34 Hits in 4.6 sec

Can EDA combat the rise of electronic counterfeiting?

Farinaz Koushanfar, Saverio Fazzari, Carl McCants, William Bryson, Matthew Sale, Peilin Song, Miodrag Potkonjak
2012 Proceedings of the 49th Annual Design Automation Conference on - DAC '12  
Repackaging the old ICs, selling the failed test parts, as well as gray marketing, are the most dominant counterfeiting practices. Can technology do a better job than lawyers?  ...  What EDA technologies will work: embedding IP protection measures in the design phase, developing rapid post-silicon certification, or counterfeit detection tools and methods?  ...  The rising trends in chip counterfeiting and its important consequences clearly motivate the urgent need for development of advanced IC anti-counterfeiting techniques.  ... 
doi:10.1145/2228360.2228386 dblp:conf/dac/KoushanfarFMBSSP12 fatcat:6avadnzopbe47knw6gw2en3rx4

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation [article]

David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte
2022 arXiv   pre-print
In this paper, we summarize the state-of-the-art in AL/ML for circuit design/optimization, security and engineering challenges, research in security-aware CAD/EDA, and future research directions and needs  ...  In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data.  ...  electronic design automation (EDA).  ... 
arXiv:2204.09579v2 fatcat:tebjzerhfvaepbwmka7ipiccxy

Authentication of electronics components for cyber-physical systems

Leonid N. Kessarinskiy, Alexey S. Artamonov, Farid F. Taibov, Kirill A. Koval, Anna S. Kameneva, Dmitriy V. Boychenko, Hrair A. Hovsepyan
2018 Bezopasnostʹ Informacionnyh Tehnologij  
Can EDA combat the rise of electronic counterfeiting? Paper presented at the Proceedings -Design Automation Conference, 133-138. doi:10.1145/2228360.2228386 Retrieved from 5.  ...  The relevance of this problem is the increase of a rate of counterfeit products in electronics as an international trend.  ... 
doi:10.26583/bit.2018.3.07 fatcat:fftlw27bgbddlfw2bdtu3jitrm

SuperPUF: Integrating heterogeneous Physically Unclonable Functions

Michael Wang, Andrew Yates, Igor L. Markov
2014 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)  
Physically Unclonable Functions (PUFs) combat counterfeit ICs by identifying each chip using inherent process variation.  ...  Additional challenges arise in system-on-chip and heterogeneous 3D integration of diverse PUFs.  ...  This work was partially supported by the NSF Award 1162087.  ... 
doi:10.1109/iccad.2014.7001391 dblp:conf/iccad/WangYM14 fatcat:bkuebfhcifcgboe66m3djlbsvq

Knitted agrotextiles for a sustainable agriculture

RAZVAN SCARLAT, The National Research and Development Institute for Textiles and Leather 16, Lucreţiu Patraşcanu str., 030508, Bucharest, FLOAREA PRICOP, LEONARD RUSU, The National Research and Development Institute for Textiles and Leather 16, Lucreţiu Patraşcanu str., 030508, Bucharest, NGM Leonard SRL
2017 Industria Textila  
, SEHER KANAT, ZÜMRÜT BAHADIR ÜNAL, TURAN ATILGAN Analiza comportamentului de cumpărare al consumatorilor de îmbrăcăminte de mari dimensiuni în comerțul electronic 396-404 Editatã în 6 nr.  ...  Clasificarea multicriterială a locurilor de muncă prin metodele ELECTRA pentru îmbunătățirea analizei și a condițiilor de lucru în cadrul companiilor din industria textilă 388-395 EDA ACAR, PELİN OFLUOĞLU  ...  ACKNOWLEDGEMENTS This work was supported by a grant within the NUCLEOUS Programme, Project PN 16 34 01 12, "Advanced knitted textile structures meant for agrotextiles". ACKNOWLEDGMENTS  ... 
doi:10.35530/it.068.05.1413 fatcat:xiaq6hgc2va57cnppqdlco4jqq

Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications [article]

Hasan Al Shaikh, Mohammad Bin Monjil, Shigang Chen, Navid Asadizanjani, Farimah Farahmandi, Mark Tehranipoor, Fahim Rahman
2022 arXiv   pre-print
With that, a digital simulacrum of a device's lifecycle, called a digital twin (DT), can be formed by the data gathered from different stages to secure the lifecycle of the device.  ...  To make matters worse, the increase complexity in the design as well as aggressive time to market requirements of the newer generation of integrated circuits can lead either designers to unintentionally  ...  Various approaches have been proposed in literature to combat counterfeits.  ... 
arXiv:2205.10962v2 fatcat:gzlhrvansna6xhegfjh4agw6ne

[Front matter]

2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
Networking is viewed as one of the most important aspects of HOST. During sessions and the 30-minute breaks between sessions, attendees can mingle using Gather.  ...  The student poster session uses virtual rooms for each poster where attendees can privately view each poster and speak with the author using video or real-time chat.  ...  The countermeasures depend on the cause of leakage in each module and can vary from simple modifications of the HDL code ensuring secure translation by the EDA tools, to obfuscating data and address lines  ... 
doi:10.1109/host45689.2020.9300269 fatcat:nruhx3qym5evvpk3bbki7pvfdq

