20,603 research outputs found
A Survey on Integrated Circuit Trojans
Traditionally, computer security has been associated with the software security, or the information-data security. Surprisingly, the hardware on which the software executes or the information stored-processed-transmitted has been assumed to be a trusted base of security. The main building blocks of any electronic device are Integrated circuits (ICs) which form the fabric of a computer system. Lately, the use of ICs has expanded from handheld calculators and personal computers (PCs) to smartphones, servers, and Internet-of-Things (IoT) devices. However, this significant growth in the IC market created intense competition among IC vendors, leading to new trends in IC manufacturing. System-on-chip (SoC) design based on intellectual property (IP), a globally spread supply chain of production and distribution of ICs are the foremost of these trends. The emerging trends have resulted in many security and trust weaknesses and vulnerabilities, in computer systems. This includes Hardware Trojans attacks, side-channel attacks, Reverse-engineering, IP piracy, IC counterfeiting, micro probing, physical tampering, and acquisition of private or valuable assets by debugging and testing. IC security and trust vulnerabilities may cause loss of private information, modified/altered functions, which may cause a great economical hazard and big damage to society. Thus, it is crucial to examine the security and trust threats existing in the IC lifecycle and build defense mechanisms against IC Trojan threats. In this article, we examine the IC supply chain and define the possible IC Trojan threats for the parties involved. Then we survey the latest progress of research in the area of countermeasures against the IC Trojan attacks and discuss the challenges and expectations in this area. Keywords: IC supply chain, IC security, IP privacy, hardware trojans, IC trojans DOI: 10.7176/CEIS/12-2-01 Publication date: April 30th 202
3D Integration: Another Dimension Toward Hardware Security
We review threats and selected schemes concerning hardware security at design
and manufacturing time as well as at runtime. We find that 3D integration can
serve well to enhance the resilience of different hardware security schemes,
but it also requires thoughtful use of the options provided by the umbrella
term of 3D integration. Toward enforcing security at runtime, we envision
secure 2.5D system-level integration of untrusted chips and "all around"
shielding for 3D ICs.Comment: IEEE IOLTS 201
Recommended from our members
Modularity and Intellectual Property Protection
Modularity is a means of partitioning technical knowledge about a product or process. When state-sanctioned intellectual property (IP) rights are ineffective or costly to enforce, modularity can be used to hide information and thus protect IP. We investigate the impact of modularity on IP protection by formally modeling the threat of expropriation by agents. The principal has three options to address this threat: trust, licensing, and paying agents to stay loyal. We show how the principal can influence the value of these options by modularizing the system and by hiring clans of agents, thus exploiting relationships among them. Extensions address screening and signaling in hiring, the effects of an imperfect legal system, and social norms of fairness. We illustrate our arguments with examples from practice
DNA barcoding as a molecular tool to track down mislabeling and food piracy
DNA barcoding is a molecular technology that allows the identification of any biological species by amplifying, sequencing and querying the information from genic and/or intergenic standardized target regions belonging to the extranuclear genomes. Although these sequences represent a small fraction of the total DNA of a cell, both chloroplast and mitochondrial barcodes chosen for identifying plant and animal species, respectively, have shown sufficient nucleotide diversity to assess the taxonomic identity of the vast majority of organisms used in agriculture. Consequently, cpDNA and mtDNA barcoding protocols are being used more and more in the food industry and food supply chains for food labeling, not only to support food safety but also to uncover food piracy in freshly commercialized and technologically processed products. Since the extranuclear genomes are present in many copies within each cell, this technology is being more easily exploited to recover information even in degraded samples or transformed materials deriving from crop varieties and livestock species. The strong standardization that characterizes protocols used worldwide for DNA barcoding makes this technology particularly suitable for routine analyses required by agencies to safeguard food safety and quality. Here we conduct a critical review of the potentials of DNA barcoding for food labeling along with the main findings in the area of food piracy, with particular reference to agrifood and livestock foodstuffs
Competitive Positioning in International Logistics: Identifying a System of Attributes Through Neural Networks and Decision Trees
Firms involved in international logistics must develop a system of service attributes that give them a way to be profitable and to satisfy customersâ needs at the same time. How customers trade-off these various attributes in forming satisfaction with competing international logistics providers has not been explored well in the literature. This study explores the ocean freight shipping sector to identify the system of attributes that maximizes customersâ satisfaction. Data were collected from shipping managers in Singapore using personal interviews to identify the chief concerns in choosing and evaluating ocean freight services. The data were then examined using neural networks and decision trees, among other approaches to identify the system of attributes that is connected with customer satisfaction. The results illustrate the power of these methods in understanding how industrial customers with global operations process attributes to derive satisfaction. Implications are discussed
A new proxy of social capital and the economic performance across the Italian regions
In the last 20 years, social capital, has been evoked in several field of social science research and used to explain a vast range of phenomena: political participation, institution performance, corruption, economic success of countries and so on. Unfortunately, dealing with social capital at a scientific level presents, at least, three main problems. First social capitalâs definition is still elusive, especially due to its multi-dimensional nature. Second, it is a particular form of capital related to a very high level of intangibility. Finally, because of lack of suitable data there is neither a universal measurement method, nor a single underlined indicator commonly accepted by the literature. These are some of the reasons for which social capital measures are considered as proxies. By using the density of workers within industrial districts, we have constructed an alternative proxy to those that already exist in the literature in order to empirically analyse the difference, in terms of economic performance, across the Italian regions. The methodology we have applied to derive the index is identical to that one used to construct the Putnamâs instrument. Empirical evidence shows that our measure does not affect macroeconomic indicators such as investment and income per capita. However, it significantly influences unemployment disparities, and the level of innovation
Verification, Analytical Validation, and Clinical Validation (V3): The Foundation of Determining Fit-for-Purpose for Biometric Monitoring Technologies (BioMeTs)
Digital medicine is an interdisciplinary field, drawing together stakeholders with expertize in engineering, manufacturing, clinical science, data science, biostatistics, regulatory science, ethics, patient advocacy, and healthcare policy, to name a few. Although this diversity is undoubtedly valuable, it can lead to confusion regarding terminology and best practices. There are many instances, as we detail in this paper, where a single term is used by different groups to mean different things, as well as cases where multiple terms are used to describe essentially the same concept. Our intent is to clarify core terminology and best practices for the evaluation of Biometric Monitoring Technologies (BioMeTs), without unnecessarily introducing new terms. We focus on the evaluation of BioMeTs as fit-for-purpose for use in clinical trials. However, our intent is for this framework to be instructional to all users of digital measurement tools, regardless of setting or intended use. We propose and describe a three-component framework intended to provide a foundational evaluation framework for BioMeTs. This framework includes (1) verification, (2) analytical validation, and (3) clinical validation. We aim for this common vocabulary to enable more effective communication and collaboration, generate a common and meaningful evidence base for BioMeTs, and improve the accessibility of the digital medicine field
Blockchain Technology - China\u27s Bid to High Long-Run Growth
Despite having the second largest economy at 1,000 to ). This is a noteworthy accomplishment since many other developing nations have fallen victim to economic stagnation within this range leading to the term âmiddle-income trapâ. This paper will argue that one of the ways in which China escaped the middle-income trap and will continue to grow its economic influence is through the support of blockchain technology. Research and development, early technological adoption and business climate all play a role in explaining how the Chinese public and private sector have used blockchain technology to encourage economic growth. While there are many questions and misconceptions about blockchain technology and its place in China, this paper seeks only to answer a select few
- âŠ