Search Results - "Fung, Jason M"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Guest Editors Introduction: Security of Beyond CMOS Devices: Issues and Opportunities by Bhunia, Swarup, Chen, An, Sinanoglu, Ozgur, M. Fung, Jason

    “…The papers in this special issue focus on security concerns and opportunities for emerging post-CMOS nanoscale devices. Security implications for these…”
    Get full text
    Journal Article
  2. 2

    Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip by Tan, Benjamin, Elnaggar, Rana, Fung, Jason M., Karri, Ramesh, Chakrabarty, Krishnendu

    “…System integrators create heterogeneous systems-on-chip (SoCs) by integrating numerous third-party intellectual property blocks (3PIPs) to achieve…”
    Get full text
    Journal Article
  3. 3

    An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors by Fadiheh, Mohammad Rahmani, Wezel, Alex, Muller, Johannes, Bormann, Jorg, Ray, Sayak, Fung, Jason M., Mitra, Subhasish, Stoffel, Dominik, Kunz, Wolfgang

    Published in IEEE transactions on computers (01-01-2023)
    “…Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, such as Spectre and Meltdown, in particular,…”
    Get full text
    Journal Article
  4. 4

    Hardware-Supported Patching of Security Bugs in Hardware IP Blocks by Liu, Wei-Kai, Tan, Benjamin, Fung, Jason M., Karri, Ramesh, Chakrabarty, Krishnendu

    “…To satisfy various design requirements and application needs, designers integrate multiple intellectual property blocks (IPs) to produce a system on chip…”
    Get full text
    Journal Article
  5. 5

    Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions by Karimi, Naghmeh, Basu, Kanad, Chang, Chip-Hong, Fung, Jason M.

    “…This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS (JETCAS) is dedicated to demonstrating the latest research…”
    Get full text
    Journal Article
  6. 6

    Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security by Liu, Wenye, Chang, Chip-Hong, Wang, Xueyang, Liu, Chen, Fung, Jason M., Ebrahimabadi, Mohammad, Karimi, Naghmeh, Meng, Xingyu, Basu, Kanad

    “…The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two…”
    Get full text
    Journal Article
  7. 7

    Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK by Golder, Anupam, Das, Debayan, Ghosh, Santosh, Varna, Avinash, Sabbagh, Majid, Ray, Sayak, Elnaggar, Rana, Friel, Joseph, Dinu, Daniel, Fung, Jason M.

    “…This work presents a power side-channel analysis (SCA) of a lightweight cryptography (LWC) algorithm, XOODYAK, implemented on an FPGA. First, we perform…”
    Get full text
    Conference Proceeding
  8. 8

    Secure-by-Construction Design Methodology for CPUs: Implementing Secure Speculation on the RTL by Jauch, Tobias, Wezel, Alex, Fadiheh, Mohammad R., Schmitz, Philipp, Ray, Sayak, Fung, Jason M., Fletcher, Christopher W., Stoffel, Dominik, Kunz, Wolfgang

    “…Spectre and Meltdown attacks proved Transient Execution Side Channels to be a notable challenge for designing secure microarchitectures. Various…”
    Get full text
    Conference Proceeding
  9. 9

    Theoretical Patchability Quantification for IP-Level Hardware Patching Designs by Liu, Wei-Kai, Tan, Benjamin, Fung, Jason M., Chakrabarty, Krishnendu

    “…As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators…”
    Get full text
    Conference Proceeding
  10. 10

    Methodology of Assessing Information Leakage through Software-Accessible Telemetries by Liu, Chen, Kar, Monodeep, Wang, Xueyang, Chawla, Nikhil, Roggel, Neer, Yuce, Bilgiday, Fung, Jason M.

    “…Modern computer systems offer a multitude of software-accessible telemetries to report system usage status. Recent research has shown a risk of sensitive…”
    Get full text
    Conference Proceeding
  11. 11

    Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design by Ahmad, Baleegh, Liu, Wei-Kai, Collini, Luca, Pearce, Hammond, Fung, Jason M., Valamehr, Jonathan, Bidmeshki, Mohammad, Sapiecha, Piotr, Brown, Steve, Chakrabarty, Krishnendu, Karri, Ramesh, Tan, Benjamin

    “…To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns…”
    Get full text
    Conference Proceeding
  12. 12

    INVITED: Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs by Ray, Sayak, Ghosh, Nishant, Masti, Ramya Jayaram, Kanuparthi, Arun, Fung, Jason M.

    “…We present an effective methodology for formally verifying security-critical flows in a commercial System-on-Chip (SoC) which involve extensive interaction…”
    Get full text
    Conference Proceeding
  13. 13

    Theoretical Patchability Quantification for IP-Level Hardware Patching Designs by Liu, Wei-Kai, Tan, Benjamin, Fung, Jason M, Chakrabarty, Krishnendu

    Published 07-11-2023
    “…As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators…”
    Get full text
    Journal Article
  14. 14

    An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors by Fadiheh, Mohammad Rahmani, Wezel, Alex, Mueller, Johannes, Bormann, Joerg, Ray, Sayak, Fung, Jason M, Mitra, Subhasish, Stoffel, Dominik, Kunz, Wolfgang

    Published 22-02-2022
    “…Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, in particular, pose a genuine threat to the…”
    Get full text
    Journal Article
  15. 15

    Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design by Ahmad, Baleegh, Liu, Wei-Kai, Collini, Luca, Pearce, Hammond, Fung, Jason M, Valamehr, Jonathan, Bidmeshki, Mohammad, Sapiecha, Piotr, Brown, Steve, Chakrabarty, Krishnendu, Karri, Ramesh, Tan, Benjamin

    Published 02-09-2022
    “…To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns…”
    Get full text
    Journal Article
  16. 16

    Formal Security Verification of Concurrent Firmware in SoCs using Instruction-Level Abstraction for Hardware by Huang, Bo-Yuan, Ray, Sayak, Gupta, Aarti, Fung, Jason M., Malik, Sharad

    “…Formal security verification of firmware interacting with hardware in modern Systems-on-Chip (SoCs) is a critical research problem. This faces the following…”
    Get full text
    Conference Proceeding
  17. 17

    When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs by Dessouky, Ghada, Gens, David, Haney, Patrick, Persyn, Garrett, Kanuparthi, Arun, Khattri, Hareesh, Fung, Jason M, Sadeghi, Ahmad-Reza, Rajendran, Jeyavijayan

    Published 01-12-2018
    “…In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect…”
    Get full text
    Journal Article