Home > Seminars > Gang Qu - How Hardware Impacts Security and Trust in IoT

Gang Qu - How Hardware Impacts Security and Trust in IoT

Start:

9/8/2016 at 3:30PM

End:

9/8/2016 at 5:00PM

Location:

356A Fitzpatrick

Host:

College of Engineering close button
headerbottom

Xiaobo Hu

Xiaobo Hu

VIEW FULL PROFILE Email: shu@nd.edu
Phone: 574-631-6015
Website: http://www.nd.edu/~shu/
Office: 323A Cushing
Dr. Hu's research spans several areas including hardware-software codesign, real-time embedded systems, low-power system design, and computer-aided treatment planning. An underlying characteristic common to these topics is the employment of algorithm design and analysis techniques to solve ...
Click for more information about Xiaobo
574-631-6015
Add to calendar:
iCal vCal

There are many high-profile security incidents from hardware or related to hardware. Is hardware becoming a new target for hackers? In the first half of this talk, we use examples to show how we, hardware designengineershave made designs vulnerable to attacks such as power analysis, timing analysis, fault injection, information leak from scan chain and memory. We also analyze how the current design method introduces backdoors in the design and makes hardware Trojan insertion possible. In the second half of the talk, we will study the challenges and requirements imposed to the design automation community by the emerging Internet of Things (IoT) applicationsWe conclude with examples of hardware security primitives (circuit digital fingerprint, physical unclonable function, and new memory devices) that can enhance the security and trust of IoT system.

Seminar Speaker:

Gang Qu

Gang Qu

University of Maryland

Dr. Gang Qu is a professor in the Department of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland at College Park, where he is the director of Maryland Embedded Systems and Hardware Security (MeshSec) Lab and the Wireless Sensors Laboratory. His primary research interests are in the area of embedded systems and VLSI CAD with focus on low power system design and hardware related security and trust. He studies optimization and combinatorial problems and applies his theoretical discovery to applications in VLSI CAD, wireless sensor network, bioinformatics, and cybersecurity. His book “VLSI Intellectual Property Protection: Theory and Practice” is the first in hardware security and he is also the author of a popular MOOC course on hardware security.