Jim Plusquellic

ORCID: 0000-0002-1876-117X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Integrated Circuits and Semiconductor Failure Analysis
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • VLSI and Analog Circuit Testing
  • Electrostatic Discharge in Electronics
  • Neuroscience and Neural Engineering
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • Advanced Memory and Neural Computing
  • Advanced Malware Detection Techniques
  • Low-power high-performance VLSI design
  • Advancements in Semiconductor Devices and Circuit Design
  • Radiation Effects in Electronics
  • Cell Image Analysis Techniques
  • Advanced Wireless Communication Techniques
  • VLSI and FPGA Design Techniques
  • Cryptography and Data Security
  • Energy Harvesting in Wireless Networks
  • Advanced Steganography and Watermarking Techniques
  • Quantum Computing Algorithms and Architecture
  • Blockchain Technology Applications and Security
  • IoT Networks and Protocols
  • Quantum Information and Cryptography
  • Semiconductor materials and devices
  • Indoor and Outdoor Localization Technologies
  • Advanced Wireless Communication Technologies

University of New Mexico
2016-2025

University of North Carolina at Charlotte
2018-2019

University of Maryland, Baltimore County
1999-2007

University of Baltimore
2003-2006

University of Maryland, Baltimore
2002-2006

IBM Research - Austin
2006

University of Maryland, College Park
2005

Texas Instruments (United States)
2005

University of Pittsburgh
1995-2002

This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, and military systems. The migration IC fabrication low-cost foundries has made ICs vulnerable malicious alterations, that could, under specific conditions, result functional changes and/or catastrophic failure system which they are embedded. We refer such alternations inclusions as Hardware Trojans. modification(s) introduced by Trojan depends on application, with some designed disable or...

10.1109/hst.2008.4559039 article EN 2008-06-01

Fabless semiconductor industry and government agencies have raised serious concerns about tampering with inserting hardware Trojans in an integrated circuit supply chain recent years. Most of the recently proposed Trojan detection methods are based on activation to observe either a faulty output or measurable abnormality side-channel signals. Time activate is major concern from authentication standpoint. This paper analyzes time generate transition functional Trojans. Transition modeled by...

10.1109/tvlsi.2010.2093547 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2011-01-07

This paper addresses a new threat to the security of integrated circuits (ICs). The migration IC fabrication untrusted foundries has made ICs vulnerable malicious alterations, that could, under specific conditions, result infunctional changes and/or catastrophic failure system in which they are embedded. Such alternations and inclusions referred as Hardware Trojans. In this paper, we propose current integration methodology observe Trojan activity circuit localized analysis approach isolate...

10.1109/dft.2008.61 article EN 2008-10-01

Traditionally, the only standard method of testing that has consistently provided high fault coverage been scan test due to controllability and observability this technique provides. The chains used in not allow engineers control observe a chip, but these properties also architecture be as means breach chip security. In paper, we propose technique, called Lock & Key, neutralize potential for scan-based side-channel attacks. It is very difficult implement an all inclusive security strategy,...

10.1109/tdsc.2007.70215 article EN IEEE Transactions on Dependable and Secure Computing 2007-10-01

Trust in reference to integrated circuits addresses the concern that design and/or fabrication of IC may be purposely altered by an adversary. The insertion a hardware Trojan involves deliberate and malicious change adds or removes functionality reduces its reliability. Trojans are designed disable destroy at some future time they serve leak confidential information covertly cleverly hidden adversary make it extremely difficult for chip validation processes, such as manufacturing test,...

10.1109/hst.2008.4559037 article EN 2008-06-01

Hardware Trojans have emerged as a new threat to the security and trust of computing systems. are deliberate malicious modifications logic function implemented within digital mixed signal chips. In contrast software Trojans, it is not possible simply "scan hard drive" eradicate hardware Trojan. can be designed shutdown chip at some predetermined time and/or when specific or data pattern received. They may also remain hidden while leaking confidential information covertly adversary....

