20 research outputs found

    A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips

    Full text link
    Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a proper solution is required to identify counterfeit memory chips before deploying them in mission-, safety-, and security-critical systems. However, a single solution to prevent counterfeiting is challenging due to the diversity of counterfeit types, sources, and refinement techniques. Besides, the chips can pass initial testing and still fail while being used in the system. Furthermore, existing solutions focus on detecting a single counterfeit type (e.g., detecting recycled memory chips). This work proposes a framework that detects major counterfeit static random-access memory (SRAM) types by attesting/identifying the origin of the manufacturer. The proposed technique generates a single signature for a manufacturer and does not require any exhaustive registration/authentication process. We validate our proposed technique using 345 SRAM chips produced by major manufacturers. The silicon results show that the test scores (F1F_{1} score) of our proposed technique of identifying memory manufacturer and part-number are 93% and 71%, respectively.Comment: This manuscript has been submitted for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Horse Trading in the Age of Cars

    Get PDF
    The trading, selling, and buying of personal transport has changed little over the past one hundred years. Whether horse trading in the early twentieth century or car buying today, haggling over prices has been the common practice of buyers and sellers alike. Horse Trading in the Age of Cars offers a fascinating study of the process of buying an automobile in a historical and gendered context. Steven M. Gelber convincingly demonstrates that the combative and frequently dishonest culture of the showroom floor is a historical artifact whose origins lie in the history of horse trading. Bartering and bargaining were the norm in this predominantly male transaction, with both buyers and sellers staking their reputations and pride on their ability to negotiate the better deal. Gelber comments on this point-of-sale behavior and what it reveals about American men. Gelber's highly readable and lively prose makes clear how this unique economic ritual survived into the industrial twentieth century, in the process adding a colorful and interesting chapter to the history of the automobile

    Essentials of forensic accounting

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2728/thumbnail.jp

    A Treatise on the Assault on Language Sovereignty in the United States: History, Education, and Implications for Policy

    Get PDF
    This dissertation examines the revitalization of endangered Indigenous languages in the United States in relation to the concept of sovereignty. I investigate historical reasons for language destruction in the United States as a means of understanding the mechanism used in conquest and the long-range effects on the educational system. I use the term language sovereignty to reflect the right of tribal organizations in the US to assert the use of traditional languages as a means of self-identifying as distinct sovereign nations. I draw from initiatives in Hawaii and Europe to demonstrate how regional and linguistic minority languages have been revitalized and reintroduced in culture and commerce. Lastly, I suggest how language sovereignty may influence general language diversity and future language policy in the United States

    Summary of 1981 Crime Legislation

    Get PDF
    This compendium will provide you with a convenient summary and copies of the Legislature\u27s statutory accomplishments in criminal law during the first half of the 1981-1982 session. All bills enacted during 1981 will become effective January 1, 1982 unless they are urgency measures or were made inoperative. The summaries of the urgency measures specifiy their effective date. Bills that were enacted but will not become operative have been excluded. In some bills only portions of the measure will be inoperative. These sections are clearly labeled on the bills. Senate and Assembly measures are listed separately, each in ascending numerical order. A topical index lists the measures by topic for easy reference. Each entry includes the chapter number, author, support and opposition groups and a brief description of the legislation. The bill descriptions included here are not analyses. The actual chaptered bills are included for purposes of analysis

    Urban Informatics

    Get PDF
    This open access book is the first to systematically introduce the principles of urban informatics and its application to every aspect of the city that involves its functioning, control, management, and future planning. It introduces new models and tools being developed to understand and implement these technologies that enable cities to function more efficiently – to become ‘smart’ and ‘sustainable’. The smart city has quickly emerged as computers have become ever smaller to the point where they can be embedded into the very fabric of the city, as well as being central to new ways in which the population can communicate and act. When cities are wired in this way, they have the potential to become sentient and responsive, generating massive streams of ‘big’ data in real time as well as providing immense opportunities for extracting new forms of urban data through crowdsourcing. This book offers a comprehensive review of the methods that form the core of urban informatics from various kinds of urban remote sensing to new approaches to machine learning and statistical modelling. It provides a detailed technical introduction to the wide array of tools information scientists need to develop the key urban analytics that are fundamental to learning about the smart city, and it outlines ways in which these tools can be used to inform design and policy so that cities can become more efficient with a greater concern for environment and equity
    corecore