throbber
GHAITH HAMMOURI
`
`(929) 240-9525
`hammouri@wpi.edu
`
`ABOUT
`
`I am a researcher, an entrepreneur, and a passionate learner. I am dedicated to expanding my knowledge
`of everything around me and to bridge the various social and scientific worlds I belong to. My field of
`expertise is information security, machine learning and cryptography. I am interested in new tools and
`algorithms that are practical enough for real applications. I have a thorough experience in research
`startups, enterprise software, software development as well as embedded systems. Over the past four
`years, I have split my time between researching deep links connecting learning theory and cryptography
`in my private capacity, and developing and deploying new generative-AI applications and algorithms
`in a consulting capacity.
`
`RESEARCH PROJECTS
`
`My general area of interest is Information Theory. My long term area of research is using low-degree
`Fourier expansions to learn from cryptographic distributions.
`
`I am currently working on exploring adversarial vulnerabilities in Large Language Models (LLM), and
`on utilizing Retrieval Augmented Generation (RAG) for Security Applications.
`
`Projects I have worked on in the past include,
`• Generative-AI for Security-Vision Applications,
`• Automating the Analysis of Legal Contracts using Machine Learning and NLP,
`• Machine Learning for Hardware Fingerprinting (CDs, Cameras,...),
`• Efficient Search in Encrypted Data (written English),
`• Application Specific Homomorphic Encryption,
`• Cryptographic Primitives using Physical Variables,
`• Theoretically Secure Physically Unclonable Functions (PUFs),
`• Secure and Efficient DNA Pattern Matching.
`
`EDUCATION
`
`Worcester Polytechnic Institute (WPI)
`Degree: Ph.D in Computer Engineering
`Advisor: Professor Berk Sunar
`Thesis Title: “Cryptographic Primitives from Physical Variables”
`
`June 2004- June 2009
`
`University of Hartford
`Degree: Masters of Science in Electrical Engineering
`Thesis Title: “A Reconfigurable Implementation of the AES and RSA Algorithms, with Application to
`Serial Networks”
`
`September 2003- May 2004
`
`University of Hartford
`Degree: Bachelor of Science in Electrical Engineering
`Second Major: Physics, Minor: Math. (Overall GPA: 3.93/4.00)
`
`September 1999- May 2003
`
`Petitioner, EX1003
`IPR2024-01234
`Hugging Face, Inc., v. FriendliAI Inc.
`
`

`

`FUNDING
`• NSF Small Business Innovation Research Grant (#1721622), 7/2017-6/2018. “Using Machine
`Learning and NLP Tools to Expedite the Review and Analysis of Legal Contracts.” Amount:
`$225,000
`• NSF Small Business Innovation Research Grant (#1013651), 7/2010-1/2011. “Fingerprinting
`Smart-Phones for Strong Authentication.” Amount: $150,000
`• NSF Cybertrust (#CNS-0831416), 08/2008-08/2010. “Exploring Physical Functions for Lightweight
`and Robust Cryptography.” I came up with the idea and co-wrote the application for this grant.
`The application was submitted under the name of my Ph.D advisor as I was still a graduate
`student. Amount: $149,900.
`
`PROFESSIONAL EXPERIENCE
`
`Worcester Polytechnic Institute
`October 2023 - Present
`Affiliate Research Scientist
`Worcester, MA
`· I collaborate with the CHIPS group at WPI on various research projects. Currently, we are working
`on exploring adversarial vulnerabilities in LLMs.
`
`Simtix
`September 2020 - Present
`Partner and Consultant-CEO
`Amman, Jordan
`· I lead the development of an in-house ANPR engine that utilizes Transformer technology to translate
`images into verbal information. Currently, Simtix ANPR engine achieves state-of-the-art identification
`with the ability to expand functionality far beyond other engines. Simtix is currently in negotiations
`to train and deploy our ANPR engine in collaboration with one of our major customers.
`· We entered into a joint-venture agreement to expand Simtix technology to be developed, sold and
`deployed in the country of Qatar.
`
`Xr.AI, Inc.
`January 2017 - 2020
`Chief Scientific Officer
`Brooklyn, NY
`· I co-founded this company and focused on creating a Machine-Learning legal-engine to automate the
`processing and review of legal documents especially legal contracts.
`· I was the PI on a grant awarded by the National Science Foundation to support our research and
`development efforts.
`· We created Amikai, a software product targeting lawyers and offering legal contract analysis features
`built on our legal-engine technology.
`
`Simtix
`September 2012 - 2016
`CEO
`Amman, Jordan
`· I was hired as a last attempt to save a security company that had been loosing money for eight years.
`· I entered into an agreement with the owners of the company in which myself and partner took over the
`full ownership of Simtix.
`· Within the first year we stabilized the company, delivered pending projects, and re-structured the
`company to cut costs.
`· We identified the company’s strength in RFID security and vehicle identification software and immedi-
`ately focused our efforts on these areas hoping to become a leader in the Middle East market. Within
`two years, we managed to have the company’s RFID solution become the standard for the Ministry of
`Foreign Affairs (MOFA) in Saudi Arabia.
`· In 2014, we signed an exclusivity contract with one of the world’s largest license plate vendors for the
`latest technology in license plate RFID security.
`
`

