Search Results - "Fung, Jason M"
-
1
Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities
Published in IEEE transactions on emerging topics in computing (01-07-2017)“…The papers in this special issue focus on security concerns and opportunities for emerging post-CMOS nanoscale devices. Security implications for these…”
Get full text
Journal Article -
2
Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-06-2021)“…System integrators create heterogeneous systems-on-chip (SoCs) by integrating numerous third-party intellectual property blocks (3PIPs) to achieve…”
Get full text
Journal Article -
3
An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors
Published in IEEE transactions on computers (01-01-2023)“…Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, such as Spectre and Meltdown, in particular,…”
Get full text
Journal Article -
4
Hardware-Supported Patching of Security Bugs in Hardware IP Blocks
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-01-2023)“…To satisfy various design requirements and application needs, designers integrate multiple intellectual property blocks (IPs) to produce a system on chip…”
Get full text
Journal Article -
5
Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
Published in IEEE journal on emerging and selected topics in circuits and systems (01-06-2021)“…This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (JETCAS) is dedicated to demonstrating the latest research…”
Get full text
Journal Article -
6
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security
Published in IEEE journal on emerging and selected topics in circuits and systems (01-06-2021)“…The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two…”
Get full text
Journal Article -
7
Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK
Published in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09-07-2023)“…This work presents a power side-channel analysis (SCA) of a lightweight cryptography (LWC) algorithm, XOODYAK, implemented on an FPGA. First, we perform…”
Get full text
Conference Proceeding -
8
Secure-by-Construction Design Methodology for CPUs: Implementing Secure Speculation on the RTL
Published in 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) (28-10-2023)“…Spectre and Meltdown attacks proved Transient Execution Side Channels to be a notable challenge for designing secure microarchitectures. Various…”
Get full text
Conference Proceeding -
9
Theoretical Patchability Quantification for IP-Level Hardware Patching Designs
Published in 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC) (22-01-2024)“…As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators…”
Get full text
Conference Proceeding -
10
Methodology of Assessing Information Leakage through Software-Accessible Telemetries
Published in 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (12-12-2021)“…Modern computer systems offer a multitude of software-accessible telemetries to report system usage status. Recent research has shown a risk of sensitive…”
Get full text
Conference Proceeding -
11
Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design
Published in 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (29-10-2022)“…To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns…”
Get full text
Conference Proceeding -
12
INVITED: Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs
Published in 2019 56th ACM/IEEE Design Automation Conference (DAC) (01-06-2019)“…We present an effective methodology for formally verifying security-critical flows in a commercial System-on-Chip (SoC) which involve extensive interaction…”
Get full text
Conference Proceeding -
13
Theoretical Patchability Quantification for IP-Level Hardware Patching Designs
Published 07-11-2023“…As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators…”
Get full text
Journal Article -
14
An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors
Published 22-02-2022“…Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, in particular, pose a genuine threat to the…”
Get full text
Journal Article -
15
Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design
Published 02-09-2022“…To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns…”
Get full text
Journal Article -
16
Formal Security Verification of Concurrent Firmware in SoCs using Instruction-Level Abstraction for Hardware
Published in 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC) (01-06-2018)“…Formal security verification of firmware interacting with hardware in modern Systems-on-Chip (SoCs) is a critical research problem. This faces the following…”
Get full text
Conference Proceeding -
17
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Published 01-12-2018“…In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect…”
Get full text
Journal Article