Search Results - "Fung, Jason"
-
1
Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-06-2021)“…System integrators create heterogeneous systems-on-chip (SoCs) by integrating numerous third-party intellectual property blocks (3PIPs) to achieve…”
Get full text
Journal Article -
2
An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors
Published in IEEE transactions on computers (01-01-2023)“…Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, such as Spectre and Meltdown, in particular,…”
Get full text
Journal Article -
3
Hardware-Supported Patching of Security Bugs in Hardware IP Blocks
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-01-2023)“…To satisfy various design requirements and application needs, designers integrate multiple intellectual property blocks (IPs) to produce a system on chip…”
Get full text
Journal Article -
4
Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
Published in IEEE journal on emerging and selected topics in circuits and systems (01-06-2021)“…This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (JETCAS) is dedicated to demonstrating the latest research…”
Get full text
Journal Article -
5
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security
Published in IEEE journal on emerging and selected topics in circuits and systems (01-06-2021)“…The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two…”
Get full text
Journal Article -
6
Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK
Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09-07-2023)“…This work presents a power side-channel analysis (SCA) of a lightweight cryptography (LWC) algorithm, XOODYAK, implemented on an FPGA. First, we perform…”
Get full text
Conference Proceeding -
7
Secure-by-Construction Design Methodology for CPUs: Implementing Secure Speculation on the RTL
Published in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) (28-10-2023)“…Spectre and Meltdown attacks proved Transient Execution Side Channels to be a notable challenge for designing secure microarchitectures. Various…”
Get full text
Conference Proceeding -
8
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities
Published in IEEE transactions on emerging topics in computing (01-07-2017)“…The papers in this special issue focus on security concerns and opportunities for emerging post-CMOS nanoscale devices. Security implications for these…”
Get full text
Journal Article -
9
Hyperinsulinemia and Insulin Resistance: Scope of the Problem
Published in Journal of Metabolic Health (30-12-2016)Get full text
Journal Article -
10
Emergency Isolation Valves at Pump Suction: Application for Flammable Liquids
Published in Chemical engineering transactions (01-01-2016)“…Emergency Isolation Valves (EIVs) are commonly provided at pump suction for butane and more volatile products and also for liquids handled above auto-ignition…”
Get full text
Journal Article -
11
Therapeutic fasting as a potential effective treatment for type 2 diabetes : a 4-month case study
Published in Journal of Metabolic Health (15-12-2017)“…Lifestyle therapy is an integral part of type 2 diabetes (T2D) management, but there remains no consensus on an optimal diet. The objective of this study is to…”
Get full text
Journal Article -
12
Enhanced properties of graphene/fly ash geopolymeric composite cement
Published in Cement and concrete research (01-01-2015)“…This paper reports for the first time the incorporation of in-situ reduced graphene oxide (rGO) into geopolymers. The resulting rGO–geopolymeric composites are…”
Get full text
Journal Article -
13
Theoretical Patchability Quantification for IP-Level Hardware Patching Designs
Published in 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC) (22-01-2024)“…As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators…”
Get full text
Conference Proceeding -
14
944-P: Continuous Glucose Monitoring (CGM) Sampling Duration to Estimate Long-Term Glycemic Control in Adults with T2D Not Using Insulin
Published in Diabetes (New York, N.Y.) (20-06-2023)“…Objective: Current consensus is that 10-14 days of continuous glucose monitoring (CGM) sampling time is adequate to assess long-term glycemic control in T1D…”
Get full text
Journal Article -
15
943-P: Improved Glycemic Outcomes after One Year among Level 2 Members
Published in Diabetes (New York, N.Y.) (20-06-2023)“…Background: Level2’s virtual specialty clinic, offered across the United States to people with type 2 diabetes on participating insurance plans, combines…”
Get full text
Journal Article -
16
Methodology of Assessing Information Leakage through Software-Accessible Telemetries
Published in 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (12-12-2021)“…Modern computer systems offer a multitude of software-accessible telemetries to report system usage status. Recent research has shown a risk of sensitive…”
Get full text
Conference Proceeding -
17
Therapeutic use of intermittent fasting for people with type 2 diabetes as an alternative to insulin
Published in BMJ case reports (09-10-2018)“…This case series documents three patients referred to the Intensive Dietary Management clinic in Toronto, Canada, for insulin-dependent type 2 diabetes. It…”
Get full text
Journal Article -
18
Cu-impregnated alumina/silica bed materials for Chemical Looping Reforming of biomass gasification gas
Published in Fuel (Guildford) (15-09-2016)“…Raw gas derived from low-temperature biomass gasification usually contains condensable hydrocarbons referred to as “tars” as well as other hydrocarbons such as…”
Get full text
Journal Article -
19
Chemical Injury to the Eye from Trichloroacetic Acid
Published in Dermatologic surgery (01-07-2002)“…background. Trichloroacetic acid (TCA) is frequently utilized for chemical peeling by physicians practicing dermatologic surgery. Ocular complications from TCA…”
Get full text
Journal Article -
20
Optimal Placement of TDC Sensor for Enhanced Power Side-Channel Assessment on FPGAS
Published in 2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID) (06-01-2024)“…Power side-channel analysis (SCA) attack significantly threatens the security of cryptographic algorithms, which are otherwise computationally secure. Hence,…”
Get full text
Conference Proceeding