776 research outputs found

    Severe Anaphylaxis to Volplex, a Colloid Solution during Cesarean Section: A Case Report and Review

    Get PDF
    Anaphylaxis is a life-threatening event that can occur anytime during pregnancy. It has been reported following administration of various substances with adverse maternal and neonatal consequences. It should be considered in the differential diagnosis of intrapartum collapse. We encountered a case of severe anaphylactic reaction following a routine cesarean section. It is very important that all members of the perinatal team are aware of early recognition and management of anaphylactic reaction. We think that it is important to highlight this as a further case report of severe anaphylactic reaction to a colloid solution and discuss the pathophysiology and management

    Reconfigurable logic for hardware IP protection: Opportunities and challenges

    Get PDF
    Protecting the intellectual property (IP) of integrated circuit (IC) design is becoming a significant concern of fab-less semiconductor design houses. Malicious actors can access the chip design at any stage, reverse engineer the functionality, and create illegal copies. On the one hand, defenders are crafting more and more solutions to hide the critical portions of the circuit. On the other hand, attackers are designing more and more powerful tools to extract useful information from the design and reverse engineer the functionality, especially when they can get access to working chips. In this context, the use of custom reconfigurable fabrics has recently been investigated for hardware IP protection. This paper will discuss recent trends in hardware obfuscation with embedded FPGAs, focusing also on the open challenges that must be necessarily addressed for making this solution viable

    Designing ML-resilient locking at register-transfer level

    Get PDF
    Various logic-locking schemes have been proposed to protect hardware from intellectual property piracy and malicious design modifications. Since traditional locking techniques are applied on the gate-level netlist after logic synthesis, they have no semantic knowledge of the design function. Data-driven, machine-learning (ML) attacks can uncover the design flaws within gate-level locking. Recent proposals on register-transfer level (RTL) locking have access to semantic hardware information. We investigate the resilience of ASSURE, a state-of-the-art RTL locking method, against ML attacks. We used the lessons learned to derive two ML-resilient RTL locking schemes built to reinforce ASSURE locking. We developed ML-driven security metrics to evaluate the schemes against an RTL adaptation of the state-of-the-art, ML-based SnapShot attack

    Invited: High-level design methods for hardware security: Is it the right choice?

    Get PDF
    Due to the globalization of the electronics supply chain, hardware engineers are increasingly interested in modifying their chip designs to protect their intellectual property (IP) or the privacy of the final users. However, the integration of state-of-the-art solutions for hardware and hardware-assisted security is not fully automated, requiring the amendment of stable tools and industrial toolchains. This significantly limits the application in industrial designs, potentially affecting the security of the resulting chips. We discuss how existing solutions can be adapted to implement security features at higher levels of abstractions (during high-level synthesis or directly at the register-transfer level) and complement current industrial design and verification flows. Our modular framework allows designers to compose these solutions and create additional protection layers

    Analgorithmic Framework for Automatic Detection and Tracking Moving Point Targets in IR Image Sequences

    Get PDF
    Imaging sensors operating in infrared (IR) region of electromagnetic spectrum are gaining importance in airborne automatic target recognition (ATR) applications due to their passive nature of operation. IR imaging sensors exploit the unintended IR radiation emitted by the targets of interest for detection. The ATR systems based on the passive IR imaging sensors employ a set of signal processing algorithms for processing the image information in real-time. The real-time execution of signal processing algorithms provides the sufficient reaction time to the platform carrying ATR system to react upon the target of interest. These set of algorithms include detection, tracking, and classification of low-contrast, small sized-targets. Paper explained a signal processing framework developed to detect and track moving point targets from the acquired IR image sequences in real-time.Defence Science Journal, Vol. 65, No. 3, May 2015, pp.208-213, DOI: http://dx.doi.org/10.14429/dsj.65.816

    Optimizing the Use of Behavioral Locking for High-Level Synthesis

    Get PDF
    The globalization of the electronics supply chain requires effective methods to thwart reverse engineering and IP theft. Logic locking is a promising solution, but there are many open concerns. First, even when applied at a higher level of abstraction, locking may result in significant overhead without improving the security metric. Second, optimizing a security metric is application-dependent and designers must evaluate and compare alternative solutions. We propose a meta-framework to optimize the use of behavioral locking during the high-level synthesis (HLS) of IP cores. Our method operates on chip’s specification (before HLS) and it is compatible with all HLS tools, complementing industrial EDA flows. Our meta-framework supports different strategies to explore the design space and to select points to be locked automatically. We evaluated our method on the optimization of differential entropy, achieving better results than random or topological locking: 1) we always identify a valid solution that optimizes the security metric, while topological and random locking can generate unfeasible solutions; 2) we minimize the number of bits used for locking up to more than 90% (requiring smaller tamper-proof memories); 3) we make better use of hardware resources since we obtain similar overheads but with higher security metric

    Performance validation of low-cost building insulation materials via the thermal characteristics and costs of insulation materials

    Get PDF
    Because the envelope accounts for 50–60% of total heat gain/loss in a building, building envelope insulation is critical for an energy-efficient and comfortable inside environment. The importance of building insulation materials in our daily construction of structures is critically examined in this study. This research compares various building insulation materials (thermal, reaction to fire, environmental, and cost). Energy saving is becoming a more pressing concern in the building sector. As a result, interest in thermal insulation solutions has risen in recent years. Thermal insulation decreases heat transfer (the transmission of thermal energy between objects of different temperatures) between items in thermal contact or within the range of radiative effect. The selection of optimum thermal insulation offers significant potential for energy savings. This study examines the properties of various insulation materials and low-cost insulation materials, and easily accessible waste materials that may be substituted as insulation materials to save cost while simultaneously addressing environmental issues
    corecore