Zobrazeno 1 - 10
of 79
pro vyhledávání: '"David Keezer"'
Publikováno v:
Cryptography, Vol 2, Iss 3, p 20 (2018)
Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to d
Externí odkaz:
https://doaj.org/article/4a9f3cc3dd754bdb9a270314c30d6d01
Publikováno v:
Journal of Electronic Testing. 35:809-822
This paper proposes a new high-speed self-calibrating digital transmitter with the ability to deliver high quality signals at low hardware cost. The proposed self-calibrating system performs on-line monitoring of the channel by performing measurement
Publikováno v:
Journal of Hardware and Systems Security. 2:251-265
Corruption of data in embedded and medical devices can cause serious harm if not quickly detected. In this paper, we emphasize the part of the attack surface which entails inserting malicious hardware circuitry (Hardware Trojans) during the manufactu
Enhancing the Bandwidth of Low-Dropout Regulators Using Power Transmission Lines for High-Speed I/Os
Publikováno v:
IEEE Transactions on Components, Packaging and Manufacturing Technology. 7:533-543
Power supply rejection peaking in low-dropout (LDO) voltage regulators can lead to reduced bandwidth and efficiency. This paper presents a new design method by combining power transmission lines (PTLs) with LDOs for enhancing its bandwidth and effici
Autor:
Jingchi Yang, David Keezer
Publikováno v:
ITC
This paper introduces a scalable framework for the design of self-testable, self-correcting, and self-repairing digital systems. Modular redundancy and re-programmability are used to accomplish generic self-test and to enable self-repair. Bit error r
Publikováno v:
2018 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
The continuously increasing inter-connectivity of sensor nodes that form the basis of the Internet-of-Things results in new avenues of attack exploitable by adversaries to maliciously modify data captured by these nodes. In this work, we present a fr
Autor:
David Keezer, Jingchi Yang
Publikováno v:
ReConFig
In this paper we follow the lead of biology, and utilize modular redundancy to achieve self-test and, especially, self-repair in VLSI systems. We first review dual- and tri-modular redundancy (DMR and TMR) and show why these well-established techniqu
Publikováno v:
IEEE Transactions on Components, Packaging and Manufacturing Technology. 5:797-805
This paper presents a simple power delivery design for mitigating the coupling of power supply noise in mixed-signal electronics. Digital circuitry operating at high data rates generates supply noise that can interfere with sensitive RF components. C
Publikováno v:
Proceedings of the 14th FPGAworld Conference.
Malicious Hardware Trojans can corrupt data which if undetected may cause serious harm. We propose a technique where characteristics of the data itself are used to detect Hardware Trojan (HT) attacks. In particular, we use a two-chip approach where w
Publikováno v:
IEEE Transactions on Components, Packaging and Manufacturing Technology. 3:1907-1916
Advances in 3-D integrated circuit (3-DIC) technology have allowed for advantages in integration, system speed, and power consumption for digital systems. In systems operating at very high data rates with large data width, the effect of simultaneous