-
W61 - Applications of Embedded, High-Resolution On-Chip Instrumentation for Hardware Security and Trust
Online Presentations | 27 Sep 2024 | Contributor(s):: Jim Plusquellic
In this talk, I describe several novel hardware security primitives, called physical unclonable functions (PUFs), which leverage EI to obtain high-resolution path delays and voltage drops, as well as techniques that calibrate for adverse environmental effects and undesirable sources of process...
-
W52 - Security of Quantum Computer Architectures and Hardware
Online Presentations | 20 Sep 2024 | Contributor(s):: Jakub S.
The focus of the seminar will be on superconducting qubit quantum computers, however, the security ideas can be applied to other types of quantum computers....
-
W10 - Panel Discussion: State of the Microelectronics Design and Security
Online Presentations | 11 Sep 2024 | Contributor(s):: Matthew Casto, Greg Creech, Serge Leef
This panel intends to keep the microelectronics design and security community up to date on the status of existing initiatives, new initiatives, and discuss new ideas to pursue collaboration between government, industry, and academia both in research and workforce development.
-
W29 - Practical Security SoC Design Considerations: Making the Transition from the Lab to the Fab
Online Presentations | 11 Sep 2024 | Contributor(s):: Mike Borza
Participants in this presentation should gain an understanding of some of the challenges and solution approaches to developing secure IC products for volume manufacturing.
-
W19 - Side Channel
Online Presentations | 11 Sep 2024 | Contributor(s):: Katie Liszewski
We present an introduction to side channel analysis and interactive tutorial. The lecture starts with a light introduction to cryptographic implementations and leakage models. We then discuss basic experimental setup for power analysis and contrast power and EM ...
-
W14 - Machine Learning in Silicon Data Analytics
Online Presentations | 11 Sep 2024 | Contributor(s):: Li-C Wang
This presentation discusses the key ideas for implementing such an end-to-end data analytics solution, and demonstrates its usage in silicon data analytics based on data from actual semiconductor chip product lines.
-
W15 - Blockchain for Electronic Supply Chain, Part II
Online Presentations | 11 Sep 2024 | Contributor(s):: Jason Vosatka
The goal of this webinar is to learn and understand how to protect the electronics supply chain through trustworthy tracking and non-destructive verification of electronic components. Details of establishing a consortium-style blockchain infrastructure are covered ...
-
W05 - Hardware Security Verification Using Formal Methods
Online Presentations | 11 Sep 2024 | Contributor(s):: Prabhat Mishra
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...
-
W16 - Asynchronous Circuit Design for Reliability and Security
Online Presentations | 11 Sep 2024 | Contributor(s):: Jia Di
Invented back in 1950’s, asynchronous circuits have not been developing nearly as fast as their clocked, synchronous counterparts. While the synchronous design paradigm dominates the current digital IC market, there are many applications for which asynchronous circuits have unmatched...
-
W17 - A New Approach to Measure Hardware Security Coverage
Online Presentations | 11 Sep 2024 | Contributor(s):: Jason Oberg
This presentation will describe important industry initiatives supported by MITRE that can be effectively leveraged for measuring security coverage against common hardware weaknesses. Additionally, it will discuss innovative technical solutions that allow ...
-
W18 - Side-Channel Leakage Assessment of Cryptographic Modules
Online Presentations | 11 Sep 2024 | Contributor(s):: Jungmin Park
In this talk, Dr. Park will introduce how to analyze and quantify side-channel leakage information at various design stages such as RTL, gate level and post-silicon level. Based on these analysis, most vulnerable modules will be searched and replaced with secure modules.
-
W22 - Logic Locking for Chip Design Protection: Lessons Learnt, Metrics, and Trade-offs
Online Presentations | 11 Sep 2024 | Contributor(s):: Ozgur Sinanoglu
This presentation elaborates on the threats such as reverse engineering, piracy and IC overbuilding that the chip design industry is up against, while describing a design-for-trust solution that has been developed over the last decade, called logic locking, to protect chip designs from these...
-
W20 - Counterfeit Detection: Electrical/Logical Test Techniques
Online Presentations | 11 Sep 2024 | Contributor(s):: Dominic Forte
In this presentation, we will cover (i) Counterfeit electronic part sources and motivation; (ii) Counterfeit IC type, defect, and detection taxonomies; (iii) Basic parametric/functional tests; (iv) More advanced detection approaches that target counterfeit processors, memories, and FPGAs; ...
-
W21 - Closing Information Leakage Channels in Microarchitecture
Online Presentations | 11 Sep 2024 | Contributor(s):: Guru Venkataramani
In this talk, we will first visit the fundamental problems surrounding sensitive information leakage that dominate security research landscape and has the potential to hamper upcoming applications. More recently, timing channels have emerged ...
-
W04 - Physical Assurance and Inspection of Electronics
Online Presentations | 11 Sep 2024 | Contributor(s):: Navid Asadi=Zanjani
This talk will focus on the state-of-the-art physical inspection/assurance methods, the existing countermeasures, related challenges to develop new countermeasures and a research roadmap for this emerging field.
-
W26 - Integrated Circuit Design Redaction through Transistor-Level Programming
Online Presentations | 11 Sep 2024 | Contributor(s):: Yiorgos Makris
In this presentation we will discuss the design of the latest version of our TRAP fabric, the CAD tool-flow necessary for supporting such hybrid designs ASIC/Programmable ICs, and the protection that TRAP-based design redaction offers against both brute-force and intelligent attacks seeking to...
-
W27 - Contactless Optical Probing on Integrated Circuits
Online Presentations | 11 Sep 2024 | Contributor(s):: Navid Asadi=Zanjani
In this presentation we will assess the security vulnerabilities in modern integrated circuits (ICs) against contactless optical probing. The basics and the principle of optical probing physics and its various modalities will be presented first. A case study will be presented then using the...
-
W28 - SPARTA-COTS A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits
Online Presentations | 11 Sep 2024 | Contributor(s):: Andrew Stern
Your feedback matters! Help us gain a better understanding of your learning experience. We invite you to complete the following 3-question survey prior to watching this webinar, and complete the following short survey after watching. Thank you.To see the schedule for upcoming live webinars please...
-
W25 - Machine Learning on Encrypted Data: Hardware to the Rescue
Online Presentations | 11 Sep 2024 | Contributor(s):: Farinaz Koushanfar
This talk highlights the crucial role of hardware and advances in computing architecture in supporting the recent progresses in the field. I outline the main technologies and mixed computing models. I particularly center my talk on the recent progress in synthesis of Garbled Circuits ...
-
W08 - Blockchain for Electronics Supply Chain Integrity. Part I
Online Presentations | 10 Sep 2024 | Contributor(s):: Fahim Rahman
The goal of this presentation is to understand and learn threats and vulnerabilities introduced in current electronic supply chain; emerging blockchain and distributed ledger framework targeted for data integrity, techniques for developing blockchain-based framework ...