Harmonization of Procedural Safeguards of Suspected and Accused Persons : State of the Matter in Spain

Félix Valbuena González
2020 eucrim – The European Criminal Law Associations Forum  
. 16 Directive (EU) 2019/713 of the European Parliament and of the Council of 17 April 2019 on combating fraud and counterfeiting of non-cash means of payment and replacing Council Framework Decision 2001  ...  Art. 3 of the same Regulation also indicates that the principal objective shall be to prevent and combat counterfeiting and related fraud, thus enhancing the competitiveness of the Union's economy and  ...  Subscription: eucrim is published four times per year and distributed electronically for free.  ... 
doi:10.30709/eucrim-2020-005 fatcat:jrisgw2vwzbshbye7jjz3cw3qm

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  crime and terrorism, social and economic costs, protection or infringement of civil liberties, fundamental rights and ethical aspects Co-ordinator Trilateral Research and Consulting LLP Dissemination  ...  ., rising rates of registered crimes and/or rising media coverage and public concern about crime problems in a society can emerge through such feedback cycles.  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

A Matter of Life & Death: Whistleblowing Legislation in the EU

Simone White
2018 eucrim – The European Criminal Law Associations Forum  
Thus, the very nature of the infringed right in itself gives rise to serious and irreparable damage.  ...  ETIAS is a central, electronic system by means of which visa-free travellers can get authorisation to board a carrier to travel to the Schengen Zone.  ...  The publisher and the Commission are not responsible for any use that may be made of the information contained therein. subscription: eucrim is published four times per year and distributed electronically  ... 
doi:10.30709/eucrim-2018-017 fatcat:lu42umjs3bbfzeaumhaknekea4

Releasing the Grays: In Support of Legalizing Parallel Imports

Andrew Ruff
1992 UCLA Pacific Basin law journal  
Act of August 14, 1876, ch. 274, 19 Stat. 141 (1876) (punishing trademark counterfeiting and dealing in goods with counterfeit trademarks). 114.  ...  Yet, recent judicial and administrative efforts are unsatisfactory because of flaws in the legislative premises which gave rise to the amended Tariff Act.  ...  and (4) "Frankenstein Monster," in which enough of the input supply is tied up that remaining unrestrained suppliers can successfully collude and drive up prices to the other distributors. 183.  ... 
doi:10.5070/p8111022036 fatcat:7ihjj4vbvbgy7gpvzeif5dml3q

Protectionist Vector of Trump Administration Trade Policy
Протекционистский вектор торговой политики администрации Трампа

S. Dmitriev, Primakov National Research Institute of World Economy and International Relations, Russian Academy of Sciences (IMEMO), 23, Profsoyuznaya Str., Moscow, 117997, Russian Federation
2020 Mirovaya Ekonomika i Mezhdunarodnye Otnosheniya  
As of the end of 2017, ten Members were in the process of acceding to the GPA: Albania; Australia; China; Georgia; Jordan; Kyrgyz Republic; Oman; Russia; Tajikistan; and former Yugoslav Republic of Macedonia  ...  Australia circulated its second revised market access offer in June 2017 that addressed all of the issues flagged in the U.S. request for improvements.  ...  In 2017, USTR advanced U.S. interests in robust digital trade and electronic commerce across a range of fora, and worked to combat a rising tide of barriers to digital trade around the world.  ... 
doi:10.20542/0131-2227-2020-64-2-15-23 fatcat:6wkcj6ktdbf3vcffhjkcgtoouq


2019 Mirovaya Ekonomika i Mezhdunarodnye Otnosheniya  
Public Input and Transparency Reflecting Congressional direction, and to draw advice from the widest array of stakeholders including business, labor, agriculture, civil society, and the general public,  ...  USTR has broadened opportunities for public input and worked to ensure the transparency of trade policy through various initiatives carried out by USTR's Office of Intergovernmental Affairs and Public  ...  In 2018, USTR advanced U.S. interests in robust digital trade and electronic commerce across a range of fora and worked to combat a rising tide of barriers to digital trade around the world.  ... 
doi:10.20542/0131-2227-2019-63-4-50-58 fatcat:sgxjvrfn45db3nf2zppiabyvt4

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking [article]

Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R.D. Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou (+23 others)
2020 arXiv   pre-print
The lessons learned can guide future endeavors in other areas of hardware security.  ...  Integrated circuits (ICs) are the foundation of all computing systems.  ...  However, while open-source academic tools for hardware design exist (e.g., ABC [75] for logic synthesis), industrial electronic design automation (EDA) tools are less accessible, and this may preclude  ... 
arXiv:2006.06806v1 fatcat:dd62sbvqmnfaflyvo3q2sgjvwy


Namig Isazade
2022 Zenodo  
PROCEEDINGS OF AZERBAIJAN HIGH TECHNICAL EDUCATIONAL INSTITUTIONS  ...  ACKNOWLEDGEMENTS (Times New Roman, 12 Bold) [List here any individuals who contributed in the work but do not qualify for authorship base on the above criteria.]  ...  It then rises to the surface, carrying rocks and debris with it. In some wells, drilling mud can also return pockets of natural gas, methane or carbon dioxide.  ... 
doi:10.5281/zenodo.6490770 fatcat:56z5mih4yjhrro3attc53icame
« Previous Showing results 1 — 15 out of 34 results