University research in hardware security

Ruby B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow tracking; software-hardware security verification; security measurement techniques; typs of security attacks; supply chain security options; hardware trojans; security CAD tools; trust management issues; cyber-physical systems; and secure software design, new problems and solutions.

Original languageEnglish (US)
Title of host publication2014 IEEE Hot Chips 26 Symposium, HCS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467388832
DOIs
StatePublished - May 25 2014
Event26th IEEE Hot Chips Symposium, HCS 2014 - Cupertino, United States
Duration: Aug 10 2014Aug 12 2014

Publication series

Name2014 IEEE Hot Chips 26 Symposium, HCS 2014

Other

Other26th IEEE Hot Chips Symposium, HCS 2014
Country/TerritoryUnited States
CityCupertino
Period8/10/148/12/14

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'University research in hardware security'. Together they form a unique fingerprint.

Cite this