`

`· In 2015, Simtix become one of 5 companies authorized to sell ANPR solutions to the Dubai-Police and
`today Simtix has about 100 deployments in the city of Dubai.
`· In 2016, Simtix became the exclusive developer and vendor for the iGate system; a Saudi Aramco gate
`automation system which merged ANPR and RFID technology. Today Simtix software and system
`runs on 40-gates within Saudi Aramco and processes more than 100,000 vehicles every day.
`· By the end of 2016, Simtix was stable enough for me to leave and focus my attention on Machine
`Learning work and research. I retained my partnership in Simtix and left my partner in charge of all
`operation.
`
`CRAGS, Inc. for Cryptographic Consulting
`June 2011 - 2017
`Partner
`Worcester, MA
`· Worked with the Turkish National Research Institution to produce various novel techniques for secure
`pattern matching and for searching within encrypted data.
`· Worked with a company (name confidential) and developed a high performance key-search engine for
`secure embedded systems.
`
`Claveo
`January 2010 - September 2012
`Founder and VP of Technology
`Worcester, MA
`· I co-founded this company, lead its research and development teams, and secured government funding
`through a $150,000 Small Business Innovation Research grant from the National Science Foundation.
`· I invented a new method which uses Machine Learning methods to generate unique hardware fingerprints
`for smart phones. I also designed several products for file locking and transaction authorization. We
`filed four utility patents as a result of this work.
`· I served in various roles at the start-up ranging from carrying out basic research and software develop-
`ment to writing business plans, proposals and patents to raising funds, managing customer relationships
`and carrying out sales presentations.
`
`Worcester Polytechnic Institute
`August 2008 - January 2010
`Post Doctoral Researcher and Research Assistant
`Worcester, MA
`· I invented a technique for fingerprinting CDs and other forms of optical media. Much of my research
`focused on using mathematical rigor to show the security of purely experimental constructions.
`· I mentored junior graduate students who joined the (CRIS) lab. I acted as their intern adviser and
`coordinated with the head of the lab. I successfully collaborated and co-authored with most of my
`senior and junior colleagues in the lab.
`
`Worcester Polytechnic Institute
`Teaching Assistant
`· I worked as a lab instructor for the embedded systems and microprocessor courses.
`· I was named as the ECE department TA of the year.
`· I was chosen to re-design the curriculum for the Microprocessor System Design lab.
`
`August 2004 - August 2008
`Worcester, MA
`
`University of Hartford
`January 2001 - May 2004
`Instructor and Teaching Assistant
`Hartford, CT
`· Starting in my sophomore year as an undergraduate and all throughout my years at the University of
`Hartford I taught more than 10 physics labs.
`· I worked as a TA for the Optics lab and the Digital Signal Processing lab.
`· I instructed 2 Algebra and one Pre-Calculus course.
`· I was also assigned to solely re-design the curriculum and experiments for the physics I and II labs, and
`to write a detailed instructor manual.
`
`

