25,954 research outputs found
Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
Protecting intellectual property (IP) in electronic circuits has become a
serious challenge in recent years. Logic locking/encryption and layout
camouflaging are two prominent techniques for IP protection. Most existing
approaches, however, particularly those focused on CMOS integration, incur
excessive design overheads resulting from their need for additional circuit
structures or device-level modifications. This work leverages the innate
polymorphism of an emerging spin-based device, called the giant spin-Hall
effect (GSHE) switch, to simultaneously enable locking and camouflaging within
a single instance. Using the GSHE switch, we propose a powerful primitive that
enables cloaking all the 16 Boolean functions possible for two inputs. We
conduct a comprehensive study using state-of-the-art Boolean satisfiability
(SAT) attacks to demonstrate the superior resilience of the proposed primitive
in comparison to several others in the literature. While we tailor the
primitive for deterministic computation, it can readily support stochastic
computation; we argue that stochastic behavior can break most, if not all,
existing SAT attacks. Finally, we discuss the resilience of the primitive
against various side-channel attacks as well as invasive monitoring at runtime,
which are arguably even more concerning threats than SAT attacks.Comment: Published in Proc. Design, Automation and Test in Europe (DATE) 201
Daily and monthly costs of terrorism on Pakistani exports
This is first of its kind empirical study on the costs of terrorism on Pakistanâs exports. The analysis finds that intensity of terrorist activity can be divided into three distinct periods. The LAL Masjid incident in mid 2007 marks the first sign of intensification of terrorism in Pakistan. The second one is the assassination of Benazir Bhutto. The third one comes in 2008 when the US announced to shift gear from Iraq to Afghanistan and incumbent government in Pakistan created a political support for armed action within Pakistani borders against the terrorists. The analysis finds that terrorism has more significant affect on Pakistani exports post Benazir assassination. The report calculates the monthly and daily costs of terrorism. On average there are 2 terrorist attacks every day whereas 5 citizens on average die in these attacks. A single terrorist attack costs 12 million dollars to the exports. Post Benazir assassination the costs rise to 18 million dollars due to increased intensity where not only the death toll on average has risen but the number of terrorist attacks have gone up. Average per month loss in exports due to terrorism is calculated to be around 500 million dollars. Pakistan in 2006-09 has lost nearly 30 billion dollars in exports as its market shares have fallen. Part of this loss is explained by terrorism, where we find that 18 billion dollars accounts for it. Please note that extending the data for later years may make our results more pronounced but suffice to say our calculated ÎČâs are robust capable of predicting terrorism for coming years. For example, it is found out that costs of number of deaths and number of injured are different while exports are more sensitive to the former capturing severity of casualties that is the hall mark of extreme terrorist actions like suicide attacks.Conflict, Trade
Recommended from our members
United States-Canada Trade and Economic Relationship: Prospects and Challenges
[Excerpt] The terrorist attacks of 2001 focused attention on the U.S.-Canadian border. Several bilateral initiatives have been undertaken to minimize disruption to commerce from added border security. The focus on the border has renewed interest in some quarters in greater economic integration, either through incremental measures such as greater regulatory cooperation or potentially larger goals such as a customs or monetary union. Congressional interest has focused mostly on trade disputes, and also on the ability of the two nations to continue their traditional volume of trade with heightened security on the border
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or âlone wolf terroristâ), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terroristâs blueprint
Linkages across the border--the Great Lakes economy
Great Lakes ; Automobile industry and trade
- âŠ