University research in hardware security

Ruby B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow tracking; software-hardware security verification; security measurement techniques; typs of security attacks; supply chain security options; hardware trojans; security CAD tools; trust management issues; cyber-physical systems; and secure software design, new problems and solutions.

Original languageEnglish (US)
Title of host publication2014 IEEE Hot Chips 26 Symposium, HCS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467388832
StatePublished - May 25 2014
Event26th IEEE Hot Chips Symposium, HCS 2014 - Cupertino, United States
Duration: Aug 10 2014Aug 12 2014

Publication series

Name2014 IEEE Hot Chips 26 Symposium, HCS 2014


Other26th IEEE Hot Chips Symposium, HCS 2014
Country/TerritoryUnited States

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'University research in hardware security'. Together they form a unique fingerprint.

Cite this