`

`Course Instructor - University of Hartford
`
`Lab Instructor - University of Hartford
`
`Lab Instructor - University of Hartford
`
`TEACHING EXPERIENCE
`• Microprocessor System Design (Spring 2005 to Fall 2007)
`Lab Instructor - WPI
`• Foundations of Embedded Computer Systems (Spring 2005 to Fall 2007) Lab Instructor - WPI
`• Pre-Calculus (Spring 2004)
`Course Instructor - University of Hartford
`• Algebra (Fall 2003, Spring 2004)
`• Digital Signal Processing (Fall 2003)
`• Optics (Spring 2002)
`• Calculus Based Physics I and II (2001 to 2004)
`
`Lab Instructor - University of Hartford
`
`CURRICULUM DEVELOPMENT
`• Microprocessor System Design - (WPI - 2008): I designed a new set of lab experiments for this
`course. This included, choosing a new processor platform, transforming the course goals into
`detailed lab experiments, and writing a detailed new instructor manual.
`• Calculus Based Physics I and II - (University of Hartford - 2002): I designed a new lab curriculum
`with new experiments for both the Physics I and II courses. I used a new set of tools and sensors
`that helped interface directly with a computer in order to better reflect the lab concepts. I also
`authored a detailed instructor manual.
`
`PROFESSIONAL ACTIVITIES
`
`I refereed papers for the following journals and conferences:
`• Annual International Conference on the Theory and Applications of Cryptographic Techniques
`(EUROCRYPT),
`• Journal of Cryptology,
`• IEEE Transactions on Information Forensics & Security,
`• Workshop on Cryptographic Hardware and Embedded Systems (CHES),
`• RSA (Cryptographic Track),
`• Design, Automation, and Test in Europe (DATE).
`
`RECOGNITION AND AWARDS
`• Featured in the Worcester Telegram and Gazette for using smart phones to simplify security (2010).
`• Awarded “ECE Teaching Assistant of the Year” at WPI (2005).
`• President of the engineering honors society (TBP) chapter at the University of Hartford (2002-
`2003).
`• Awarded the Regents award for the senior graduating with the highest GPA in the college of
`Engineering (2003).
`• Chosen as one of Mass-High-Tech’s Whiz kids of the year (2003).
`• Awarded the Belle Ribicoff Scholarship given to one graduating senior based on academic excellence
`and leadership roles (2002).
`• Awarded the physics memorial award and the physical book award for a physics student displaying
`academic excellence (2002).
`
`

