Towards a Hardware Trojan Detection Cycle
|
|
|
- Maryann Jenkins
- 10 years ago
- Views:
Transcription
1 Towards a Hardware Trojan Detection Cycle Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar Weippl SBA Research, Vienna, Austria (firstletterfirstname)(lastname)@sba-research.org Abstract Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. Recently, the scientific community started to propose technical approaches to mitigate the threat of unspecified and potentially malicious functionality. However, these detection and prevention mechanisms are still hardly integrated in the industry s Hardware development life cycles. We therefore propose in this work a secure hardware development life cycle that assembles methods from trustworthy software engineering.in addition to full traceability from specification to implementation, and down to each gate, we introduce a feedback detection cycle that systematically escorts every single step of the development process. To do so, we integrate different detection methods for each development phase that are derived from a common knowledge base. I. INTRODUCTION Software malware has become a daily threat to computer systems and a lot of effort is put into adequate countermeasures. Yet computer systems not only consist of software, but also of hardware. Benign functionality can be realized in hardware or software, likewise, malware can appear as a part of software or hardware. Wang et al. [1] defined hardware Trojans as hardware modifications which result in malicious functional changes of the respective device. Considering the propagation of integrated circuits in today s world including domestic appliances like washing machines, means of transportation (e. g. cars or airplanes), clinical devices (e. g. enabling precise diagnosis) and military appliances (e. g. enhancing the effectiveness of weapons) hardware Trojans impact our everyday life and may even cause life threatening situations. Unlike other errors and malfunctions, Trojans are inserted deliberately. Apart from insider attacks, the economically driven outsourcing of production steps to third party contractors enlarges the attack surface dramatically. Contractors, their employees, and intruders potentially modify the design without the designer s or customer s knowledge. Hitherto existing mitigation approaches (such as [2]) introduce additional manual reviews in different stages of the process, but do not develop specific measures for hardware Trojan detection. Based on the experience of trustworthy software engineering, the adoption of respective techniques for the hardware development process seems appropriate to encounter the challenges of silicon malware. Due to inherent differences between these domains, the adoption is a non-trivial task. Hardware offers only scarce possibilities of updating after deployment. Furthermore, hardware attacks are typically targeted attacks, This work was supported by the FIT-IT program (project number ) and the COMET K1 program by FFG (Austrian Research Funding Agency). i. e. tailored to a specific victim or product, while software malware targets a broad mass of anonymous victims. Additionally, a drastic change of the familiar and well understood hardware development process requires high financial and organizational effort and therefore unlikely to be applied. Hence, we strove to moderately extend the current process by adapting selected methods known from secure software development. As a first step, we analyzed typical malware structures to infer the demands for successful detection of hardware Trojans. Then we identified shortcomings in state of the art hardware development processes and evaluated trustworthy software engineering processes in terms of their applicability to the hardware process. Successfully evaluated methods are adopted and then included in the hardware development cycle. By understanding potential attacks and their point of insertion, we identified feasible methods and requirements for their proper appliance within the hardware development. Finally, the findings were assembled to develop the hardware Trojan detection cycle. Thereby it is taken into account that some properties of malware are easier to detect in artifacts of particular development phases. This is considered by a detection cycle containing adaptive phase-dependent rule sets. This paper contributes a definition of a threat model to identify the demands for a secure hardware development process, the introduction of full traceability in hardware development, and a detection life cycle for malware in silicon to be included in today s state of the art development processes. This paper is organized as follows: Section II presents state of the art hardware development processes, types of attackers, differences between hardware and software development as well as an introduction to trustworthy software engineering. Section III introduces the methodology and present the developed detection life cycle. Finally, Section IV provides an evaluation followed by a discussion of results, especially in terms of limitations. Section V provides an overview on related work with respect to hardware Trojans and trustworthy hardware development, followed by the conclusion in Section VI. II. BACKGROUND In this section, we briefly describe the standard industrial hardware development lifecycle. Furthermore, we summarize the recently considered attack vectors, highlight the important differences between software and hardware development, and give an introduction to trustworthy software development.
