-
W08 - Blockchain for Electronics Supply Chain Integrity. Part I
Online Presentations | 10 Sep 2024 | Contributor(s):: Fahim Rahman
The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...
-
W09 - Security and Forensics in the IoT Era: From Reverse Engineering to HoneyIoT
Online Presentations | 10 Sep 2024 | Contributor(s):: Yier Jin
This presentation will first introduce the emerging security and privacy challenges in the IoT domain. Then focus on the bottom-up solutions on IoT protection and will present our recent research effort in microarchitecture supported IoT runtime attack detection and device attestation. ...
-
W11 - Computer Vision for HW Security
Online Presentations | 10 Sep 2024 | Contributor(s):: Damon Woodard
This presentation will first provide an overview of computer vision and conventional methods that have been applied to hardware security problems. Also, a detailed discussion of two examples of computer vision-enabled hardware security applications, automated hardware trojan detection ...
-
W13 - System-Level Design of Secured System-on-Chips
Online Presentations | 10 Sep 2024 | Contributor(s):: Christophe Bobda
This presentation addresses system-level-design of secured system-on-chips through a tighter integration of user-specified security requirements and objectives in the hardware/software design process. ...
-
W03 - Introduction to Hardware Obfuscation
Online Presentations | 10 Sep 2024 | Contributor(s):: Dominic Forte
In this presentation, the following topics will be covered: (1) Overview of the IC design flow and threat models; (2) Summary of naïve protection approaches and their limitations; (3) Introduction to hardware obfuscation variants, applications/use cases, popular metrics, and other...
-
W06 - Why CAD/Automation is Needed for HW Security
Online Presentations | 10 Sep 2024 | Contributor(s):: Farimah Farahmandi
The goal of this webinar is to present vulnerabilities introduced during various stages of design life-cycle, CAD tools and methodologies for security assessment and detecting security vulnerabilities, countermeasure tools and methodologies ...
-
W07 - Architecture Level Vulnerabilities
Online Presentations | 10 Sep 2024 | Contributor(s):: Radu Teodorescu
This presentation introduces the newly discovered transient execution attacks that exploit various forms of speculation employed in modern processors. We discuss the architectural design features that have enabled these attacks, outline some of the software patches ...
-
NUCL 200 Lecture 02: Basic Atomic Definitions
Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner
Topics:IsotopesAtomic weightMolecular weightAtomic number densitiesEnergy and massRest mass
-
NUCL 200 Lecture 05B: In Class Problems (Solutions)
Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner
Problem statements can be found in part 1 of this lecture at <a href="/resources/40024">NUCL 200 Lecture 05A: In Class Problems</a>.
-
NUCL 200 Lecture 06: Nuclear Reaction and Binding Energy
Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner
Topics:Multiple step radioactive decayFundamental conservation laws of nuclear reactionsQ-valueMass defectBinding energyBinding energy/nucleon and reactionsSeparation energyMagic numbers
-
NUCL 200 Lecture 05A: In Class Problems
Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner
Topics:Maxwellian Distribution CalculationNuclear density calculationMultiple step radioactive decaySolutions to these problems can be found in the second part of this lecture NUCL 200 Lecture 05B: In Class Problems (Solutions).
-
W35 - Recent Advances in Electro-Magnetic Hardware Security and Physical-layer Generic Countermeasures
Online Presentations | 04 Sep 2024 | Contributor(s):: Shreyas Sen
In this talk, we will cover the following topics in EM/Power Side-Channel Attacks and Countermeasures (a) Threats and impacts of physical side-channels (b) In-depth analysis of power side-channel and low-overhead generic power-side channel countermeasure through attenuated signature noise...
-
W36 - Hardware Based Attacks and Solutions on Proprietary Deep Learning Models
Online Presentations | 04 Sep 2024 | Contributor(s):: Ankur Srivastava
Deep learning (DL) algorithms are extensively used for analyzing big data in several domains including image classification, natural language processing, autonomous transportation, smart health, financial management, social networks, etc..
-
W37 - Towards Resilient Approaches for Detecting Recycled ICs
Online Presentations | 04 Sep 2024 | Contributor(s):: Ujjwal Guin
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you. The recycling of integrated circuits (ICs) has...
-
W38 - Interview: Dr. Wally Rhines (Cornami, Inc.)
Online Presentations | 04 Sep 2024 | Contributor(s):: Wally Rhines
Dr. Mark Tehranipoor, Director of FICS Research at the University of Florida, sits down virtually with Dr. Wally Rhines, CEO of Cornami, to have a chat about popular topics in the semiconductor industry and hardware security.
-
W39 - Interview: Serge Leef (DARPA)
Online Presentations | 04 Sep 2024 | Contributor(s):: Serge Leef
Serge Leef, Design Automation and Hardware Security Program Manager at DARPA, talks to Dr. Mark Tehranipoor, Director of FICS Research, about microelectronics security.
-
W40 - Toward Agile and Open Electronic Design Automation
Online Presentations | 04 Sep 2024 | Contributor(s):: David Pan
This talk will present some recent trends and efforts toward agile and open electronic design automation (EDA), in particular leveraging AI/machine learning with domain-specific customizations. I will first show how we leverage deep learning hardware and software to develop an open-source VLSI...
-
W42 - Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend
Online Presentations | 04 Sep 2024 | Contributor(s):: Jakub S., Shuwen Deng
This seminar aims to give an up-to-date and concise introduction to the processor frontend and the security issues it brings about. The root causes of the security threats are the multiple paths in the processor frontend that the micro-ops can take while being decoded: through the MITE, DSB ....
-
W43 - Efficient and Reliable Deep Learning at Scale: Hardware and Software
Online Presentations | 04 Sep 2024 | Contributor(s):: Yiran Chen
This talk discusses the importance of hardware/software co-design in the development of AI computing systems. We first use resistive memory based Neural Network (NN) accelerators to illustrate the design philosophy of heterogeneous AI computing systems, and then present several...
-
W30 - Thinking of Logic Locking? Be Aware of the Existing Attacks!
Online Presentations | 04 Sep 2024 | Contributor(s):: Avesta Sasan
In this presentation, we will review many of these attacks and discuss the state of the art attacks that logic encryption solutions have to resist. The goal of this talk is to raise awareness about the capabilities of adversaries and existing solutions for attacking and decrypting logic...