Just Published Review Article in our journal (Mesopotamian journal of Cybersecurity) indexed in Scopus, CiteScore(4.4). Title: Memristive-Based Physical Unclonable Function Design of Authentication Architectures: A Systematic Review. DOI: https://lnkd.in/gK-pjMdM Keywords: Hardware Security, Physically Unclonable Function (PUF), Memristor (M), Ring Oscillator PUF (RO-PUF), Field Programmable Gate Arrays (FPGA). Highlights: This study examines the use of Physically Unclonable Functions (PUFs) as unique digital fingerprints for enhancing hardware security, particularly through FPGA-based implementations. It focuses on improving PUF circuits by integrating memristors into ring oscillators, aiming to boost key performance metrics like uniqueness, uniformity, and reliability. The study compares various approaches and finds that memristor-enhanced PUFs significantly improve security, showing metrics of 48.57% uniqueness, 51.43% uniformity, and 51.43% bit-aliasing. These results confirm the effectiveness of memristor-based PUFs in enhancing security through robust encryption and verification methods.
Mesopotamian Journal of CyberSecurity’s Post
More Relevant Posts
-
I'm thrilled to announce the publication of my Elsevier paper on "Development of secure VLSI design using lattice-based Cryptographic using ML accelerators". It focuses on integrating advanced cryptographic techniques to protect hardware systems against attacks, leveraging machine learning (ML) for optimization. Lattice-based cryptography offers resistance to quantum computing threats, providing secure encryption methods. By incorporating this within VLSI circuits, designers can ensure robust, tamper-resistant hardware. This approach fosters secure, high-performance hardware suitable for secure communications and data processing in next-generation technologies.
To view or add a comment, sign in
-
I’ve been delving deep into the nuances of GPU integration, PCIe architecture, and hardware security. With the actively increasing reliance on GPUs for AI/ML workloads and high-performance computing, ensuring secure and efficient hardware communication is more critical than ever. Here are some insights from my recent exploration: 1. PCIe Architecture: Enhancing Throughput Without Compromising Security. The PCIe interface is the backbone of modern high-performance computing systems, but it also introduces potential vulnerabilities. I’m researching techniques like memory isolation, DMA protection, and data encryption over PCIe to mitigate risks without impacting throughput. 2. GPU Security in AI Workloads: AI workloads often demand intense GPU usage, making them a target for side-channel attacks and tampering. Implementing secure firmware updates, cryptographically signed drivers, and anomaly detection tools are pivotal for ensuring GPU resilience. 3. Hardware Diagnostics and Performance Monitoring: Efficient diagnostics are key to maintaining system stability. I’m exploring automation scripts to monitor hardware performance, analyze PCIe logs for error states, and optimize GPU workloads, ensuring both reliability and security. 4. The Role of Encryption in Hardware Communication: PCIe lanes are becoming faster with each iteration, but speed should not come at the cost of security. Encryption protocols for data-in-transit between hardware components are essential to thwart eavesdropping and tampering attempts. As hardware becomes increasingly integral to advanced computing, securing these systems at the hardware-software interface is no longer optional, it’s imperative. I’d love to connect with like-minded professionals and researchers to share insights and discuss the future of secure hardware development. What strategies are you exploring to secure high-performance systems? #HardwareSecurity #GPU #PCIe #CyberSecurity #HighPerformanceComputing
To view or add a comment, sign in
-
The Quantum Race Heats Up: Rigetti's Ankaa-3 Could Pose a Challenge to Google's Willow The quantum computing landscape is rapidly evolving, and the latest developments are truly exciting! Rigetti's upcoming 84-qubit Ankaa-3 processor has generated significant buzz, with some suggesting it could outperform Google's Willow. This isn't just about qubit count; it’s about coherence times, gate fidelities, and the overall architecture that will ultimately determine real-world performance. The potential of Ankaa-3 is undeniable, and the prospect of increased competition in quantum hardware benefits the entire industry. It pushes the boundaries of what's possible and accelerates the development of practical quantum applications. It will be fascinating to see how Ankaa-3 performs in real-world benchmarks. This progress is a testament to the incredible work of teams pushing the limits of quantum technology. What are your thoughts on this potential shift in the quantum hardware landscape? Share your insights in the comments! Anthony: Rigetti's quamputers are my favorite. #quantumcomputing #quantum #technology #innovation #rigetti #google #anka3 #willow #futuretech #hardware #quantumphysics #cyber #QuantumSecurity #PostQuantumCryptography #QuantumResistant #PQC #FutureOfSecurity #EmergingTechSecurity #AdvancedThreats #CyberSecurity #InfoSec #DataSecurity #SecurityAwareness #CyberThreats #RiskManagement #DigitalSecurity #NetworkSecurity #Security
Rigetti Introduces Novel Chip Fabrication Process For Scalable, High Performing QPUs | Rigetti & Co, LLC
investors.rigetti.com
To view or add a comment, sign in
-
Quantum Computers: Revolutionizing the Future of Technology Have you ever imagined a computer that can solve complex problems in seconds that would take today's fastest supercomputers years to crack? Quantum computing is making that a reality. By leveraging the principles of quantum mechanics, we're on the brink of a technological revolution that could transform industries like cybersecurity, healthcare, and finance. How do you think quantum computing will impact your field?