2 Fig. 1. Industrial Hardware Development Lifecycle A. Industrial Hardware Development Lifecycle Figure 1 illustrates the phases of a typical industrial IC development process. In the requirements phase, the core features of the future product are defined. In the following specification and design phase detailed descriptions and block diagrams are gained from the results of the first phase. Based upon that, disjunctive teams work on test cases and the implementation. During the implementation phase HDL (Hardware Description Language) code is written, but also external modules 3rd party intellectual property (IP) can be included. Depending on the license, the 3rd party IP can be anything from full HDL source code to a piece of netlist 1 or a development model, whereas the real IP is inserted directly into the mask later on. A verification mechanism tests the implementation against the specification in regular intervals (e. g. in nightly regression runs). This is also the phase, in which code reviews, testing and simulation take place. After synthesis, the generated netlist is tested against the implementation using an equivalence check. The flat netlist is then laid out for a specific production technology and saved as GDS II (Graphic Database System) file. At this point, testing circuits are introduced which support the detection of production errors in later phases, not necessarily Trojans (Test Insertion). For a fab-less designer, i.e. an IC designer without fabrication facilities, this is the last step that is done 1 Netlists are a low-level representation of hardware by means of nested graphs of the electronic circuit. They consist of gates and its connectivity wires. in-house. The tape out marks the transfer of the IC design to external contractors. The mask shop creates the lithographic masks for the fabrication. Wafers are first tested as a whole, then individual ICs are tested. However, even designers with access to a fab source out some of the steps either for economic reasons or because some steps are better performed by very specialized and experienced contractors. B. Attack types Attackers are divided into four general groups based on the development phase they are active in, i.e. design attackers, synthesis attackers, fabrication attackers and distribution attackers [3]. In Figure 1, these attacker types are visualized in relation to the hardware development phases they are active in and Figure 2 provides an overview. A design attacker is active up to the implementation phase. Thereby, the attacker has full access to design files as well as source code. This access is gained by traditional hacking or by the attacker being an insider with legitimate access. He/She is able to add and remove components or to gain insights into the design for future attacks. Synthesis attackers compromise CAD (Computer Aided Design) tools or scripts running them, which output a modified representation without modifying the source code. Due to being included into a synthesis tool, these attacks are difficult to discover. Thereby the attacker is able to add Trojan logic, mangle critical logic, metering IPs or theft of respective information.
3 product. As a conclusion, methods from trustworthy software development are more likely to be adaptable for the first stages of hardware development. Fig. 2. Attacker Types, based on [3] A fabrication attacker unfolds his/her activities after tapeout and is typically external to the IC designer. Attackers are able to remove/add components via layout geometry modification, reverse engineering or IC metering. The fourth group, the distribution attackers, sell counterfeit products with modified circuitry. C. Differences between Software and Hardware Development In general, software engineering is more flexible than most engineering professions due to being independent of physical artifacts. This also leads to differences in the development process and does not allow the simple adoption of trustworthy software engineering to hardware development. Physically producing an ICs is a time-consuming and costly task. Furthermore, testing the final good requires significantly more resources than in software engineering. Thus, engineers try to mitigate all kind of errors before production by means of planing and simulation. This leads to a production process where the actual production remains a comparably small step at the end. After roll-out of the respective product, updates and fixes such as performed regularly in operating systems and browsers are impossible because they would require physical changes or replacement which cannot be performed remotely. Coherently with these aspects, iterative development processes are not fully applicable for hardware. As an extreme, agile software development methods start with a rough design, which expands modular and subsequently. The implemented modules are refined based on the use case just before implementation. In contrast, IC engineering prefers a more classic top-down engineering approach based on the waterfall model, where each phase is strictly performed after each other. Changes in previous phases are possible, but have to trickle down the waterfall and hold the risk of a long tail of other adoptions, such as retrofitting tests. In a nutshell, IC development phases gain similarity to software development the further away the are from the final D. Trustworthy Software Development Lifecycle In software a secure development process is often referred to as trustworthy, since secure is also associated with a quality control so that the end product does not contain design- or implementation-specific security vulnerabilities, such as buffer overflows or command injections. In this paper we focus on the first interpretation, even though they often correlate. The method of Requirement Traceability has been researched and popularized by Gotel and Finkelstein [4]. In brief, it