Assistant Professor Hassan Salmani Publishes Book on Cybersecurity Issues

Electrical Engineering and Computer Science Assistant Professor Hassan Salmani’s Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection was recently released by the global publishing company Springer.

Dr. Salmani astonishingly completed the book in fourteen months, following ten years of rigorous research and study. His motivation: Untrusted international suppliers of electronic devices creating a high demand in cybersecurity developments.

Dr. Salmani finds the book topic to be quite challenging and demanding; his aim was to "study the challenges, review existing techniques and highlight shortcomings."

From the preface:

The complexity of modern designs, the significant cost of research and development, and the shrinking time-to-market window heavily enforce the horizontal integrated circuit design flow. Many entities across the globe might be involved in the flow and none are necessarily trusted. A malicious party can launch a hardware Trojan attack through manipulating a circuit to undermine its characteristics under rare circumstances at different stages of the flow before and after circuit manufacturing. Detection of hardware Trojans using existing pre-silicon and post-silicon verification techniques is a very challenging task because of the complexity of modern designs, their variety of application, and limited time for verification.

This book is entirely dedicated to study hardware Trojans across the integrated circuit design flow. Unprecedentedly, the book carefully studies integrated circuits at register-transfer level, gate level, and layout level against hardware Trojans. Vulnerabilities of each level to hardware Trojan insertion are discussed, and existing solutions for preventing and detecting hardware Trojans are studied. The book extends its study to hardware Trojan detection after integrated circuit manufacturing and deliberates current testing techniques for hardware Trojan detection. Vulnerabilities of mixed-signal circuits do not remain hidden, and the book studies possible hardware Trojan design in mixed-signal circuits and evaluates existing techniques for hardware Trojan prevention and detection in mixed-signal circuits.

The book offers a comprehensive and detailed analysis of hardware Trojans before and after integrated circuit manufacturing. This book provides design practitioners with guidance on protecting their designs against hardware Trojans and reveals research shortcomings that require attention to address hardware Trojans.

News

Associate Professor Danda Rawat to Lead Cybersecurity Partnership on $3M NNSA Grant

Tue, March 3, 2020

Howard University is the recipient of a three-year, $3 million grant from the Department of Energy’s National Nuclear Security Administration, alongside two partnering minority-serving institutions, for The Partnership for Proactive Cybersecurity Training, a cybersecurity research project based on human biological system-enabled machine learning models. Read More >>

Martin Conquers Hackathons with Accessibility Software

Wed, February 12, 2020

Computer Engineering Freshman Devin C. Martin recently conquered at two hackathons: HackHarvard at Harvard University and HackDuke – Code for Good at Duke University. Martin came in third place for Hack Harvard, which had over 400 international participants from across five continents. For HackDuke, Martin placed first among over 300 participants from the nation's top engineering schools, such as the Georgia Institute of Technology, Massachusetts Institute of Technology, New York University, and Yale University. The participants for each hackathon included both undergraduate and graduate students. Read More >>

Events

No Events