Assistant Professor Hassan Salmani Publishes Book on Cybersecurity Issues

Assistant Professor Hassan Salmaniā€™s Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection was recently released by the global publishing company Springer.

Dr. Salmani astonishingly completed the book in fourteen months, following ten years of rigorous research and study. His motivation: Untrusted international suppliers of electronic devices creating a high demand in cybersecurity developments.

Dr. Salmani finds the book topic to be quite challenging and demanding; his aim was to "study the challenges, review existing techniques and highlight shortcomings."

From the preface:

The complexity of modern designs, the significant cost of research and development, and the shrinking time-to-market window heavily enforce the horizontal integrated circuit design flow. Many entities across the globe might be involved in the flow and none are necessarily trusted. A malicious party can launch a hardware Trojan attack through manipulating a circuit to undermine its characteristics under rare circumstances at different stages of the flow before and after circuit manufacturing. Detection of hardware Trojans using existing pre-silicon and post-silicon verification techniques is a very challenging task because of the complexity of modern designs, their variety of application, and limited time for verification.

This book is entirely dedicated to study hardware Trojans across the integrated circuit design flow. Unprecedentedly, the book carefully studies integrated circuits at register-transfer level, gate level, and layout level against hardware Trojans. Vulnerabilities of each level to hardware Trojan insertion are discussed, and existing solutions for preventing and detecting hardware Trojans are studied. The book extends its study to hardware Trojan detection after integrated circuit manufacturing and deliberates current testing techniques for hardware Trojan detection. Vulnerabilities of mixed-signal circuits do not remain hidden, and the book studies possible hardware Trojan design in mixed-signal circuits and evaluates existing techniques for hardware Trojan prevention and detection in mixed-signal circuits.

The book offers a comprehensive and detailed analysis of hardware Trojans before and after integrated circuit manufacturing. This book provides design practitioners with guidance on protecting their designs against hardware Trojans and reveals research shortcomings that require attention to address hardware Trojans.

News

Professor Tepper Gill Receives 2018 R.M. Santilli Foundation Scientific Award

Fri, December 7, 2018

Electrical Engineering and Computer Science Professor Tepper Gill recently received the 2018 R.M. Santilli Foundation Scientific Award for Unprecedented Advances on Isotopies. The R.M. Santilli Foundation Scientific Awards were presented at the International Conference on Pure and Applied Mathematics (ICPAM 2018). Read More >>

Pre-College Engineering and Science Summer Academy Closing Ceremony

Mon, July 23, 2018

Electrical Engineering and Computer Science Professors James Momoh and Peter Bofah successfully concluded their annual Pre-College Engineering and Science (PCES) Summer Residential Academy last Friday. Dr. Momoh's team included mentors from among CEA students and EECS graduates. Read More >>

Events

No Events