describes the ability to track all people, decisions and artifacts that lead to a certain requirement, as well as all artifacts (e.g. code and tests) involved in fulfilling the requirement in the final product. The latter part is called post requirements specification and can be as detailed as for each single code block or code line. A vast number of implementations exists for all popular development platforms. They typically bridge or unite other requirements, specifications, testing and source code versioning tools. The integration into the development environment (IDE) forces developers to stick to a certain work-flow. With an enforced work-flow, developers might not be able to commit changes into a source code management tool without logging into a specification, test case or change request. Together with debug symbols for the binary, this method creates an uninterrupted traceability from the requirement, through the specification, the test cases and the implementation down to the binary code and vice versa. Each compiler-generated CPU instruction can be traced to a specific source code line or module and then to all the authors, specifications, requirements, change requests and test cases associated with it. The term Continuous Integration describes a software development infrastructure where code is automatically built and tested in short intervals - usually several times per day or at least every night (i. e. nightly build). This leads to a usable product very fast, but without the full feature set that grows additively, which allows for early testing. This method is often combined with test-driven development. Here, unit tests are written before the actual implementation and automatically tested. III. SECURING THE HARDWARE DEVELOPMENT The goal is the enhancement of the state-of-the-art hardware development process to increase hardware security by adapting methods from trustworthy software engineering. However, due to the differences between hardware and software development (see Section II-C), the respective methods have to be chosen carefully. This way, an adequate hardware development process is constructed to decrease the possibility of Hardware Trojans.In detail, four steps are taken: Threat modeling: Based on the attack types (see Section II-B) and Hardware Trojan descriptions, summarized by [5], we analyze their point of insertion. The entity of these points are referred to as attack surface. The analysis reveals the advantages and disadvantages of introducing malware at a certain
4 phase of the development process. Thereby, the perspectives of both stakeholders, i. e. developers and attackers, are included to get a comprehensive picture. Adoption of methods: Methods which are identified as applicable, will have to be modified. In this step, we will prove the feasibility of the method s introduction and define further the requirements which have to be fulfilled. Definition of detection cycle: After all pre-requirements have been presented, the detection cycle is assembled and described in detail. Further, the combination of automation and human intervention is explained. Evaluation: The final evaluation demonstrates that the detection cycle fulfills the target to successfully detect hardware Trojans. Thereby we rely on test implementations of malware from a Hardware Trojan Kit [6]. We exemplify the evaluation of one Hardware Trojan implementation. The evaluation also reveals the limitations of our approach. A. Threat Model As described in Section II-B, malware can be introduced in different stages of the production process. Each stage has its own representation and bears its own risks and advantages for an attacker. Malfunctionality planted into the (machine readable) specification or design needs to be hidden in a very elaborate way, since specifications are seen and checked from designers, testers and developers, and are heavily reviewed. An attack in the implementation phase (i.e. design attack) allows an attacker to access high level functions as well as low level signals. The main advantage for the attacker is the low effort of integrating the malfunction, but bears the risks of being detected by unit tests. In reaction, an attacker can insert its modifications into the glue logic between modules or spread parts of the Trojan across different modules. Netlist modifications are hard to comprehend for humans and require the attacker to implement its Trojan in very low level terms. This can however lead to a lean and sophisticated modification with a minimum number of changed gates and interconnects. Besides that, the synthesis tool itself can be Trojanized and simply include and hide the hardware Trojan everytime the chip synthesis is performed (synthesis attacker). Mask modifications and attacks during fabrication introduce even more subtle changes [7] to the circuit, but require a very deep understanding of the circuitry and the production process (fabrication attacker). We assume that the earlier in the production stage a Trojan is inserted, the more hints for its existence will be scattered through the project artifacts. B. Traceability in Hardware We propose to use traceability in hardware development like in software development (Section II-D). The detailed specification is developed based on the requirements and recorded in a first table (Figure 3, left table). Every specification document has its own history. Single authors are linked to single specifications or paragraphs. These specifications are the basis for creating tests. Test cases are related to the specification points they cover (middle table), the involved test engineers and later on also to the covered source code lines. Implementation is again based on the specifications. A source code management system is able to track each version and to relate source code parts to single authors and the specification or change request, effectively ensuring traceability