding scheme
Exploration Study on Configurable Instruction Set for Bioinformatics' Applications
In the past decade, the needs for faster data analysis with high throughput has increased dramati... more In the past decade, the needs for faster data analysis with high throughput has increased dramatically. Especially in the domain of Bioinformatics and biological data analysis. A common way to overcome this issue is to develop an Application Specific Instruction Processor (ASIP) to accelerate the processing power demanding tasks of the algorithm. In this paper, the procedure to achieve this for Kalign, an algorithm from the field of Bioinformatics, is presented using Xtensa re-configurable processor. The results present a 30% increase of performance, by reducing instruction fetches and implementing common procedures with a new instruction.
Prototype Haptic Feedback Device for Robot-Assisted Minimally Invasive Surgery
Robot-Assisted Minimally Invasive Surgery (RAMIS) is an innovation that has benefited hundreds of... more Robot-Assisted Minimally Invasive Surgery (RAMIS) is an innovation that has benefited hundreds of thousands of patients to date. However, despite their many advantages, those robots are not as popular as expected. Many health professionals are hesitant to use them since they don't provide as much feedback as to their human senses. Haptic feedback is crucial for the smooth conduction of the operation. Our goal was to develop a low-cost sensing system for surgical robots, which will add to their attraction and make them more appealing to surgeons and patients.
Τεχνολογίες και εργαλεία σχεδίασης και υλοποίησης ψηφιακών κυκλωμάτων

A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub using a Natural Language Verification Step
A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub is proposed in this work, target... more A Generalized Tonic-Clonic Seizure Detection Method in a Bathtub is proposed in this work, targeting mainly epileptic seizures. The main novelty of the presented methodology is found in the use of natural language Human-Computer Interaction, in order to verify the positive detection of such seizure. The proposed system, is a low-cost and low-complexity one, that allows safe operation in an environment with limited access. It overcomes problems presented in related works in the scientific literature and offers a sufficient two-tier verification process, in order to eliminate the false positives. The preliminary results, based on simulation, showed that any incident was successfully detected. To the best of the authors knowledge this is the first time that this methodology is presented, combining smart vibration detection and natural language (NL) recognition to verify/trigger (or not) an alarm of seizure in a bathtub.
Ακολουθιακά κυκλώματα με ολοκληρωμένα TTL

