University research in hardware security

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow tracking; software-hardware security verification; security measurement techniques; typs of security attacks; supply chain security options; hardware trojans; security CAD tools; trust management issues; cyber-physical systems; and secure software design, new problems and solutions.

Original languageEnglish (US)
Title of host publication2014 IEEE Hot Chips 26 Symposium, HCS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467388832
DOIs
StatePublished - May 25 2016
Event26th IEEE Hot Chips Symposium, HCS 2014 - Cupertino, United States
Duration: Aug 10 2014Aug 12 2014

Publication series

Name2014 IEEE Hot Chips 26 Symposium, HCS 2014

Other

Other26th IEEE Hot Chips Symposium, HCS 2014
CountryUnited States
CityCupertino
Period8/10/148/12/14

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'University research in hardware security'. Together they form a unique fingerprint.

  • Cite this

    Lee, R. B. (2016). University research in hardware security. In 2014 IEEE Hot Chips 26 Symposium, HCS 2014 [7478799] (2014 IEEE Hot Chips 26 Symposium, HCS 2014). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/HOTCHIPS.2014.7478799