of every revision of each source code line. Even the frequent use of 3rd party IPs does not require special treatment, as third-party libraries are also known in software development. However, the circuit- and netlist generation work in a completely different way than in software development. The generated logic and circuitry tend to be heavily optimized. Nested netlists (often generated for visualization) contain some meta-information (e.g. the module or process name). In this stage it is trivial to attach source code references to the elements - in fact many of today s development environments do this to some degree. However, flattened or technology-mapped netlists are optimized regardless of the module s boundaries. Depending on the target platform, the output of the synthesis might be individual gates or lookuptables (in FPGAs). An optimizer has to merge these source code reference labels accordingly, e. g. labels for merged elements accumulate in the resulting element. However, the output signal of an entirely removed individual element is typically substituted with a static connection to either logic 0 or 1 as the input for the next element. If the latter, this input inherits the labels, not the global logic 0 or 1 source. In other cases, such as entirely removed address bus lines accompanied by resized or removed address decoders, collecting all labels doesn t seem so helpful and needs some balance. Preserving meta-data in external facilities provides some additional challenges. For example, a standardized extension to the GDS II (Graphic Database System) file format is required. GDS II is the de facto industry standard for IC layout-related data. We believe that the novel approach of uninterrupted traceability from requirements to source code to each individual transistor is very helpful in a number of (debug) tasks, not only in the particular one we describe in the next section. C. Detection Cycle As attacks occur on many different levels and in different development phases providing various possibilities of detection, we propose a multi-phase detection feedback cycle - similar to those used for machine learning (Figure 4). In a first step, a knowledge base for properties and working principals of Hardware Trojans is implemented. It includes expert knowledge, theoretical and practical descriptions from literature, real world examples, implementations and lessons learned example implementations (see Section IV-A for further explanations and examples). From this knowledge base, a set of rules and patterns is extracted for the different design phases and verification steps. These include but are not limited to: design rule checks, negative source code patterns, negative netlist sub-graphs, structural rules, and formal verification rules. These rules are then applied to the design and implementation artifacts in regular time intervals (e.g. in automated nightly test runs). It automatically selects the appropriate examination methods for the right development phase.
5 Fig. 3. Proposed traceability in hardware development Suspicious structures flagged by the testing procedures are then presented to a senior tester or senior quality assurance engineer. Thanks to the previously introduced full traceability, they can trace back these structures to the source code, the author(s) of the appropriate lines, every change that was made (history), the design requirement supposedly covered by the code, and the respective test cases. After the assessment the tester either flags the structure as malicious or as a genuinely wanted artefact. The latter is followed by an error analysis. As the precision of detection rules is not perfect and false-positives are going to occur, this information is fed back into the loop. In case the incident is specific to the project, an exception into the rule set is added or a specific construct (e.g. netlist area or lines of source codes) is white-listed. If the findings (true- or false-positive) lead to a new insight or knowledge, the knowledge base is extended. IV. EVALUATION AND DISCUSSION For evaluation, we used the Hardware Trojan Kit [6] which allows the modular construction of hardware Trojans based on the attributes activation, covert communication, payload and detection. Based on the implemented modules, various rules and properties that are used to construct a first knowledge base for Trojan detection are inferred. While Trojans will rarely come in neatly capsuled modules, they are helpful in analyzing structures and generating new variants. A. Setup The modules were developed and tested on several Xilinx FPGAs. The sources as well as the synthesized artifacts were then analyzed for typical properties and characteristics and revealed typical malware structures, which may serve as a strong indicator to reveal malicious hardware and are provided in the following list: Asynchronous latch: A latch not clocked by one of the typically low number of global clocks. Gated wire or output: A signal filtered by another gate to falsify its output. Ring oscillator: A combinatorial loop without a constant frequency. Unused pin or bond wire: Can be used for dissemination, e. g. for electromagnetic radiation. Hidden finite state machine (FSM) state(s): Depending on the encoding (e. g. one-hot- v.s. sequential encoding) can be hard to detect. Latch or Flipflop independent from global reset Local or gated clock: Typically most gates are controlled by one of the global clocks. B. Use-case We exemplify our findings based on a ring oscillator (RO). In its simplest case, a RO is a cycle of an odd number of inverters feeding the output back to the input. It will then start to oscillate with a frequency depending on the gate and transmission delays. This specific structure can be found in some Trojan examples (e. g. side channels, independent
