20,603 research outputs found

    A Survey on Integrated Circuit Trojans

    Get PDF
    Traditionally, computer security has been associated with the software security, or the information-data security. Surprisingly, the hardware on which the software executes or the information stored-processed-transmitted has been assumed to be a trusted base of security. The main building blocks of any electronic device are Integrated circuits (ICs) which form the fabric of a computer system. Lately, the use of ICs has expanded from handheld calculators and personal computers (PCs) to smartphones, servers, and Internet-of-Things (IoT) devices. However, this significant growth in the IC market created intense competition among IC vendors, leading to new trends in IC manufacturing. System-on-chip (SoC) design based on intellectual property (IP), a globally spread supply chain of production and distribution of ICs are the foremost of these trends. The emerging trends have resulted in many security and trust weaknesses and vulnerabilities, in computer systems. This includes Hardware Trojans attacks, side-channel attacks, Reverse-engineering, IP piracy, IC counterfeiting, micro probing, physical tampering, and acquisition of private or valuable assets by debugging and testing. IC security and trust vulnerabilities may cause loss of private information, modified/altered functions, which may cause a great economical hazard and big damage to society. Thus, it is crucial to examine the security and trust threats existing in the IC lifecycle and build defense mechanisms against IC Trojan threats. In this article, we examine the IC supply chain and define the possible IC Trojan threats for the parties involved. Then we survey the latest progress of research in the area of countermeasures against the IC Trojan attacks and discuss the challenges and expectations in this area. Keywords: IC supply chain, IC security, IP privacy, hardware trojans, IC trojans DOI: 10.7176/CEIS/12-2-01 Publication date: April 30th 202

    3D Integration: Another Dimension Toward Hardware Security

    Full text link
    We review threats and selected schemes concerning hardware security at design and manufacturing time as well as at runtime. We find that 3D integration can serve well to enhance the resilience of different hardware security schemes, but it also requires thoughtful use of the options provided by the umbrella term of 3D integration. Toward enforcing security at runtime, we envision secure 2.5D system-level integration of untrusted chips and "all around" shielding for 3D ICs.Comment: IEEE IOLTS 201

    DNA barcoding as a molecular tool to track down mislabeling and food piracy

    Get PDF
    DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes. Although these sequences represent a small fraction of the total DNA of a cell, both chloroplast and mitochondrial barcodes chosen for identifying plant and animal species, respectively, have shown sufficient nucleotide diversity to assess the taxonomic identity of the vast majority of organisms used in agriculture. Consequently, cpDNA and mtDNA barcoding protocols are being used more and more in the food industry and food supply chains for food labeling, not only to support food safety but also to uncover food piracy in freshly commercialized and technologically processed products. Since the extranuclear genomes are present in many copies within each cell, this technology is being more easily exploited to recover information even in degraded samples or transformed materials deriving from crop varieties and livestock species. The strong standardization that characterizes protocols used worldwide for DNA barcoding makes this technology particularly suitable for routine analyses required by agencies to safeguard food safety and quality. Here we conduct a critical review of the potentials of DNA barcoding for food labeling along with the main findings in the area of food piracy, with particular reference to agrifood and livestock foodstuffs

    Competitive Positioning in International Logistics: Identifying a System of Attributes Through Neural Networks and Decision Trees

    Get PDF
    Firms involved in international logistics must develop a system of service attributes that give them a way to be profitable and to satisfy customers’ needs at the same time. How customers trade-off these various attributes in forming satisfaction with competing international logistics providers has not been explored well in the literature. This study explores the ocean freight shipping sector to identify the system of attributes that maximizes customers’ satisfaction. Data were collected from shipping managers in Singapore using personal interviews to identify the chief concerns in choosing and evaluating ocean freight services. The data were then examined using neural networks and decision trees, among other approaches to identify the system of attributes that is connected with customer satisfaction. The results illustrate the power of these methods in understanding how industrial customers with global operations process attributes to derive satisfaction. Implications are discussed

    A new proxy of social capital and the economic performance across the Italian regions

    Get PDF
    In the last 20 years, social capital, has been evoked in several field of social science research and used to explain a vast range of phenomena: political participation, institution performance, corruption, economic success of countries and so on. Unfortunately, dealing with social capital at a scientific level presents, at least, three main problems. First social capital’s definition is still elusive, especially due to its multi-dimensional nature. Second, it is a particular form of capital related to a very high level of intangibility. Finally, because of lack of suitable data there is neither a universal measurement method, nor a single underlined indicator commonly accepted by the literature. These are some of the reasons for which social capital measures are considered as proxies. By using the density of workers within industrial districts, we have constructed an alternative proxy to those that already exist in the literature in order to empirically analyse the difference, in terms of economic performance, across the Italian regions. The methodology we have applied to derive the index is identical to that one used to construct the Putnam’s instrument. Empirical evidence shows that our measure does not affect macroeconomic indicators such as investment and income per capita. However, it significantly influences unemployment disparities, and the level of innovation

    Verification, Analytical Validation, and Clinical Validation (V3): The Foundation of Determining Fit-for-Purpose for Biometric Monitoring Technologies (BioMeTs)

    Get PDF
    Digital medicine is an interdisciplinary field, drawing together stakeholders with expertize in engineering, manufacturing, clinical science, data science, biostatistics, regulatory science, ethics, patient advocacy, and healthcare policy, to name a few. Although this diversity is undoubtedly valuable, it can lead to confusion regarding terminology and best practices. There are many instances, as we detail in this paper, where a single term is used by different groups to mean different things, as well as cases where multiple terms are used to describe essentially the same concept. Our intent is to clarify core terminology and best practices for the evaluation of Biometric Monitoring Technologies (BioMeTs), without unnecessarily introducing new terms. We focus on the evaluation of BioMeTs as fit-for-purpose for use in clinical trials. However, our intent is for this framework to be instructional to all users of digital measurement tools, regardless of setting or intended use. We propose and describe a three-component framework intended to provide a foundational evaluation framework for BioMeTs. This framework includes (1) verification, (2) analytical validation, and (3) clinical validation. We aim for this common vocabulary to enable more effective communication and collaboration, generate a common and meaningful evidence base for BioMeTs, and improve the accessibility of the digital medicine field

    Blockchain Technology - China\u27s Bid to High Long-Run Growth

    Full text link
    Despite having the second largest economy at 13trillion,ChinahasonlyrecentlysurpassedtheWorldBank’sdefinitionofthe‘middle−incomerange’whichisagrossnationalincomepercapitabetween13 trillion, China has only recently surpassed the World Bank’s definition of the ‘middle-income range’ which is a gross national income per capita between 1,000 to 12,000(constant2011international12,000 (constant 2011 international ). This is a noteworthy accomplishment since many other developing nations have fallen victim to economic stagnation within this range leading to the term “middle-income trap”. This paper will argue that one of the ways in which China escaped the middle-income trap and will continue to grow its economic influence is through the support of blockchain technology. Research and development, early technological adoption and business climate all play a role in explaining how the Chinese public and private sector have used blockchain technology to encourage economic growth. While there are many questions and misconceptions about blockchain technology and its place in China, this paper seeks only to answer a select few
    • 

    corecore