Research Statement Jeyavijayan ( JV ) Rajendran 1 Motivation

نویسنده

  • Jeyavijayan Rajendran
چکیده

1 Motivation Electronic devices are increasingly used for high-performance applications, such as data centers and networking, as well as energy-constrained applications, such as medical implants and sensors. In many of these applications, security and privacy of user data and computation are required and are usually enforced in software. However, enforcing security and privacy in hardware has gained importance in the recent years because of energy efficiency and performance benefits. Furthermore, to leverage the benefits of latest technologies and techniques, there has been a continuous trend away from in-house integrated circuit (IC) design and fabrication toward outsourcing various aspects of design, fabrication, testing, and packaging of ICs. This globalization of IC design flow has created hitherto unknown security and trust concerns in the ICs, and, thereby, in the computing systems (rooted in these ICs) on which modern society relies for mission-critical functionality. Anywhere in this design flow, an attacker can reverse engineer the functionality of an IC and/or an intellectual property (IP) as well as steal and claim ownership of the IP. An untrusted IC foundry may overbuild ICs and sell the excess parts in the gray market. Rogue elements in the foundry may insert malicious circuits (hardware Trojans) into the design without the designer’s knowledge. My research addresses the security problems in IC design by developing novel design automation algorithms and circuit techniques to ensure the trustworthiness of an IC. I will discuss two major themes of my research in this area: (1) hardware design-for-trust techniques to enforce trustworthiness in an IC design, and (2) leveraging emerging technologies for security applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Trojan Detection Solutions and Design - for - Trust Challenges

computer 64 Published by the IEEE Computer Society 0018-9162/11/$26.00 © 2011 IEEE a trusted design center and foundry, it is expensive and economically infeasible given current trends in the globalization of IC design and fabrication. On the other hand, verifying trustworthiness requires a postmanufacturing step to validate conformance of the fabricated IC to the original functional and perfor...

متن کامل

Manufacturing and Security Challenges in 3D Printing

1.—Composite Materials and Mechanics Laboratory, Department of Mechanical and Aerospace Engineering, New York University Tandon School of Engineering, Brooklyn, NY 11201, USA. 2.—Department of Computer Science and Engineering, New York University Tandon School of Engineering, Brooklyn, NY 11201, USA. 3.—Engineering Division, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates. 4.—Dep...

متن کامل

Removal Attacks on Logic Locking and Camouflaging Techniques

With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent. Logic obfuscation techniques including logic locking and IC camouflaging have been developed to address these emergent challenges. A major challenge for logic locking and camouflaging techniques is to resist Boolean satisfiability (SAT) based ...

متن کامل

Endothelin's biphasic effect on fluid absorption in the proximal straight tubule and its inhibitory cascade.

The effect of endothelin-1 (ET-1) on the proximal tubule remains unclear. This may be due to a biphasic effect on transport in this segment. We hypothesized that ET-1 has a biphasic effect on fluid absorption (Jv) in the proximal straight tubule and that its inhibitory effect is superimposed on its stimulatory effect. ET-1 (10(-13) M) stimulated Jv from 0.68 +/- 0.07 to 1.11 +/- 0.20 nl/mm/min,...

متن کامل

Nanoelectronic Solutions for Hardware Security

Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high energy and performance overhead. Further, emerging side channel and physical attacks can compromise classical security solutions. Hardware based security solutions overcome many of the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014