What's New: Past Month

Online Presentations feed

  1. W08 - Blockchain for Electronics Supply Chain Integrity. Part I

    Online Presentations | 10 Sep 2024 | Contributor(s):: Fahim Rahman

    The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...

  2. W09 - Security and Forensics in the IoT Era: From Reverse Engineering to HoneyIoT

    Online Presentations | 10 Sep 2024 | Contributor(s):: Yier Jin

    This presentation will first introduce the emerging security and privacy challenges in the IoT domain. Then focus on the bottom-up solutions on IoT protection and will present our recent research effort in microarchitecture supported IoT runtime attack detection and device attestation. ...

  3. W11 - Computer Vision for HW Security

    Online Presentations | 10 Sep 2024 | Contributor(s):: Damon Woodard

    This presentation will first provide an overview of computer vision and conventional methods that have been applied to hardware security problems. Also, a detailed discussion of two examples of computer vision-enabled hardware security applications, automated hardware trojan detection ...

  4. W13 - System-Level Design of Secured System-on-Chips

    Online Presentations | 10 Sep 2024 | Contributor(s):: Christophe Bobda

    This presentation addresses system-level-design of secured system-on-chips through a tighter integration of user-specified security requirements and objectives in the hardware/software design process.  ...

  5. W03 - Introduction to Hardware Obfuscation

    Online Presentations | 10 Sep 2024 | Contributor(s):: Dominic Forte

    In this presentation, the following topics will be covered: (1) Overview of the IC design flow and threat models; (2) Summary of naïve protection approaches and their limitations; (3) Introduction to hardware obfuscation variants, applications/use cases, popular metrics, and other...

  6. W06 - Why CAD/Automation is Needed for HW Security

    Online Presentations | 10 Sep 2024 | Contributor(s):: Farimah Farahmandi

    The goal of this webinar is to present vulnerabilities introduced during various stages of design life-cycle, CAD tools and methodologies for security assessment and detecting security vulnerabilities, countermeasure tools and methodologies ...

  7. W07 - Architecture Level Vulnerabilities

    Online Presentations | 10 Sep 2024 | Contributor(s):: Radu Teodorescu

    This presentation introduces the newly discovered transient execution attacks that exploit various forms of speculation employed in modern processors. We discuss the architectural design features that have enabled these attacks, outline some of the software patches ...

  8. NUCL 200 Lecture 02: Basic Atomic Definitions

    Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner

    Topics:IsotopesAtomic weightMolecular weightAtomic number densitiesEnergy and massRest mass

  9. NUCL 200 Lecture 05B: In Class Problems (Solutions)

    Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner

    Problem statements can be found in part 1 of this lecture at <a href="/resources/40024">NUCL 200 Lecture 05A: In Class Problems</a>.

  10. NUCL 200 Lecture 06: Nuclear Reaction and Binding Energy

    Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner

    Topics:Multiple step radioactive decayFundamental conservation laws of nuclear reactionsQ-valueMass defectBinding energyBinding energy/nucleon and reactionsSeparation energyMagic numbers

  11. NUCL 200 Lecture 05A: In Class Problems

    Online Presentations | 08 Sep 2024 | Contributor(s):: Allen Garner

    Topics:Maxwellian Distribution CalculationNuclear density calculationMultiple step radioactive decaySolutions to these problems can be found in the second part of this lecture NUCL 200 Lecture 05B: In Class Problems (Solutions).

  12. W35 - Recent Advances in Electro-Magnetic Hardware Security and Physical-layer Generic Countermeasures

    Online Presentations | 04 Sep 2024 | Contributor(s):: Shreyas Sen

    In this talk, we will cover the following topics in EM/Power Side-Channel Attacks and Countermeasures (a) Threats and impacts of physical side-channels (b) In-depth analysis of power side-channel and low-overhead generic power-side channel countermeasure through attenuated signature noise...

  13. W36 - Hardware Based Attacks and Solutions on Proprietary Deep Learning Models

    Online Presentations | 04 Sep 2024 | Contributor(s):: Ankur Srivastava

    Deep learning (DL) algorithms are extensively used for analyzing big data in several domains including image classification, natural language processing, autonomous transportation, smart health, financial management, social networks, etc..

  14. W37 - Towards Resilient Approaches for Detecting Recycled ICs

    Online Presentations | 04 Sep 2024 | Contributor(s):: Ujjwal Guin

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you. The recycling of integrated circuits (ICs) has...

  15. W38 - Interview: Dr. Wally Rhines (Cornami, Inc.)

    Online Presentations | 04 Sep 2024 | Contributor(s):: Wally Rhines

    Dr. Mark Tehranipoor, Director of FICS Research at the University of Florida, sits down virtually with Dr. Wally Rhines, CEO of Cornami, to have a chat about popular topics in the semiconductor industry and hardware security.

  16. W39 - Interview: Serge Leef (DARPA)

    Online Presentations | 04 Sep 2024 | Contributor(s):: Serge Leef

    Serge Leef, Design Automation and Hardware Security Program Manager at DARPA, talks to Dr. Mark Tehranipoor, Director of FICS Research, about microelectronics security.

  17. W40 - Toward Agile and Open Electronic Design Automation

    Online Presentations | 04 Sep 2024 | Contributor(s):: David Pan

    This talk will present some recent trends and efforts toward agile and open electronic design automation (EDA), in particular leveraging AI/machine learning with domain-specific customizations. I will first show how we leverage deep learning hardware and software to develop an open-source VLSI...

  18. W42 - Security Attacks and Defenses of the Micro-Op Cache and the Processor Frontend

    Online Presentations | 04 Sep 2024 | Contributor(s):: Jakub S., Shuwen Deng

    This seminar aims to give an up-to-date and concise introduction to the processor frontend and the security issues it brings about. The root causes of the security threats are the multiple paths in the processor frontend that the micro-ops can take while being decoded: through the MITE, DSB ....

  19. W43 - Efficient and Reliable Deep Learning at Scale: Hardware and Software

    Online Presentations | 04 Sep 2024 | Contributor(s):: Yiran Chen

    This talk discusses the importance of hardware/software co-design in the development of AI computing systems. We first use resistive memory based Neural Network (NN) accelerators to illustrate the design philosophy of heterogeneous AI computing systems, and then present several...

  20. W30 - Thinking of Logic Locking? Be Aware of the Existing Attacks!

    Online Presentations | 04 Sep 2024 | Contributor(s):: Avesta Sasan

    In this presentation, we will review many of these attacks and discuss the state of the art attacks that logic encryption solutions have to resist. The goal of this talk is to raise awareness about the capabilities of adversaries and existing solutions for attacking and decrypting logic...