Hardware Security 1 Executive Summary

نویسندگان

  • Osnat Keren
  • Ilia Polian
  • Mark M. Tehranipoor
  • Fatemeh Ganji
چکیده

This report documents the program and outcomes of Dagstuhl Seminar 16202 “Hardware Security", which was held in Schloss Dagstuhl – Leibniz Center for Informatics from May 16–20, 2016. This seminar aims to bring together a group of researchers, who are actively involved in the design and the security assessment of hardware primitives. The seminar was organized around presentations given by several participants on their current research, and ongoing work. In addition to these presentations, the program also included three discussion sessions, and two special sessions on curriculum development and funding programs. The seminar was indeed successful in familiarizing the researchers with recent developments in hardware security field of study, providing better understanding of still unsolved problems, and pointing out future research directions. The paper is further organized as follows. Section 1 summarizes the most important goals of the seminar. Section 3 is devoted to the abstracts of the presentations given in the seminar, whereas in Section 4 the abstracts of the discussion sessions are provided. Seminar May 16–20, 2016 – http://www.dagstuhl.de/16202 1998 ACM Subject Classification B.7.m [Integrated Circuits] Miscellaneous, C.3 [Special-Purpose and Application-Based Systems] Smartcards and Real-time and Embedded Systems, E.3 [Data Encryption] Code Breaking and Standards, E.4 [Coding and Information Theory] Error Control Codes, I.2.6 [Learning] Concept Learning, K.6.5 [Security and Protection] Authentication and Unauthorized Access

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Delivering 160Gbps DPI Performance on the Intel Xeon Processor E5-2600 Series using HyperScan

EXECUTIVE SUMMARY The requirement for advanced security equipment to scan data streams for malicious content at line rate presents significant challenges to network security vendors. Security equipment, overwhelmed by the data rates of present-day networks, is more likely to miss attacks, leading to increased risks of security breaches. While highspeed content scanning, also known as deep packe...

متن کامل

Reconfigurable Security Architecture for Embedded Systems

Embedded systems present significant security challenges due to their limited resources and power constraints. We propose a novel security architecture for embedded systems (SANES) that leverages the capabilities of reconfigurable hardware to provide efficient and flexible architectural support to both security standards and a range of attacks. This paper shows the efficiency of reconfigurable ...

متن کامل

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

A strong three-factor authentication device: Trusted DAVE and the new Generic Content-Based Information Security (CBIS) architecture

....................................................................................................................................... i Executive summary ...................................................................................................................iii Sommaire.....................................................................................................................

متن کامل

Empirical Measurements of Disk Failure Rates and Error Rates

Executive summary: The SATA advertised bit error rate of one error in 10 terabytes is frightening. We moved 2 PB through low-cost hardware and saw five disk read error events, several controller failures, and many system reboots caused by security patches. We conclude that SATA uncorrectable read errors are not yet a dominant system-fault source – they happen, but are rare compared to other pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016