6 Fig. 4. Proposed detection cycle clock, ambient temperature measuring) as well as legitimate uses (e. g. random number generators, physical unclonable functions). However, since this is a structure used in multiple Trojan examples, it is included into the knowledge base. Multiple rules can be inferred to detect such structures. We derived the following rules that are aimed at mitigating the risk of using a ring oscillator: In formal verification, a specific rule forbids substructures with outputs, but without digital inputs. On source code level, a rule reports the use of optimizing-inhibiting compiler- or source code flags 2. In this special case, most synthesis tools will try to optimize NOT(NOT(A)) back into A, effectively removing the RO. A structural graph pattern searches the netlist for ring sub-graphs of this type. Equivalent rules have also been found for the other malicious structures described in Section IV-A, enabling their successful detection. C. Discussion As described in Section III-C, the detection life cycle accompanies the development process through different phases with a phase-dependent rule set derived from a common knowledge base. This way, our approach is effective against design-, synthesis- and partly against fabrication attackers because the life cycle is applied in the respective phases of the 2 e. g. keep- and noprune-attributes in VHDL hardware development process. It will not work on distribution attacks. We assume, that every included Trojan leaves some evidence or hint of its existence in the project s artifacts. However, each detection rule has only a certain probability of detecting a particular Trojan based on a hint. The more hints there are, or the earlier in the development the Trojan is inserted, the more scans they are going to be subject to. Therefore the rare case of multiple Trojans injected into one IC is going to leave more hints, thus making the detection even easier. Another problem are dual-use structures. However, since we already established that a RO as well as all of the patterns listed above might have legitimate uses, the flagged structures are presented to the senior engineer for approval. The above example also demonstrates why it might be favorable to have stricter rules: it is better to produce falsepositives (which are then reviewed) than to produce falsenegatives that might slip through the detection process. D. Limitations One limitation of our detection cycle approach is that it depends on the quality of the verification, property and rule sets to detect Trojans. Therefore it is designed as feedback loop: as it is used, it accumulates new knowledge, refines its rules and matures over time. Many of the examinations and checks can be automated. It therefore complements approaches like [2] and partly incorporates [8]. Rule sets and knowledge base can be shared among industry, similar to personal computer anti-virus companies sharing their knowledge and fingerprints with each other.
7 V. RELATED WORK A number of publications has been presented to provide methods for Hardware Trojan detection. Applying formal verification, i. e. verifying the equivalence of two design representations, leads to the method of Structural Checking [9], [10]. Other methods target Trojan activation by finding the rare events which serve as trigger. Additional methods reduce the overall test effort, e. g. via statistical analysis or state space obfuscation [11], [12]. It is also possible to compare physical parameters of a chip to a Trojan-free reference chip the golden model allowing the detection of side channels [13] [15]. Invasion refers to the insertion of additional circuits into a design without changing its original functionality in order to test it after production [13], [16]. In combination with Trojan detection, their localization is also of interest. Thereby, activation means maximizing the Trojan activity while reducing the remaining parts activity [17] [19], whereas mensuration means gaining the regional information from side channel measurements [14], [15]. All these papers focus on the technical aspects of detection and mitigation strategies. However, currently this knowledge has not been systematically integrated into development processes, which is required to encounter Trojans in an organized way. Our life cycle allows to systematically integrate them now. In [2] Khattri et al. present a Hardware Security Development Lifecycle. Identifying the lack of adequate tools for static analysis of hardware description languages and a comprehensive collection of hardware threats, a life cycle consisting of five phases was developed based on the experience of secure software engineering. An initial security assessment is followed by an architecture review and a design review. Finally, pre-silicon and post-silicon testing is performed in an implementation review and in a penetration test. It remains unclear how this penetration testing works without a comprehensive thread collection. Our approach overcomes this by adopting a reinforcement learning technique into the detection cycle, similar to the one used in machine learning. Thereby, the lack of a threat collection is handled by creating it during the iterations of the presented process. VI. CONCLUSION Hardware Trojans are a type of malware which are realized in silicon and are a severe thread to our daily life. While sophisticated experience and knowledge regarding secure software development are available, respective counterparts for hardware developing is still lacking. In this paper, we proposed a Hardware Trojan Detection cycle which is applicable in the traditional hardware development process. Within the iterative cycle, rules and patterns leading to a rule set are extracted from a knowledge base. Automatic tests flag suspicious structures, which are forwarded to a senior tester. He/She is able to trace back these structures and decide whether they are malware. If identified as malware, an error analysis is performed