10.1109/tifs.2010.2061228 article EN IEEE Transactions on Information Forensics and Security 2010-08-03

Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry government agencies recent years. Most of the previously proposed Trojan detection methods rely on activation either observe a faulty output or measure side-channel signals such as transient current charge. From authentication stand point, time trigger hardware circuit is major concern. This paper analyzes (i) generate transition functional (ii) fully activate them. An efficient...

10.1109/hst.2009.5224968 article EN 2009-01-01

With the increasing disintegration of design and manufacturing chain our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also intentional malicious features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview Trojans countermeasures.

10.1109/mdt.2012.2196252 article EN IEEE Design and Test 2012-04-27

Chip design and fabrication is becoming increasingly vulnerable to malicious activities alternations with globalization. An adversary can introduce a Trojan designed disable and/or destroy system at some future time (Time Bomb) or the may serve leak confidential information covertly adversary. This paper proposes taxonomy for classification then describes statistical approach detecting hardware Trojans that based on analysis of an ICs power supply transient signals. A key component improving...

10.5555/1509456.1509596 article EN International Conference on Computer Aided Design 2008-11-10

Trust in reference to integrated circuits addresses the concern that design and/or fabrication of circuit (IC) may be purposely altered by an adversary. The insertion a hardware Trojan involves deliberate and malicious change IC adds or removes functionality reduces its reliability. Trojans are designed disable destroy at some future time they serve leak confidential information covertly can cleverly hidden adversary make it extremely difficult for chip validation processes, such as...

10.1109/tvlsi.2009.2029117 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2009-10-09

Chip design and fabrication is becoming increasingly vulnerable to malicious activities alternations with globalization. An adversary can introduce a Trojan designed disable and/or destroy system at some future time (Time Bomb) or the may serve leak confidential information covertly adversary. This paper proposes taxonomy for classification then describes statistical approach detecting hardware Trojans that based on analysis of an ICs power supply transient signals. A key component improving...

10.1109/iccad.2008.4681643 article EN IEEE/ACM International Conference on Computer-Aided Design 2008-11-01

We present a test structure for statistical characterization of local device mismatches. The contains densely populated SRAM devices arranged in an addressable manner. Measurements on chip fabricated advanced 65 nm process show little spatial correlation. vary the nominal threshold voltage by changing threshold-adjust implantations and observe that ratio standard deviation to mean gets worse with scaling. large variations observed extracted statistics indicate random doping fluctuation is...

10.1109/vlsic.2006.1705315 article EN 2006-10-24

For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and other important applications including encryption communication channels IP protection in FPGAs. The vulnerabilities conventional derived from digital data can be mitigated if are instead inherent statistical manufacturing variations IC. Robust silicon-derived implemented using physically unclonable functions (PUFs). A PUF consists specialized circuit...

10.1145/1629911.1630089 article EN 2009-07-26

Decision tree classification (DTC) is a widely used technique in data mining algorithms known for its high accuracy forecasting. As technology has progressed and available storage capacity modern computers increased, the amount of to be processed also increased substantially, resulting much slower induction times. Many parallel implementations DTC have already addressed issues reliability process. In process, larger amounts require proportionately more execution time, thus hindering...

10.1109/tc.2013.204 article EN IEEE Transactions on Computers 2013-10-18

A cyber-physical system (CPS) is a composition of independently interacting components, including computational elements, communications and control systems. Applications CPS institute at different levels integration, ranging from nation-wide power grids, to medium scale, such as the smart home, small e.g. ubiquitous health care systems implantable medical devices. Cyber-physical primarily transmute how we interact with physical world, each requiring security based on sensitivity information...

