Email not displaying correctly? View it in your browser.
CHASE-Logo Center for Hardware Assurance, Security and Engineering UCONN
CHASE Newsletter
News
UCONN CHASE, Survey on Six Most Important Topics in Hardware Security, Jan. 2014.
Survey
The research in the domain of cybersecurity has seen exponential growth over the past decade. Along with this growth, one particular area in cybersecurity has enjoyed a significant amount of attention from government, industry, and academia, that is, hardware security and assurance. Much research in this domain over the past decade is done in an ad-hoc fashion. To bring researchers in academia, industry, and government together on common issues to address, to further explore the challenging problems in this domain, the Center for Hardware Assurance, Security, and Engineering (CHASE) at the University of Connecticut has conducted a survey from about 50 experts in this domain. The main objective was to collect information from those in industry and government related to the most challenging problems they deal with on a daily basis and the main issues that must be addressed by the community. The survey was conducted on the following topic areas:
1. Counterfeit Electronics Components and Supply Chain,  2. Hardware Security and Trust, 3. Reliability,  4. System Security,  5. Standards, 6. Emerging Threats

You can find a summary of the responses at:
https://www.chase.uconn.edu/FA/CHASE-Survey.pdf

Mark your calendar!
CHASE Annual Workshop on on Secure/Trustworthy Systems and Supply Chain Assurance
April 9-10, 2014
University of Connecticut.

Featured Item: Book: Integrated Circuit Authentication, Prof. M. Tehranipoor, Prof. H. Salmani, and Dr. X. Zhang
Integrated Circuit
This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products.

More about this book

›› Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle.
›› Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing.
›› Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention
›› Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.
›› Provides a single-source reference to hardware Trojans and counterfeit detection in integrated circuits.
›› Equips designers with architecture-level solutions to improve detection and prevention of hardware Trojans and counterfeits
›› Enables a strategy of silicon design authentication to verify the trustworthiness manufactured chips, validating the chip’s conformance with the original functional and performance specifications.

New Publication Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes, IEEE Photonics Journal, 2014.
Photon-Counting Security Taggiong
QR code encoded with a random phase mask placed on an IC
Abstract: We propose an optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase double-random-phase encryption with photon-counting imaging method and applying an iterative Huffman coding technique, we are able to encrypt and compress an image containing primary information about the object. This data can then be stored inside of an optically phase encoded QR code for robust read out, decryption, and authentication. The optically encoded QR code is verified by examining the speckle signature of the optical masks using statistical analysis. Optical experimental results are presented to demonstrate the performance of the system. In addition, experiments with a commercial Smartphone to read the optically encoded QR code are presented. To the best of our knowledge, this is the first report on integrating photon-counting security with optically phase encoded QR codes.

Download the paper here
Authors: A. Markman, B. Javidi, and M. Tehranipoor, University of Connecticut

Membership CHASE is a research consortium with member companies from across the nation committed to enabling knowledge breakthroughs that shape future electronic systems. The center provides membership opportunity at three different levels (Platinum, Gold, and Silver). Depending on the level of the membership, a different set of benefits will be made available to the members.

Manage Subscription | Media