Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








165 Hits in 6.8 sec

Review of THz-based semiconductor assurance

John True, Chengjie Xi, Nathan Jessurun, Kiarash Ahi, Navid Asadizanjani
2021 Optical Engineering: The Journal of SPIE  
Until recent hardware advances, THz systems lacked the signal quality and reliability for use as an effective nondestructive testing (NDT) method.  ...  of counterfeit pharmaceutical tablets.  ...  Hardware Threats Hardware Trojan A hardware Trojan is defined as a malicious, intentional modification of a circuit design that results in undesired behavior when the circuit is deployed. 67 However  ... 
doi:10.1117/1.oe.60.6.060901 fatcat:uycncszevvdevmznjn5soksmsm

REFICS: Assimilating Data-Driven Paradigms into Reverse Engineering and Hardware Assurance on Integrated Circuits

Ronald Wilson, Hangwei Lu, Mengdi Zhu, Domenic Forte, Damon L. Woodard
2021 IEEE Access  
His research interests include the domain of hardware security, including the investigation of hardware security primitives, hardware Trojan detection and prevention, electronics supplychain security,  ...  The primary obstacle is the negative connotation behind RE as an attack mechanism used by an adversary to illegally acquire design schematics and counterfeit IP rather than a hardware assurance tool.  ... 
doi:10.1109/access.2021.3114360 fatcat:lwwg2qgf6je7hnwdlx5yf3spqy

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security.  ...  A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

Towards a Hardware Trojan Detection Cycle

Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar Weippl
2014 2014 Ninth International Conference on Availability, Reliability and Security  
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat.  ...  However, these detection and prevention mechanisms are still hardly integrated in the industry's Hardware development life cycles.  ...  ACKNOWLEDGMENTS This work was supported by the FIT-IT program (project number 835922) and the COMET K1 program by FFG (Austrian Research Funding Agency).  ... 
doi:10.1109/ares.2014.45 dblp:conf/IEEEares/DabrowskiHUKW14 fatcat:6n7dbitosrdlthrksdgfftus5y

Hardware Trojans in Reconfigurable Computing

Qazi Arbab Ahmed
2021 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)  
A special thanks goes to my colleague cum mentor Tobias Wiersema who has been there all the time for scientific discussions in a very professional way and also his help regarding social matters in Germany  ...  I would like to meekly express my thanks to all my colleagues, friends, family, and specifically to those mentioned in the following lines.  ...  Reconfigurable hardware is made up of an array of identical re-programmable cells connected via distributed programmable interconnect structure, thus more vulnerable to attacks, such as counterfeiting  ... 
doi:10.1109/vlsi-soc53125.2021.9606974 fatcat:udwjtbtd4vdsljv64s3qgsjeey

FPIC: A Novel Semantic Dataset for Optical PCB Assurance [article]

Nathan Jessurun, Olivia P. Dizon-Paradis, Jacob Harrison, Shajib Ghosh, Mark M. Tehranipoor, Damon L. Woodard, Navid Asadizanjani
2023 arXiv   pre-print
Additionally, we outline new hardware security methodologies enabled by our data set.  ...  Outsourced printed circuit board (PCB) fabrication necessitates increased hardware assurance capabilities.  ...  Threats to PCBAs Optical assurance has been proposed for identifying counterfeit and maliciously-modified ("trojan") components and PCBAs.  ... 
arXiv:2202.08414v2 fatcat:4ptz34ektrfebp67jpwsriqbie

Interdiction in practice—Hardware Trojan against a high-security USB flash drive

Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
2016 Journal of Cryptographic Engineering  
In this paper, we demonstrate the first successful real-world FPGA hardware Trojan insertion into a commercial product.  ...  On the target device, a FIPS-140-2 level 2 certified USB flash drive from Kingston, the user data are encrypted using AES-256 in XTS mode, and the encryption/decryption is processed by an off-the-shelf  ...  Acknowledgment The authors would like to thank Kai Stawikowski and Georg T. Becker for their fruitful comments and help regarding this project.  ... 
doi:10.1007/s13389-016-0132-7 fatcat:fsqgbnddj5a43mcnlboiudej4q