To view or add a comment, sign in
-
Revolutionizing Cybersecurity: Quantum Dots Enable Secure Long-Distance Communication in Germany Scientists in Germany have achieved a major breakthrough in quantum communication by successfully conducting the first intercity quantum key distribution (QKD) experiment using quantum dots as single-photon sources. This experiment, known as the Niedersachsen Quantum Link, securely transmitted encrypted data over a 79 km optical fiber between Hannover and Braunschweig. The technology leverages quantum physics's unique properties and is critical for future secure communication systems, particularly as quantum computing advances. The experiment demonstrates the potential of quantum dots in building large-scale quantum networks and could pave the way for quantum repeaters and distributed quantum sensing. #QuantumInternet #QuantumCommunication #QuantumDots #SecureCommunication #Innovation #TechBreakthrough #QuantumKeyDistribution #GermanyScience #FutureOfTech #CyberSecurity #WissenResearch
To view or add a comment, sign in
-
I'm happy to share my most recent publication (Taylor, Pope, "Hardware Sequence Combinators", ICCWS 2024) - A custom hardware traffic validator used in cybersecurity applications to parse high-speed network traffic between two connected devices and "dropping" data payloads that do not adhere to a formal specification (i.e., malicious/ill-formed payloads). This was an interesting project that required optimizing a discrete system, operating with limited resources, in a high-bandwidth network application. The device works by fully automating a process that transforms a user-defined formal grammar (written in Bison/Hammer), which specifies the acceptance criteria of every byte within a data payload, into a hardware circuit on an FPGA that is connected in series between two devices on an ethernet cable. The result ".... acts as a hidden “bump-in-the-wire” that either forwards or drops individual packets based on the message parsing outcome, thereby hardening network segments against zero-day attacks and persistent implants." The novelty of the Sequence Combinator is that we developed an algorithm to compress the table size of a push-down automata (up to 95% on a JSON parser) by combining sequences of characters within the grammar into a reduce the number of symbols/states that can be implemented as a push-down automata in hardware. This "compression" of the Sequence Combinator leads to 90% reduction in BRAM resources on an FPGA - enabling the device to operate at a data rate of 17.5Mbps - making it suitable for parsing traffic CAN bus traffic on-the-fly. (Please see image of the device below.) This project was a wonderful collaboration with Steve Taylor and Jason Dahlstrom from Thayer School of Engineering at Dartmouth / Web Sensing LLC and I really enjoyed working with their team. https://lnkd.in/erfbZp8c #cybersecurity #parsing #bison #compression #embeddeddevices (Below is an image of the FPGA (Web Sensing LLC) that implemented the Sequence Combinator. Two ethernet cables (Input/Output) can be attached to the ethernet connector on the left side and the device.)
To view or add a comment, sign in
-
Revolutionizing Cybersecurity: Quantum Dots Enable Secure Long-Distance Communication in Germany Scientists in Germany have achieved a major breakthrough in quantum communication by successfully conducting the first intercity quantum key distribution (QKD) experiment using quantum dots as single-photon sources. This experiment, known as the Niedersachsen Quantum Link, securely transmitted encrypted data over a 79 km optical fiber between Hannover and Braunschweig. The technology leverages quantum physics's unique properties and is critical for future secure communication systems, particularly as quantum computing advances. The experiment demonstrates the potential of quantum dots in building large-scale quantum networks and could pave the way for quantum repeaters and distributed quantum sensing. #QuantumInternet #QuantumCommunication #QuantumDots #SecureCommunication #Innovation #TechBreakthrough #QuantumKeyDistribution #GermanyScience #FutureOfTech #CyberSecurity #WissenResearch
To view or add a comment, sign in
-
📝 Announcing our latest publication, "Breaking On-Chip Communication Anonymity using Flow Correlation Attacks" in the ACM Journal on Emerging Technologies in Computing Systems (JETC). System-on-Chip (SoC) designs are becoming more sophisticated each day, with multiple computing and processing cores, such as CPU cores, machine learning accelerators, cryptographic accelerators, and heterogeneous technology cores, working together seamlessly. Network-on-Chip (NoC) is widely used to facilitate communication between components in sophisticated System-on-Chip (SoC) designs. Security of the on-chip communication is crucial because exploiting any vulnerability in shared NoC would be a goldmine for an attacker that puts the entire computing infrastructure at risk. We investigate the security strength of existing anonymous routing protocols in NoC architectures, making two pivotal contributions. 1. A machine learning (ML)-based flow correlation attack on existing anonymous routing techniques in Network-on-Chip (NoC) systems is developed and evaluated, demonstrating that they offer only packet-level anonymity. 2. A novel, lightweight anonymous routing protocol is proposed, incorporating outbound traffic tunneling and traffic obfuscation. This protocol is designed to provide a robust defense against ML-based flow correlation attacks, ensuring both packet-level and flow-level anonymity. 🔗 https://lnkd.in/eVXavCtH ✍🏼 Authors: Hansika Weerasena, Prabhat Mishra #networkonchip #onchipcommunication
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks | ACM Journal on Emerging Technologies in Computing Systems
dl.acm.org
To view or add a comment, sign in
-
🚀 Quantum Leap in Computing: PsiQuantum's Ambitious Plans Exciting news in the tech world! PsiQuantum is set to build the largest quantum computing facility in the US, a groundbreaking move that promises to accelerate advancements in computing power and technology. This facility aims to harness the potential of quantum computing to solve complex problems far beyond the reach of classical computers. At Soffid IAM, we are thrilled to see such innovations shaping the future of technology. As we continue to develop cutting-edge IAM solutions, integrating robust security measures is paramount to support and protect these revolutionary advancements. Stay ahead of the curve and explore how quantum computing could transform various industries: 🔗 Read the full article https://lnkd.in/gNricRVq #QuantumComputing #Innovation #Technology #SoffidIAM #CyberSecurity #IAM #FutureTech #PsiQuantum
PsiQuantum plans to build the biggest quantum computing facility in the US
technologyreview.com
To view or add a comment, sign in