and the gained knowledge is fed back to the knowledge base. The detection cycle accompanies the development phases while constantly extending its knowledge and adapting. Thereby it is taken into account, that some properties of malware are easier to detect in artifacts of particular development phases which is considered by a detection cycle containing adaptive phase dependent rule sets. It is effective against design and synthesis attackers and partly against fabrication attackers. Being a precondition for the appliance of the Detection cycle, we introduced the novel technique of gap less traceability from every requirement of the specification down to each single transistor. Its implementation demands extensions to today s synthesis tools. Further, it will require a gentle tradeoff between label explosion due to optimization and the level of insight. Once implemented it is able to provide valuable insight and debug features even beyond the purpose of Hardware Trojan detection, e. g. re-usability of modules. ACKNOWLEDGMENTS This work was supported by the FIT-IT program (project number ) and the COMET K1 program by FFG (Austrian Research Funding Agency). REFERENCES [1] X. Wang, S. Narasimhan, A. R. Krishna, T. Mal-Sarkar, and S. Bhunia, Sequential hardware trojan: Side-channel aware design and placement, in 2011 IEEE 29th International Conference on Computer Design (ICCD), 2011, pp [2] H. Khattri, N. K. V. Mangipudi, and S. Mandujano, Hsdl: A security development lifecycle for hardware technologies, in Hardware- Oriented Security and Trust (HOST), 2012 IEEE International Symposium on. IEEE, 2012, pp [3] A. Baumgarten, M. Steffen, M. Clausman, and J. Zambreno, A case study in hardware Trojan design and implementation, in International Journal of Information Security, 2010, vol. 10, pp [4] O. C. Gotel and C. Finkelstein, An analysis of the requirements traceability problem, in Requirements Engineering, 1994., Proceedings of the First International Conference on. IEEE, 1994, pp [5] C. Krieg, A. Dabrowski, H. Hobel, K. Krombholz, and E. Weippl, Hardware malware, Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, no. 2, pp , [6] A. Dabrowski, P. Fejes, J. Ullrich, K. Krombholz, H. Hobel, and E. Weippl, Poster: Hardware trojans - detect and react? in Network and Distributed System Security (NDSS) Symposium, 2014, Extended Abstract and Poster Session. Internet Society, [7] G. Becker, F. Regazzoni, C. Paar, and W. Burleson, Stealthy dopantlevel hardware trojans, in Cryptographic Hardware and Embedded Systems - CHES 2013, ser. Lecture Notes in Computer Science, G. Bertoni and J.-S. Coron, Eds. Springer Berlin Heidelberg, 2013, vol. 8086, pp [8] M. Rathmair and F. Schupfer, Hardware trojan detection by specifying malicious circuit properties, in Proceedings of 2013 IEEE 4th International Conference on Electronics Information and Emergency Communication, 2013, pp [9] S. Smith and J. Di, Detecting Malicious Logic Through Structural Checking, in IEEE Region : Proceedings of the Region 5 Technical Conference, 2007, pp [10] X. Zhang and M. Tehranipoor, Case study: Detecting hardware Trojans in third-party digital IP cores, in HOST 2011: Proceedings of the IEEE Hardware-Oriented Security and Trust Symposium, 2011, pp [11] R. S. Chakraborty and S. Bhunia, Security against hardware Trojan through a novel application of design obfuscation, in ICCAD 2009: Proceedings of the International Conference on Computer-Aided Design, 2009, pp [12] M. Banga and M. Hsiao, A region based approach for the identification of hardware Trojans, in HOST 2008: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008, pp
8 [13] C. Lamech, R. Rad, M. Tehrani, and J. Plusquellic, An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities, in IEEE Transactions on Information Forensics and Security, 2011, vol. 6, pp [14] X. Zhang, N. Tuzzio, and M. Tehranipoor, Red team: Design of intelligent hardware trojans with known defense schemes, in 2011 IEEE 29th International Conference on Computer Design (ICCD), 2011, pp [15] F. Koushanfar and A. Mirhoseini, A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection, in IEEE Transactions on Information Forensics and Security, 2011, vol. 6, pp [16] H. Salmani, M. Tehranipoor, and J. Plusquellic, A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, [17] M. Banga and M. Hsiao, A Novel Sustained Vector Technique for the Detection of Hardware Trojans, in VLSI Design 2009: 22nd International Conference on VLSI Design, 2009, pp [18] H. Salmani, M. Tehranipoor, and J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, in WIFS 2010: Proceedings of the International Workshop on Information Forensics and Security, 2010, pp [19] S. Wei, S. Meguerdichian, and M. Potkonjak, Gate-level characterization: Foundations and hardware security applications, in DAC 2010: Proceedings of the 47th Conference on Design Automation, 2010, pp
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
Understanding Integrated Circuit Security Threats. Asif Iqbal Senior Program Manager, Apple Inc. SDM 11
Understanding Integrated Circuit Security Threats Asif Iqbal Senior Program Manager, Apple Inc. SDM 11 Outline Vulnerability at different layers and relative impact Some Cases and Proof of Concepts Integrated
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Introduction to Digital System Design
Introduction to Digital System Design Chapter 1 1 Outline 1. Why Digital? 2. Device Technologies 3. System Representation 4. Abstraction 5. Development Tasks 6. Development Flow Chapter 1 2 1. Why Digital
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
An Integrated Quality Assurance Framework for Specifying Business Information Systems
An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems Melanie Berg 1, Kenneth LaBel 2 1.AS&D in support of NASA/GSFC [email protected] 2. NASA/GSFC [email protected]
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.
Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: [email protected] Website: http://www.netragard.com Blog: http://pentest.netragard.com
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
3 SOFTWARE AND PROGRAMMING LANGUAGES
3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
The Security Development Lifecycle. OWASP 24 June 2010. The OWASP Foundation http://www.owasp.org
The Security Development Lifecycle 24 June 2010 Steve Lipner Senior Director of Security Engineering Strategy Trustworthy Computing Microsoft Corporation [email protected] +1 425 705-5082 Copyright
CHAPTER 3 Boolean Algebra and Digital Logic
CHAPTER 3 Boolean Algebra and Digital Logic 3.1 Introduction 121 3.2 Boolean Algebra 122 3.2.1 Boolean Expressions 123 3.2.2 Boolean Identities 124 3.2.3 Simplification of Boolean Expressions 126 3.2.4
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001
Agenda Introduzione Il mercato Dal circuito integrato al System on a Chip (SoC) La progettazione di un SoC La tecnologia Una fabbrica di circuiti integrati 28 How to handle complexity G The engineering
A New Proposed Software Engineering Methodologyfor Healthcare Applications Development
Vol. 3, Issue. 3, May.-June. 2013 pp-1566-1570 ISSN: 2249-6645 A New Proposed Software Engineering Methodologyfor Healthcare Applications Development Abdullah Al-Dahmash, Samir El-Masri Department of Information
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
Topics of Chapter 5 Sequential Machines. Memory elements. Memory element terminology. Clock terminology
Topics of Chapter 5 Sequential Machines Memory elements Memory elements. Basics of sequential machines. Clocking issues. Two-phase clocking. Testing of combinational (Chapter 4) and sequential (Chapter
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
Memory Systems. Static Random Access Memory (SRAM) Cell
Memory Systems This chapter begins the discussion of memory systems from the implementation of a single bit. The architecture of memory chips is then constructed using arrays of bit implementations coupled
Digital Systems Design! Lecture 1 - Introduction!!
ECE 3401! Digital Systems Design! Lecture 1 - Introduction!! Course Basics Classes: Tu/Th 11-12:15, ITE 127 Instructor Mohammad Tehranipoor Office hours: T 1-2pm, or upon appointments @ ITE 441 Email:
Modellistica Medica. Maria Grazia Pia, INFN Genova. Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003
Modellistica Medica Maria Grazia Pia INFN Genova Scuola di Specializzazione in Fisica Sanitaria Genova Anno Accademico 2002-2003 Lezione 18-19 The Unified Process Static dimension Glossary UP (Unified
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle
A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier
TIMING-DRIVEN PHYSICAL DESIGN FOR DIGITAL SYNCHRONOUS VLSI CIRCUITS USING RESONANT CLOCKING
TIMING-DRIVEN PHYSICAL DESIGN FOR DIGITAL SYNCHRONOUS VLSI CIRCUITS USING RESONANT CLOCKING BARIS TASKIN, JOHN WOOD, IVAN S. KOURTEV February 28, 2005 Research Objective Objective: Electronic design automation
Testing & Verification of Digital Circuits ECE/CS 5745/6745. Hardware Verification using Symbolic Computation
Testing & Verification of Digital Circuits ECE/CS 5745/6745 Hardware Verification using Symbolic Computation Instructor: Priyank Kalla ([email protected]) 3 Credits Mon, Wed, 1:25-2:45pm, WEB L105 Office
Towards Collaborative Requirements Engineering Tool for ERP product customization
Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
KEEP IT SYNPLE STUPID
Utilizing Programmable Logic for Analyzing Hardware Targets Dmitry Nedospasov SHORT DESCRIPTION Hardware security analysis differs from software security analysis primarily in the tools
Certified Software Quality Engineer (CSQE) Body of Knowledge
Certified Software Quality Engineer (CSQE) Body of Knowledge The topics in this Body of Knowledge include additional detail in the form of subtext explanations and the cognitive level at which the questions
EE 42/100 Lecture 24: Latches and Flip Flops. Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad
A. M. Niknejad University of California, Berkeley EE 100 / 42 Lecture 24 p. 1/20 EE 42/100 Lecture 24: Latches and Flip Flops ELECTRONICS Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad University of California,
In the IEEE Standard Glossary of Software Engineering Terminology the Software Life Cycle is:
In the IEEE Standard Glossary of Software Engineering Terminology the Software Life Cycle is: The period of time that starts when a software product is conceived and ends when the product is no longer
New Generation of Software Development
New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 [email protected] ABSTRACT In this paper, I present a picture of what software development
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Design Compiler Graphical Create a Better Starting Point for Faster Physical Implementation
Datasheet Create a Better Starting Point for Faster Physical Implementation Overview Continuing the trend of delivering innovative synthesis technology, Design Compiler Graphical delivers superior quality
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Module 2. Software Life Cycle Model. Version 2 CSE IIT, Kharagpur
Module 2 Software Life Cycle Model Lesson 4 Prototyping and Spiral Life Cycle Models Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a prototype is.
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Hardware Trojans: A Threat for CyberSecurity
Hardware Trojans: A Threat for CyberSecurity Julien Francq [email protected] Cassidian CyberSecurity 2013, July the 8th Outline 1 Introduction to Hardware Trojans 2 3 4 5 2 1 Introduction to
6. Software Lifecycle Models. A software lifecycle model is a standardised format for planning organising, and running a new development project.
6. Software Lifecycle Models A software lifecycle model is a standardised format for planning organising, and running a new development project. Hundreds of different kinds of models are known and used.
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Lecture 7: Clocking of VLSI Systems
Lecture 7: Clocking of VLSI Systems MAH, AEN EE271 Lecture 7 1 Overview Reading Wolf 5.3 Two-Phase Clocking (good description) W&E 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.9, 5.5.10 - Clocking Note: The analysis
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Clifford Wolf, Johann Glaser, Florian Schupfer, Jan Haase, Christoph Grimm Computer Technology /99 Overview Ultra-Low-Power
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
PowerPC Microprocessor Clock Modes
nc. Freescale Semiconductor AN1269 (Freescale Order Number) 1/96 Application Note PowerPC Microprocessor Clock Modes The PowerPC microprocessors offer customers numerous clocking options. An internal phase-lock
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao.
Logging makes sense for testbench debug The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. SystemVerilog provides
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Objectives: Analyze the operation of sequential logic circuits. Understand the operation of digital counters.
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE
INTRODUCTION TO DIGITAL SYSTEMS 1 DESCRIPTION AND DESIGN OF DIGITAL SYSTEMS FORMAL BASIS: SWITCHING ALGEBRA IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE COURSE EMPHASIS:
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
How To Design An Information System
Information system for production and mounting of plastic windows MARCEL, MELIŠ Slovak University of Technology - Faculty of Material Sciences and Technology in Trnava, Paulínska 16 street, Trnava, 917
Virtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX
White Paper Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX April 2010 Cy Hay Product Manager, Synopsys Introduction The most important trend
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013
Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
CS Matters in Maryland CS Principles Course
CS Matters in Maryland CS Principles Course Curriculum Overview Project Goals Computer Science (CS) Matters in Maryland is an NSF supported effort to increase the availability and quality of high school
Orchestrated. Release Management. Gain insight and control, eliminate ineffective handoffs, and automate application deployments
Orchestrated Release Management Gain insight and control, eliminate ineffective handoffs, and automate application deployments Solution Brief Challenges Release management processes have been characterized
Design Verification and Test of Digital VLSI Circuits NPTEL Video Course. Module-VII Lecture-I Introduction to Digital VLSI Testing
Design Verification and Test of Digital VLSI Circuits NPTEL Video Course Module-VII Lecture-I Introduction to Digital VLSI Testing VLSI Design, Verification and Test Flow Customer's Requirements Specifications
Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
Testing of Digital System-on- Chip (SoC)
Testing of Digital System-on- Chip (SoC) 1 Outline of the Talk Introduction to system-on-chip (SoC) design Approaches to SoC design SoC test requirements and challenges Core test wrapper P1500 core test
How To Integrate Intelligence Based Security Into Your Organisation
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Threat Intelligence Managed Intelligence Service Did you know that the faster you detect a security breach, the lesser the impact to
7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System
Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System Wang Huan, Li Changliang, Wang Dianlong Anshan Iron and Steel Group Corporation Mining Industry Company Abstract:
