Vulnerabilities, attack models and countermeasures through the lens of devices, circuits and systems. In this tutorial we identify key requirements for the security of IoT designs and explore the potential roles of various emerging devices in addressing them.
Swaroop Ghosh (SM'13) received the B.E. (Hons.) from IIT, Roorkee and the Ph.D. degree from Purdue University. He is an Assistant Professor at Pennsylvania State University. Earlier, he was with the faculty of University of South Florida (USF). Prior to that, he was a Senior Research and Development Engineer in Advanced Design, Intel Corp. His research interests include emerging memory technologies, hardware security, quantum computing and digital testing.
Dr. Ghosh served as Associate Editor of the IEEE Transactions On Circuits and Systems I and IEEE Transactions On Computer-Aided Design and as Senior Editorial Board member of IEEE Journal of Emerging Topics on Circuits and Systems (JETCAS). He served as Guest Editor of the IEEE JETCAS and IEEE Transactions On VLSI Systems. He has also served in the technical program committees of ACM/IEEE conferences such as, DAC, ICCAD, CICC, DATE, ISLPED, GLSVLSI, Nanoarch and ISQED. He served as Program Chair of ISQED 2019 and DAC Ph.D. Forum 2016 and track (co)-Chair of CICC 2017-2019, ISLPED 2017-2018 and ISQED 2016-2017.
Dr. Ghosh is a recipient of Intel Technology and Manufacturing Group Excellence Award in 2009, Intel Divisional Award in 2011, Intel Departmental Awards in 2011 and 2012, USF Outstanding Research Achievement Award in 2015, College of Engineering Outstanding Research Achievement Award in 2015, DARPA Young Faculty Award (YFA) in 2015, ACM SIGDA Outstanding New Faculty Award in 2016, YFA Director’s Fellowship in 2017, Monkowsky Career Development Award in 2018, Lutron Spira Teaching Excellence Award in 2018 and Dean's Cerificate of Excellence in 2019. He is a Senior member of the IEEE and the National Academy of Inventors (NAI), Associate member of Sigma Xi and Distinguished Speaker of the Association for Computing Machinery (ACM).
Cite this work
Researchers should cite this work as follows:
DRC 2020 Virtual Conference