Hardware Designer

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 93 Experts worldwide ranked by ideXlab platform

Mohit Tiwari - One of the best experts on this subject based on the ideXlab platform.

  • DAC - Invited - Who is the major threat to tomorrow's security?: you, the Hardware Designer
    Proceedings of the 53rd Annual Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

  • invited who is the major threat to tomorrow s security you the Hardware Designer
    Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

Wayne Burleson - One of the best experts on this subject based on the ideXlab platform.

  • DAC - Invited - Who is the major threat to tomorrow's security?: you, the Hardware Designer
    Proceedings of the 53rd Annual Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

  • invited who is the major threat to tomorrow s security you the Hardware Designer
    Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

Onur Mutlu - One of the best experts on this subject based on the ideXlab platform.

  • DAC - Invited - Who is the major threat to tomorrow's security?: you, the Hardware Designer
    Proceedings of the 53rd Annual Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

  • invited who is the major threat to tomorrow s security you the Hardware Designer
    Design Automation Conference, 2016
    Co-Authors: Wayne Burleson, Onur Mutlu, Mohit Tiwari
    Abstract:

    More and more security attacks today are perpetrated by exploiting the Hardware: memory errors can be exploited to take over systems, side-channel attacks leak secrets to the outside worlds, weak random number generators render cryptography ineffective, etc. At the same time, many of the tenets of efficient design are in tension with guaranteeing security. For instance, classic secure Hardware does not allow to optimize common execution patterns, share resources, or provide deep introspection. We provide brief descriptions of three recently-exposed Hardware vulnerabilities along with extensive references for background and to learn more about these areas. Specifically, we first discuss the Rowhammer problem in modern DRAM chips, which enables attackers to circumvent memory isolation, and other potential vulnerabilities due to aggressive memory technology scaling. We next describe Hardware Trojans implemented below the gate level, which can resist most detection techniques, and other manufacturing vulnerabilities in security primitives. Finally, we explain side channels that can achieve very large information leakage capacities, and various potential defenses against them. We conclude by noting that the intersection of Hardware design and security attacks and countermeasures will continue to present a rich area for research and development for many years to come.

P M Grant - One of the best experts on this subject based on the ideXlab platform.

  • Signal processing Hardware and software
    Ieee Signal Processing Magazine, 1996
    Co-Authors: P M Grant
    Abstract:

    The explosive growth of digital signal processing techniques has given way to a myriad of high performance DSP devices and tools for today's Hardware Designer and software specialist. The charts and tables presented reflect up-to-date information on the most widely used programmable DSP chips, DSP board products, major software tools in wide use, types of commercial A-D converters, advanced A-D converters in research, available FIR filters (standard and weighted), IC frequency synthesizers, and integrated FFT chipsets

Jörn-marc Schmidt - One of the best experts on this subject based on the ideXlab platform.

  • Hardware Designer's Guide to Fault Attacks
    IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2013
    Co-Authors: Dusko Karaklajic, Jörn-marc Schmidt, Ingrid Verbauwhede
    Abstract:

    Hardware Designers invest a significant design effort when implementing computationally intensive cryptographic algorithms onto constrained embedded devices to match the computational demands of the algorithms with the stringent area, power, and energy budgets of the platforms. When it comes to designs that are employed in potential hostile environments, another challenge arises-the design has to be resistant against attacks based on the physical properties of the implementation, the so-called implementation attacks. This creates an extra design concern for a Hardware Designer. This paper gives an insight into the field of fault attacks and countermeasures to help the Designer to protect the design against this type of implementation attacks. We analyze fault attacks from different aspects and expose the mechanisms they employ to reveal a secret parameter of a device. In addition, we classify the existing countermeasures and discuss their effectiveness and efficiency. The result of this paper is a guide for selecting a set of countermeasures, which provides a sufficient security level to meet the constraints of the embedded devices.

  • FDTC - The Fault Attack Jungle - A Classification Model to Guide You
    2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011
    Co-Authors: Ingrid Verbauwhede, Dusko Karaklajic, Jörn-marc Schmidt
    Abstract:

    For a secure Hardware Designer, the vast array of fault attacks and countermeasures looks like a jungle. This paper aims at providing a guide through this jungle and at helping a Designer of secure embedded devices to protect a design in the most efficient way. We classify the existing fault attacks on implementations of cryptographic algorithms on embedded devices according to different criteria. By doing do, we expose possible security threats caused by fault attacks and propose different classes of countermeasures capable of preventing them.