Assurance, Security and Engineering
CHASE, Survey on Six Most Important
Topics in Hardware Security, Jan. 2014.
research in the domain of cybersecurity has seen exponential growth
over the past decade. Along with this growth, one particular area in
cybersecurity has enjoyed a significant amount of attention from
government, industry, and academia, that is, hardware security and
assurance. Much research in this domain over the past decade is done in
an ad-hoc fashion. To bring researchers in academia, industry, and
government together on common issues to address, to further explore the
challenging problems in this domain, the Center for Hardware Assurance,
Security, and Engineering (CHASE) at the University of Connecticut has
conducted a survey from about 50 experts in this domain. The main
objective was to collect information from those in industry and
government related to the most challenging problems they deal with on a
daily basis and the main issues that must be addressed by the
community. The survey was conducted on the following topic areas:
1. Counterfeit Electronics Components and Supply Chain,
2. Hardware Security and Trust,
4. System Security,
5. Standards, 6. Emerging Threats
You can find a summary of the responses at:
Circuit Authentication, Prof. M. Tehranipoor, Prof. H.
Salmani, and Dr. X. Zhang
This book provides readers with a comprehensive introduction to
hardware Trojans. The authors explain the hardware Trojan taxonomy in
detail, while delivering deep understanding of the potential impacts
throughout the integrated circuit (IC) lifecycle. While discussing the
shortcomings of current, industrial IC testing techniques for hardware
Trojans, the authors describe the details of emerging techniques to
detect them and to prevent their insertion into products.
More about this
Provides a comprehensive introduction to hardware Trojans and their
potential impact on the integrated circuit lifecycle.
Equips designers with tools for identifying potential
throughout the design cycle and manufacturing.
Describes state-of-the-art techniques for hardware
detection, and prevention
Analyzes susceptibility at the behavioral-, gate-,
Provides a single-source reference to hardware Trojans and
counterfeit detection in integrated circuits.
Equips designers with architecture-level solutions to improve
detection and prevention of hardware Trojans and counterfeits
Enables a strategy of silicon design authentication to verify
the trustworthiness manufactured chips, validating the chips
conformance with the original functional and performance
Security Tagging and Verification Using
Optically Encoded QR Codes, IEEE Photonics Journal, 2014.
We propose an optical security method for object authentication using
implemented with phase encoded QR codes. By combining the full phase
double-random-phase encryption with
photon-counting imaging method and applying an iterative Huffman coding
technique, we are able to encrypt and
compress an image containing primary information about the object. This
data can then be stored inside of an
optically phase encoded QR code for robust read out, decryption, and
authentication. The optically encoded QR code
is verified by examining the speckle signature of the optical masks
using statistical analysis. Optical experimental
results are presented to demonstrate the performance of the system. In
addition, experiments with a commercial
Smartphone to read the optically encoded QR code are presented. To the
best of our knowledge, this is the first report
on integrating photon-counting security with optically phase encoded QR
QR code encoded with a random phase mask placed on an IC
Download the paper here
A. Markman, B. Javidi, and M.
Tehranipoor, University of Connecticut
is a research consortium with member companies from across the nation
committed to enabling knowledge breakthroughs that shape future
electronic systems. The center provides membership
opportunity at three different levels (Platinum, Gold, and Silver).
Depending on the level
of the membership, a different set of benefits
will be made available to the members.
Subscription | Media