25,954 research outputs found

    Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices

    Full text link
    Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection. Most existing approaches, however, particularly those focused on CMOS integration, incur excessive design overheads resulting from their need for additional circuit structures or device-level modifications. This work leverages the innate polymorphism of an emerging spin-based device, called the giant spin-Hall effect (GSHE) switch, to simultaneously enable locking and camouflaging within a single instance. Using the GSHE switch, we propose a powerful primitive that enables cloaking all the 16 Boolean functions possible for two inputs. We conduct a comprehensive study using state-of-the-art Boolean satisfiability (SAT) attacks to demonstrate the superior resilience of the proposed primitive in comparison to several others in the literature. While we tailor the primitive for deterministic computation, it can readily support stochastic computation; we argue that stochastic behavior can break most, if not all, existing SAT attacks. Finally, we discuss the resilience of the primitive against various side-channel attacks as well as invasive monitoring at runtime, which are arguably even more concerning threats than SAT attacks.Comment: Published in Proc. Design, Automation and Test in Europe (DATE) 201

    Daily and monthly costs of terrorism on Pakistani exports

    Get PDF
    This is first of its kind empirical study on the costs of terrorism on Pakistan’s exports. The analysis finds that intensity of terrorist activity can be divided into three distinct periods. The LAL Masjid incident in mid 2007 marks the first sign of intensification of terrorism in Pakistan. The second one is the assassination of Benazir Bhutto. The third one comes in 2008 when the US announced to shift gear from Iraq to Afghanistan and incumbent government in Pakistan created a political support for armed action within Pakistani borders against the terrorists. The analysis finds that terrorism has more significant affect on Pakistani exports post Benazir assassination. The report calculates the monthly and daily costs of terrorism. On average there are 2 terrorist attacks every day whereas 5 citizens on average die in these attacks. A single terrorist attack costs 12 million dollars to the exports. Post Benazir assassination the costs rise to 18 million dollars due to increased intensity where not only the death toll on average has risen but the number of terrorist attacks have gone up. Average per month loss in exports due to terrorism is calculated to be around 500 million dollars. Pakistan in 2006-09 has lost nearly 30 billion dollars in exports as its market shares have fallen. Part of this loss is explained by terrorism, where we find that 18 billion dollars accounts for it. Please note that extending the data for later years may make our results more pronounced but suffice to say our calculated ÎČ’s are robust capable of predicting terrorism for coming years. For example, it is found out that costs of number of deaths and number of injured are different while exports are more sensitive to the former capturing severity of casualties that is the hall mark of extreme terrorist actions like suicide attacks.Conflict, Trade

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Linkages across the border--the Great Lakes economy

    Get PDF
    Great Lakes ; Automobile industry and trade
    • 

    corecore