Security of IoT systems: Design challenges and opportunities
- T. Xu, James Bradley Wendt, M. Potkonjak
- Computer ScienceIEEE/ACM International Conference on Computer…
- 3 November 2014
A brief survey of IoT challenges and opportunities with an emphasis on security issues and several case studies that advocate the use of stable PUFs and digital PPUFs for several IoT security protocols are presented.
Representation Learning for Information Extraction from Form-like Documents
- Bodhisattwa Prasad Majumder, Navneet Potti, Sandeep Tata, James Bradley Wendt, Qi Zhao, Marc Najork
- Computer ScienceAnnual Meeting of the Association for…
- 1 July 2020
An extraction system that uses knowledge of the types of the target fields to generate extraction candidates and a neural network architecture that learns a dense representation of each candidate based on neighboring words in the document is proposed.
Nanoelectronic Solutions for Hardware Security
- J. Rajendran, R. Karri, B. Wysocki
- Computer ScienceIACR Cryptology ePrint Archive
- 2012
Techniques for foundry identification
- James Bradley Wendt, F. Koushanfar, M. Potkonjak
- MathematicsDesign Automation Conference
- 1 June 2014
This paper introduces statistical techniques for foundry detection, specifically for identifying from which foundry a particular chip originates from, by employing a variant of SAT that extracts channel lengths and threshold voltages.
Migrating a Privacy-Safe Information Extraction System to a Software 2.0 Design
- Ying Sheng, N. Vo, James Bradley Wendt, Sandeep Tata, Marc Najork
- Computer ScienceConference on Innovative Data Systems Research
- 2020
This paper presents a case study of migrating a privacy-safe information extraction system in production for Gmail from a traditional rule-based architecture to a machine-learned Software 2.0…
Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications
- J. Rajendran, R. Karri, B. Wysocki
- Computer ScienceProceedings of the IEEE
- 13 May 2015
This tutorial paper shows how one can develop hardware security primitives by exploiting the unique characteristics such as complex device and system models, bidirectional operation, and nonvolatility of emerging nanoelectronic devices.
Hardware obfuscation using PUF-based logic
- James Bradley Wendt, M. Potkonjak
- Computer Science, MathematicsIEEE/ACM International Conference on Computer…
- 3 November 2014
This paper introduces the notion of PUF-based logic which can be configured to be functionally equivalent to any arbitrary design, as well as a new architecture for wire merging that obfuscates signal paths exponentially.
Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email
- Ying Sheng, Sandeep Tata, James Bradley Wendt, Jing Xie, Qi Zhao, Marc Najork
- Computer ScienceKnowledge Discovery and Data Mining
- 19 July 2018
How the design of the Juicer system was informed by three key principles: scaling to a planet-wide email service, isolating the complexity to provide a simple experience for the developer, and safeguarding the privacy of users is described.
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security
- M. Rostami, James Bradley Wendt, M. Potkonjak, F. Koushanfar
- Computer Science, MathematicsDesign, Automation and Test in Europe
- 24 March 2014
The physical unclonable function (PUF) has emerged as a popular and widely studied security primitive based on the randomness of the underlying physical medium. To date, most of the research emphasis…
Digital bimodal function: An ultra-low energy security primitive
- T. Xu, James Bradley Wendt, M. Potkonjak
- Computer Science, MathematicsInternational Symposium on Low Power Electronics…
- 1 September 2013
A new security hardware primitive named digital bimodal function (DBF) is developed that enables ultra low energy security protocols and is competitive with the energy efficiency of traditional security key cryptographic security technique while more than three orders of magnitude more energy efficient than RSA.
...
...