Tags: MEST

All Categories (1-20 of 61)

  1. W61 - Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust

    Online Presentations | 27 Sep 2024 | Contributor(s):: Jim Plusquellic

    In this talk, I describe several novel hardware security primitives, called physical unclonable functions (PUFs), which leverage EI to obtain high-resolution path delays and voltage drops, as well as techniques that calibrate for adverse environmental effects and undesirable sources of process...

  2. W52 - Security of Quantum Computer Architectures and Hardware

    Online Presentations | 20 Sep 2024 | Contributor(s):: Jakub S.

    The focus of the seminar will be on superconducting qubit quantum computers, however, the security ideas can be applied to other types of quantum computers....

  3. W10 - Panel Discussion: State of the Microelectronics Design and Security

    Online Presentations | 11 Sep 2024 | Contributor(s):: Matthew Casto, Greg Creech, Serge Leef

    This panel intends to keep the microelectronics design and security community up to date on the status of existing initiatives, new initiatives, and discuss new ideas to pursue collaboration between government, industry, and academia both in research and workforce development.

  4. W29 - Practical Security SoC Design Considerations: Making the Transition from the Lab to the Fab

    Online Presentations | 11 Sep 2024 | Contributor(s):: Mike Borza

    Participants in this presentation should gain an understanding of some of the challenges and solution approaches to developing secure IC products for volume manufacturing.

  5. W19 - Side Channel

    Online Presentations | 11 Sep 2024 | Contributor(s):: Katie Liszewski

    We present an introduction to side channel analysis and interactive tutorial. The lecture starts with a light introduction to cryptographic implementations and leakage models. We then discuss basic experimental setup for power analysis and contrast power and EM ...

  6. W14 - Machine Learning in Silicon Data Analytics

    Online Presentations | 11 Sep 2024 | Contributor(s):: Li-C Wang

    This presentation discusses the key ideas for implementing such an end-to-end data analytics solution, and demonstrates its usage in silicon data analytics based on data from actual semiconductor chip product lines.

  7. W15 - Blockchain for Electronic Supply Chain, Part II

    Online Presentations | 11 Sep 2024 | Contributor(s):: Jason Vosatka

    The goal of this webinar is to learn and understand how to protect the electronics supply chain through trustworthy tracking and non-destructive verification of electronic components.  Details of establishing a consortium-style blockchain infrastructure are covered ...

  8. W05 - Hardware Security Verification Using Formal Methods

    Online Presentations | 11 Sep 2024 | Contributor(s):: Prabhat Mishra

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...

  9. W16 - Asynchronous Circuit Design for Reliability and Security

    Online Presentations | 11 Sep 2024 | Contributor(s):: Jia Di

    Invented back in 1950’s, asynchronous circuits have not been developing nearly as fast as their clocked, synchronous counterparts. While the synchronous design paradigm dominates the current digital IC market, there are many applications for which asynchronous circuits have unmatched...

  10. W17 - A New Approach to Measure Hardware Security Coverage

    Online Presentations | 11 Sep 2024 | Contributor(s):: Jason Oberg

    This presentation will describe important industry initiatives supported by MITRE that can be effectively leveraged for measuring security coverage against common hardware weaknesses. Additionally, it will discuss innovative technical solutions that allow ...

  11. W18 - Side-Channel Leakage Assessment of Cryptographic Modules

    Online Presentations | 11 Sep 2024 | Contributor(s):: Jungmin Park

    In this talk, Dr. Park will introduce how to analyze and quantify side-channel leakage information at various design stages such as RTL, gate level and post-silicon level. Based on these analysis, most vulnerable modules will be searched and replaced with secure modules.

  12. W22 - Logic Locking for Chip Design Protection: Lessons Learnt, Metrics, and Trade-offs

    Online Presentations | 11 Sep 2024 | Contributor(s):: Ozgur Sinanoglu

    This presentation elaborates on the threats such as reverse engineering, piracy and IC overbuilding that the chip design industry is up against, while describing a design-for-trust solution that has been developed over the last decade, called logic locking, to protect chip designs from these...

  13. W20 - Counterfeit Detection: Electrical/Logical Test Techniques

    Online Presentations | 11 Sep 2024 | Contributor(s):: Dominic Forte

    In this presentation, we will cover (i) Counterfeit electronic part sources and motivation; (ii) Counterfeit IC type, defect, and detection taxonomies; (iii) Basic parametric/functional tests; (iv) More advanced detection approaches that target counterfeit processors, memories, and FPGAs; ...

  14. W21 - Closing Information Leakage Channels in Microarchitecture

    Online Presentations | 11 Sep 2024 | Contributor(s):: Guru Venkataramani

    In this talk, we will first visit the fundamental problems surrounding sensitive information leakage that dominate security research landscape and has the potential to hamper upcoming applications. More recently, timing channels have emerged ...

  15. W04 - Physical Assurance and Inspection of Electronics

    Online Presentations | 11 Sep 2024 | Contributor(s):: Navid Asadi=Zanjani

    This talk will focus on the state-of-the-art physical inspection/assurance methods, the existing countermeasures, related challenges to develop new countermeasures and a research roadmap for this emerging field.

  16. W26 - Integrated Circuit Design Redaction through Transistor-Level Programming

    Online Presentations | 11 Sep 2024 | Contributor(s):: Yiorgos Makris

    In this presentation we will discuss the design of the latest version of our TRAP fabric, the CAD tool-flow necessary for supporting such hybrid designs ASIC/Programmable ICs, and the protection that TRAP-based design redaction offers against both brute-force and intelligent attacks seeking to...

  17. W27 - Contactless Optical Probing on Integrated Circuits

    Online Presentations | 11 Sep 2024 | Contributor(s):: Navid Asadi=Zanjani

    In this presentation we will assess the security vulnerabilities in modern integrated circuits (ICs) against contactless optical probing. The basics and the principle of optical probing physics and its various modalities will be presented first. A case study will be presented then using the...

  18. W28 - SPARTA-COTS A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits

    Online Presentations | 11 Sep 2024 | Contributor(s):: Andrew Stern

    Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...

  19. W25 - Machine Learning on Encrypted Data: Hardware to the Rescue

    Online Presentations | 11 Sep 2024 | Contributor(s):: Farinaz Koushanfar

    This talk highlights the crucial role of hardware and advances in computing architecture in supporting the recent progresses in the field. I outline the main technologies and mixed computing models. I particularly center my talk on the recent progress in synthesis of Garbled Circuits ...

  20. W08 - Blockchain for Electronics Supply Chain Integrity. Part I

    Online Presentations | 10 Sep 2024 | Contributor(s):: Fahim Rahman

    The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...