(Back to Session Schedule)

The 18th Asia and South Pacific Design Automation Conference

Session 4D  Special Session: Emerging Security Topics in Electronic Designs and Mobile Devices
Time: 10:20 - 12:20 Thursday, January 24, 2013
Organizer: Yiran Chen (University of Pittsburgh, U.S.A.)

4D-1 (Time: 10:20 - 10:50)
Title(Invited Paper) Hardware Security Strategies Exploiting Nanoelectronic Circuits
AuthorGarrett S. Rose (Air Force Research Laboratory, U.S.A.), *Jeyavijayan Rajendran (New York University, U.S.A.), Nathan McDonald (Air Force Research Laboratory, U.S.A.), Ramesh Karri (New York University, U.S.A.), Miodrag Potkonjak (University of California, Los Angeles, U.S.A.), Bryant Wysocki (Air Force Research Laboratory, U.S.A.)
Pagepp. 368 - 372
KeywordCybersecurity, PUF, VLSI, Nanotechnology, Memristor
AbstractHardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are physical unclonable functions (PUF) which provide a hardware specific unique signature or identification. Novel nanoelectronic technologies such as memristors are viable options for improved security in emerging integrated circuits. We provide an overview of memristor based PUF structures and circuits that illustrate the potential for nanoelectronic hardware security solutions.

4D-2 (Time: 10:50 - 11:20)
Title(Invited Paper) Can We Identify Smartphone App by Power Trace?
AuthorMian Dong, Po-Hsiang Lai, *Zhu Li (Samsung Telecommunications America, U.S.A.)
Pagepp. 373 - 375
Keywordpower, smartphone
AbstractPower trace of a smartphone, as time series data, carries important information of the system behavior and is useful for many applications, such as energy management, software optimization and anomaly detection. However, the power trace measured from the battery terminals include the power consumption by all the hardware components and thus describes the activity of the whole system. Yet modern smartphones are multiprocessing, i.e., multiple applications can be running simultaneously in the same system. Our goal is to answer the following question: “Can we identify smartphone app by power trace?” That is, whether the power trace of a smartphone can be different by running different applications.

4D-3 (Time: 11:20 - 11:50)
Title(Invited Paper) Secure Storage System and Key Technologies
Author*Jiwu Shu, Zhirong Shen, Wei Xue, Yingxun Fu (Tsinghua University, China)
Pagepp. 376 - 383
Keywordsecure storage, cloud storage security, privacy, data security
AbstractWith the rapid development of cloud storage, data security in storage receives great attention and becomes the top concern to block the spread development of cloud service. In this paper, we systematically study the security researches in the storage systems. We first present the design criteria that are used to evaluate a secure storage system and summarize the widely adopted key technologies. Then, we further investigate the security research in cloud storage and conclude the new challenges in the cloud environment. Finally, we give a detailed comparison among the selected secure storage systems and draw the relationship between the key technologies and the design criteria.
Slides

4D-4 (Time: 11:50 - 12:20)
Title(Invited Paper) Mobile User Classification and Authorization Based on Gesture Usage Recognition
Author*Kent W. Nixon, Xiang Chen, Zhi-Hong Mao (University of Pittsburgh, U.S.A.), Kang Li (Rutgers University, U.S.A.), Yiran Chen (University of Pittsburgh, U.S.A.)
Pagepp. 384 - 389
KeywordMobile Device, Gesture, Security
AbstractIntelligent mobile devices have been widely serving in almost all aspects of everyday life, spanning from communication, web surfing, entertainment, to daily organizer. A large amount of sensitive and private information is stored on the mobile device, leading to severe data security concern. In this work, we propose a novel mobile user classification and authorization scheme based on the recognition of user’s gesture. Compared to other security solutions like password, track pattern and finger print etc.