A Tetris-based legalization heuristic for standard cell placement with obstacles
Legalization techniques are used both as a final stage and potentially as part of an iterative pr... more Legalization techniques are used both as a final stage and potentially as part of an iterative process of a global cell placement algorithm that distributes cells over a chip area in order to optimize criteria such as wirelength, routability, thermal dissipation etc. Although very efficient dynamic programming algorithms exist for standard cell placement legalization they usually incur high computational complexity, thus, might not be appropriate for acting as subcomponents in an iterative global placement process. On the other hand fast, single pass approaches such as Tetris heuristic, may offer low performance in terms of final placement quality. In this paper we turn our attention to legalization in standard cell placement under the presence of obstacles, with the aim of developing a fast yet efficient solution for the problem. The proposed heuristic is based on Tetris and involves judicious chip area splitting. Experiments with ibm circuits demonstrate that the resulting scheme, called OBstacle-aware Area Splitting Tetris (OBAST), offers significant performance improvement both in terms of solution quality and running time.
A time-aware code execution continuous monitoring for safety-critical applications
The introduction of novel safety-critical applications in our day-to-day life, have increased sig... more The introduction of novel safety-critical applications in our day-to-day life, have increased significantly the requirement of developing systems that embed sophisticated mechanisms to ensure safe operation. The most challenging task is continuous monitoring to detect erroneous operation. The introduction of new safety standards has urged the need for novel design approaches towards safety operation. In this paper, a new technique to achieve continuous monitoring of code execution is proposed, ensuring both spatial (in terms of memory) and temporal constraints.
Supply Current Monitoring for Anomaly Detection on IoT Devices
This paper presents results from the correlation of the supply current of a smart device to its f... more This paper presents results from the correlation of the supply current of a smart device to its functional characteristics in order to detect a manufacturing or an operational anomaly. Awareness of the typical operation of a smart device in terms of operation and functionality, may prove valuable, since any deviation may warn for operational or functional anomaly. This is a symptomatic approach rather than an analytical approach of the cause. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. The paper offers the results from an IP camera case study that proves this assumption.
Low-Power Electroencephalographic Data Encoding System for Implantable Brain Stimulation Systems
This paper studies the Delta encoding scheme and its effect on power dissipation, for wireless tr... more This paper studies the Delta encoding scheme and its effect on power dissipation, for wireless transmission from implantable devices. The study was performed on data from electroencephalographic signals. For the implementation of the proposed system, the design approach followed three phases. The first design phase is related to the initial modelling. The second phase included the development of the hardware description code for the proposed system. The third and last phase is related to the evaluation of the transmitted signal and the measurement of the power dissipation. The results showed that up to 23% power savings are possible for a negligible power penalty due to the delta encoding process.
Efficient Small-SizedImplementation ofthe Keyed-Hash Message Authentication Code
High-Speed FPGAImplementation oftheSHA-1HashFunction
Themainapplications oftheHashfunctions liein thefields ofcommunication integrity andauthenticatio... more Themainapplications oftheHashfunctions liein thefields ofcommunication integrity andauthentication. In every communication protocol, especially inmobile protocols, ahashfunction isemployed inthesecurity layer. However, as communication protocols evolve andnewhigh-performance applications appear, thethroughput ofhashfunctions seemsto reach toalimit. Especially theSHA-1HashFunction, whichis commoninthemajority ofthewireless protocols (WAPetc.), waslimited toamaximumthroughput of2Gbps. Inthis paper, a new implementation isintroduced toexceedthislimit improving thethroughput by370without significant area penalty.
Computational Thinking in Greek Educational System for K-12: towards the future teaching approach

Monitoring Supply Current Thresholds for Smart Device's Security Enhancement
The rapid growth of connected devices and the sensitive data they generate poses a significant ch... more The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. This paper presents a study and its results from the correlation of the supply current of a smart device to its functional characteristics in order to detect a manufacturing or an operational anomaly. This concept was originated from the fact that most of the available smart devices in the market (connected to the Internet, establishing thus the so-called Internet of Things - IoT), are Application Specific devices thus having limited functionality. Issues on IoT applications, urging for solutions, are security, availability, and reliability. Awareness of the typical operation of a smart device in terms of operation and functionality may prove valuable, since any deviation may warn for an operational or functional anomaly. In this paper, the deviation (either increase or decrease) of the supply current is exploited for this reason. This work aims to affect the intrusion detection process for IoT and proposes for consideration new inputs of interest with a collateral interest of study. The results present 100% of attack detection.
Analytics, Apr 13, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Porting the Paillier Algorithm for Homomorphic Encryption on Portable Devices
2023 IEEE International Conference on Consumer Electronics (ICCE)
Electronics
Multiple Sequence Alignment (MSA) is one of the most fundamental methodologies in Bioinformatics ... more Multiple Sequence Alignment (MSA) is one of the most fundamental methodologies in Bioinformatics and the method capable of arranging DNA or protein sequences to detect regions of similarity. Even on cutting-edge workstations, the MSA procedure requires a significant amount of time regarding its execution time. This paper demonstrates how to utilize Extensa Explorer by Tensilica (Cadence) to create an extended instruction set to meet the requirements of some of the most widely used algorithms in Bioinformatics for MSA analysis. Kalign showed the highest acceleration, reducing Instruction Fetches (IF) and Execution Time (ET) by 30.29 and 43.49 percent, respectively. Clustal had acceleration of 14.2% in IF and 17.9% in ET, whereas Blast had 12.35% in IF and 16.25% in ET.
Uploads
Papers by Athanasios Kakarountas