10.1109/ets.2015.7138763 article EN 2015-05-01

In the context of hardware systems, authentication refers to process confirming identity and authenticity chip, board system components such as RFID tags, smart cards remote sensors. The ability physical unclonable functions (PUF) provide bitstrings unique each component can be leveraged an mechanism detect tamper, impersonation substitution components. However, requires a strong PUF, i.e., one capable producing large, set bits per device, and, unlike secret key generation for encryption,...

10.1109/iccad.2015.7372589 article EN 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2015-11-01

Scan designs used for testing also provide an easily accessible port hacking. In this paper, we present a new low-cost secure scan design that is effective against scan-based side-channel attacks. By integrating test key into vectors are scanned the chip, and accessing chains guaranteed to be allowed only by authorized user. Any attempt use chain without verified vector will result in randomized output preventing potential The proposed technique has negligible area overhead, no negative...

10.1109/vts.2006.7 article EN 2006-05-25

Scan test has been a common and useful method for testing VLSI designs due to the high controllability observability it provides. These same properties have recently shown also be security threat intellectual property on chip (Yang et al., 2004). In order defend from scan based attacks, we present lock & key technique. Our proposed technique provides while not negatively impacting design's fault coverage. This requires only that small area overhead penalty is incurred significant return in...

10.1109/dftvs.2005.58 article EN 2006-03-30

This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within hardware implementation of cryptographic primitive, such as AES or SHA-3. The digitized timing values which represent delays are stored in database on secure server (verifier) alternative to storing response bitstrings. enables development efficient provides both privacy and mutual authentication....

10.3390/cryptography1010003 article EN Cryptography 2016-11-25

In this paper, we propose hardware based secure and trusted communication over CAN bus in the intra vehicle network connecting electronic Control Units (ECUs). is an insecure channel, resource constraint devices that have limited resources to devote for data security real-time requirements meet safety critical design specifications. We a framework implements lightweight PUF mutual authentication encryption channel. The paper discusses implementation details along with utilization performance...

10.1109/mwscas.2017.8053160 article EN 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS) 2017-08-01

Electronic money or e-Cash is becoming increasingly popular as the preferred strategy for making purchases, both on and offline. Several unique attributes of are appealing to customers, including convenience always having "cash-on-hand" without need periodically visit ATM, ability perform peer-to-peer transactions an intermediary, peace mind associated in conducting those privately. Equally important that paper provides customers with anonymous method payment, which highly valued by many...

10.1109/mce.2020.3024512 article EN IEEE Consumer Electronics Magazine 2020-09-21

Fail-safe computing refers to systems that revert a non-operational safe state when fault occurs. In this paper, we investigate circuit level technique as mitigation for single event upsets (SEUs) and injection attacks on field programmable gate arrays (FPGAs), analyze the effectiveness of fail-safe monitor an encryption algorithm. The propagation effects through FPGA primitives including lookup tables (LUTs) interconnect points (PIPs) is assessed within architecture created using open...

10.1109/access.2024.3520877 article EN cc-by IEEE Access 2025-01-01

Malicious activities and alterations to integrated circuits have raised serious concerns government agencies the semiconductor industry. The added functionality, known as hardware Trojan, poses major detection isolation challenges. In this paper, we present a method localize design switching any specific region independent from test patterns. new architecture allows activating target keeping others quiet which reduces total circuit activity. This helps magnify Trojan's contribution transient...

10.1109/wifs.2010.5711438 article EN IEEE International Workshop on Information Forensics and Security 2010-12-01

New validation methods are needed for ensuring integrated circuit (IC) Trust, and in particular detecting hardware Trojans. In this paper, we investigate the signal-to-noise ratio (SNR) requirements Trojans by conducting ring oscillator (RO) experiments on a set of V2Pro FPGAs. The ROs enable high degree control over switching activity FPGAs while simultaneously permitting subtle delay transient power supply anomalies to be introduced through simple modifications RO logic structure. Power...

10.1109/tifs.2011.2136339 article EN IEEE Transactions on Information Forensics and Security 2011-04-06
Coming Soon ...