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

2017 Electronics  
logic locking, and a TFET secure SAR ADC design for Trojan countermeasures are shown in Section 6.  ...  Emerging low voltage logic devices and non-volatile memories (NVMs) beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed.  ...  Shayan Taheri contributes to SAR ADC Trojan attacks and countermeasures. All authors proofread the manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics6030067 fatcat:ozssarlb2ng5pcdsupo2hljyna

Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0

Sujit Rokka Chhetri, Sina Faezi, Nafiul Rashid, Mohammad Abdullah Al Faruque
2017 Journal of Hardware and Systems Security  
However, these technologies have various security issues, and when integrated in the supply chain and the product lifecycle of manufacturing systems can pose various challenges for maintaining the security  ...  In this paper, we will present the various trends and advances in the security of the supply chain and product lifecycle of the manufacturing system while highlighting the roles played by the major enabling  ...  HARDWARE SECURITY AND MANUFACTURING SUPPLY CHAIN Hardware security can tremendously influence the security of the processing components used in the manufacturing supply chain.  ... 
doi:10.1007/s41635-017-0031-0 dblp:journals/jhss/ChhetriFRF18 fatcat:kjqonv6zvrhufcux3ou7mq54ei

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

Carina Wiesen, Stefen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
2018 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)  
, and hardware security.  ...  Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives.  ...  ., hardware Trojans and backdoors) can compromise the security of an entire system [3] .  ... 
doi:10.1109/tale.2018.8615270 dblp:conf/tale/WiesenBFAERP18 fatcat:pxrj7t5rjbbsvmrcwxuyfko5nu

Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain

Debasis Gountia
2019 EAI Endorsed Transactions on Security and Safety  
Blockchain technology is an excellent example of maintaining privacy and security (in terms of immutability).  ...  But then also we have to pertain to the scalability and security challenges in this technology for more honorable and reliable in state-of-the-art Blockchain technology.  ...  This obfuscation is able to prevent hardware Trojan attacks indirectly as attackers would not be able to insert the meaningful and stealthy hardware Trojans in such an obfuscated transaction sequences.  ... 
doi:10.4108/eai.8-4-2019.157416 fatcat:7z6rw4uxxvbzpivgol5mjevuia

Effects of Cybercrime on State Security:Types, Impact and Mitigations with the Fiber Optic Deployment In Kenya

Peterson Magutu, Gladys Ondimu, Christopher Ipu
2011 Journal of Information Assurance & Cybersecurity  
Also, to a great extent the Criminal Investigation department (CID) and Communications Commission of Kenya (CCK) have recognized that cybercrime is a growing threat to security in Nairobi and have collaborated  ...  The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment.  ...  or trojans and lastly piracy.  ... 
doi:10.5171/2011.618585 fatcat:n3djomsk4jfrzlc3osvska7gya

Drivers and barriers for secure hardware adoption across ecosystem stakeholders

Andrew Tomlinson, Simon Parkin, Siraj Ahmed Shaikh
2022 Journal of Cybersecurity  
Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed  ...  To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes  ...  The study has also benefited from a number of experts in the domain who remain anonymous.  ... 
doi:10.1093/cybsec/tyac009 fatcat:4lunpjvx6fhu5es6b2bfswlwnu

An Overview of Medical Electronic Hardware Security and Emerging Solutions

Shayan Taheri, Navid Asadizanjani
2022 Electronics  
The review outcome delivers the solutions through building and evaluating the connections among these elements in order to serve as a beneficial guideline for medical electronic hardware security.  ...  hardware-level; (3) artificial intelligence and/or computer vision in medical applications; and (4) cyber attacks and defenses in the medical domain.  ...  ), and any other medical-related entity in the world-wide network.  ... 
doi:10.3390/electronics11040610 fatcat:t2e7fnz26bc3dabxuyy7hqtjva

Secure and Trusted Application Execution on Embedded Devices [chapter]

Konstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna
2015 Lecture Notes in Computer Science  
Such an agnostic view on the security and trust of the embedded devices can be pivotal in their adoption and trust acquisition from the general public and service providers.  ...  , where they might be in the possession of an attacker.  ...  Hardware Trojans Hardware Trojans are malicious circuitry implanted in an IC.  ... 
doi:10.1007/978-3-319-27179-8_1 fatcat:qann2ltknrdgrpt4y665s5gk5u
« Previous Showing results 1 — 15 out of 165 results