`

`• Awarded a full scholarship covering tuition and board for my BSc and MSc degrees from the
`University of Hartford (1999-2004).
`• Admitted to the Jubilee School which annually chooses 80 students with the highest IQ in Jordan
`(1996-1999).
`
`PATENTS
`
`1. Ghaith Hammouri, Berk Sunar, Cetin Koc, Kahraman Akdemir, Computing-System Identifier
`Using Software Extraction and Manufacturing Variability. Patent number US/8694687, July 16,
`2010. (Granted)
`
`2. Ghaith Hammouri, Berk Sunar, Cetin Koc, Mobile Phone Aided Operations System and Method.
`Patent number US/8842827, July 16, 2010. (Granted)
`
`3. Matt Hubert, Cody Walker, Carl Minden, Ghaith Hammouri, Systems and Methods for Authoriz-
`ing Transactions Via a Digital Device. Patent number US/10013692, July 3, 2018. (Granted)
`
`4. Berk Sunar, Ghaith Hammouri, Aykutlu Dana, Method and Apparatus for Fingerprinting and
`Copy Protecting Optical Recording Media. Patent application number US 12/831,518, July 07,
`2010.
`
`PUBLISHED PAPERS
`
`1. Ghaith Hammouri, Berk Sunar, Generating Unique Identifiers for Smartphones Using Software.
`Electronics Letters, vol.50, no.13, pp.938-939, (June 2014).
`
`2. Yarkin Doroz, Berk Sunar, and Ghaith Hammouri, Bandwidth Efficient PIR from NTRU. Work-
`shop on Applied Homomorphic Cryptography and Encrypted Computing - WAHC 2014. Springer,
`(2014).
`
`3. Chenguang Yang, Ghaith Hammouri, Berk Sunar, Voice Passwords Revisited, In: International
`Conference on Security and Cryptography (Secrypt 2012).
`
`4. (Book Chapter) Ghaith Hammouri, Aykutlu Dana, Berk Sunar, License Distribution Protocols
`from Optical Media Fingerprints, In Towards Hardware-Intrinsic Security, David Basin, Ueli Mau-
`rer, Ahmad-Reza and Sadeghi and David Naccache (eds.), Springer, (2010).
`
`5. Kahraman Akdemir, Ghaith Hammouri, Berk Sunar, Non-linear Error Detection for Finite State
`Machines. In: Youm, H. Y., Yung, M., (eds.) Proceedings of the 10th International Workshop on
`Information Security Applications (WISA 2009), LNCS, vol. 5932, pp. 226-238, Springer-Verlag,
`Heidelberg, Germany, (2009).
`
`6. Ghaith Hammouri, Aykutlu Dana, Berk Sunar, CDs Have Fingerprints Too. In: Clavier, C., Gaj,
`K., (eds.) Proceedings of the 11th Workshop on Cryptographic Hardware and Embedded Systems
`(CHES 2009), LNCS, vol. 5747, pp. 348-362, Springer-Verlag, Heidelberg, Germany, (2009).
`
`7. Ghaith Hammouri, Kahraman Akdemir, Berk Sunar, Novel PUF-Based Error Detection Methods
`in Finite State Machines. In: Lee, P.J., Cheon, J.H., (eds.) Proceedings of the 11th International
`Conference on Information Security and Cryptology (ICISC 2008), LNCS, vol. 5461, pp. 235-252,
`Springer-Verlag, Heidelberg, Germany (2008).
`
`8. Yin Hu, Ghaith Hammouri, Berk Sunar, A Fast Real-time Memory Authentication Protocol. In:
`Xu, S., Nita-Rotaru, C., Seifert, J.P., (eds.) Proceedings of the 3rd ACM Workshop on Scalable
`Trusted Computing (STC 2008), pp. 31-40, ACM, New York, NY, USA (2008).
`
`9. Ghaith Hammouri, Erdinc Ozturk, Berk Birand, Berk Sunar, Unclonable Lightweight Authentica-
`tion Scheme. In: Chen, L., Ryan, M.D., Wang, G., (eds.) Proceedings of the 10th International
`
`

`

`Conference on Information and Communications Security (ICICS 2008), LNCS, vol. 5308, pp.
`33-48, Springer-Verlag, Heidelberg, Germany (2008).
`
`10. Ghaith Hammouri, Erdinc Ozturk, Berk Sunar, A Tamper-Proof and Lightweight Authentication
`Scheme. Pervasive and Mobile Computing, 4(6), pp. 807-818, (2008).
`
`11. Ghaith Hammouri, Berk Sunar, PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
`In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M., (eds.) Proceedings of the 6th
`International Conference on Applied Cryptography and Network Security (ACNS 2008), LNCS,
`vol. 5037, pp. 346-365, Springer-Verlag, Heidelberg, Germany (2008).
`
`12. Erdinc Ozturk, Ghaith Hammouri, Berk Sunar, Physical Unclonable Function with Tristate Buffers.
`In: Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 18-21
`May 2008, Seattle, Washington, USA, pp. 3194-3197, IEEE, Washington, DC, USA (2008).
`
`13. Erdinc Ozturk, Ghaith Hammouri, Berk Sunar, Towards Robust Low Cost Authentication for
`Pervasive Devices. In: Proceedings of the Sixth Annual IEEE International Conference (PerCom
`2008), 17- 21March 2008, Hong Kong, pp. 170-178, IEEE Computer Society, Los Alamitos, CA,
`USA (2008).
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket