Detecting hardware trojans in PCBs using side channel loopbacks

H Pearce, VR Surabhi, P Krishnamurthy… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
Malicious modifications to printed circuit boards (PCBs) are known as hardware Trojans.
These may arise when malafide third parties alter PCBs premanufacturing or …

Design obfuscation through 3-D split fabrication with smart partitioning

T Nigussie, JC Schabel, S Lipa… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
We describe a design and fabrication experiment that has been performed to investigate a
methodology for assessing the security of application specific integrated circuits (ASICs) …

Systems and methods for remediating memory corruption in a computer application

SV Gupta - US Patent 11,409,870, 2022 - Google Patents
In example embodiments, systems and methods extract a model of a computer application
during load time and store the model in memory. Embodiments may insert instructions into …

Multi-variant Execution at the Edge

J Cabrera Arteaga, P Laperdrix, M Monperrus… - Proceedings of the 9th …, 2022 - dl.acm.org
Edge-Cloud computing offloads parts of the computations that traditionally occurs in the
cloud to edge nodes. The binary format WebAssembly is increasingly used to distribute and …

[图书][B] Open Source Platforms for Enabling Full-Stack Hardware-Software Research

JM Balkind - 2022 - search.proquest.com
Hardware-software research routinely starts with modelling. High-level models can capture
much of the desired system behaviour needed to begin evaluating architectural research …

Diverse, Neural Trojan Resilient Ecosystem of Neural Network IP

B Olney, R Karam - ACM Journal on Emerging Technologies in …, 2022 - dl.acm.org
Adversarial machine learning is a prominent research area aimed towards exposing and
mitigating security vulnerabilities in AI/ML algorithms and their implementations. Data …

Software Diversity for Third-Party Dependencies

N Harrand - 2022 - diva-portal.org
Thanks to the emergence of package managers and online software repositories, modern
software development heavily relies on the reuse of third-party libraries. This practice has …

多变体执行误报问题分析与解决方法综述.

席睿成, 张铮, 朱鹏喆, 刘子敬 - Application Research of …, 2022 - search.ebscohost.com
从安全角度出发, 多变体执行(multi variantexecution, MVX) 被广泛应用于网络安全防御,
但多变体执行存在一个共性问题: 即各路执行体向裁决器返回内容时, 合路产生的误报难以解决 …

Back to the future: N-Versioning of Microservices

AM Espinoza, R Wood, S Forrest… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Microservices are the dominant architecture used to build internet-scale applications today.
Being internet-facing, their most critical attack surfaces are the OWASP top 10 Web …

Hardware Based RISC-V Instruction Set Randomization

S Zuo, J Zhuang, Y Liu, M Wang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Instruction set randomization has been proposed for many years as a strategy against code
injection. However, most of the methods are based entirely on software, which is vulnerable …