In the age of digitization, a layer of cyber software sits on a hardware circuit and controls the physical systems around us. The tight integration of cyber and physical components is referred to as Cyber-Physical Systems (CPS). The interactions between cyber and physical components brings unique challenges which traditional modeling tools struggle to resolve. Remarkably, they often fail to model the unintentional physical manifestation of cyber-domain information flows (side-channel signals), resulting in trust issues in the system.This thesis takes a data-driven approach to model CPS behavior when exposed to various information flows. First, we demonstrate how to extract valuable cyber-domain information by recording the acoustic noise ge...
Software exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker ...
Presented on January 24, 2020 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.L...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modification...
Cyber-Physical System consists of the integration of computational components in the cyber-domain wi...
Along with an increase in cyber security concerns for critical infrastructure applications, there is...
The use of side-channel measurements and fingerprinting, in conjunction with statistical analysis, h...
Globally, there has been an increase in demand for System on Chip (SoC) applications, active medical...
The use of side-channel parametric measurements along with statistical analysis methods for detectin...
These days, hardware devices and its associated activities are greatly impacted by threats amidst of...
The security of a cyber-physical system depends on the safety of the handled data, software, and und...
These days, hardware devices and its associated activities are greatly impacted by threats amidst of...
© 2015 IEEE. Integrated circuit counterfeits, relabeled parts and maliciously modified integrated ci...
The IoT has become an indispensable part of our lives at work and in our home applications. Due to t...
Today multi-million gate integrated circuits are being commonly used in many critical (eg., health c...
Software exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker ...
Presented on January 24, 2020 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.L...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Design and fabrication outsourcing has made integrated circuits vulnerable to malicious modification...
Cyber-Physical System consists of the integration of computational components in the cyber-domain wi...
Along with an increase in cyber security concerns for critical infrastructure applications, there is...
The use of side-channel measurements and fingerprinting, in conjunction with statistical analysis, h...
Globally, there has been an increase in demand for System on Chip (SoC) applications, active medical...
The use of side-channel parametric measurements along with statistical analysis methods for detectin...
These days, hardware devices and its associated activities are greatly impacted by threats amidst of...
The security of a cyber-physical system depends on the safety of the handled data, software, and und...
These days, hardware devices and its associated activities are greatly impacted by threats amidst of...
© 2015 IEEE. Integrated circuit counterfeits, relabeled parts and maliciously modified integrated ci...
The IoT has become an indispensable part of our lives at work and in our home applications. Due to t...
Today multi-million gate integrated circuits are being commonly used in many critical (eg., health c...
Software exploitable Hardware Trojan Horses (HTHs) inserted into commercial CPUs allow the attacker ...
Presented on January 24, 2020 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.L...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...