100 likes | 177 Views
Research at Binghamton University's EECE Dept. focuses on detection of hardware tampering, software attacks, and reprogrammable devices like FPGAs. Experts explore rootkits, backdoors, spyware, keyloggers, viruses, and more. The team utilizes finite state machine models and one-hot state encoding in examples like stoplights. Collaborators include Professor Summerville and researchers Jim Moronski, QiongGui, Justin VanTassel, Alex Pang, Kyle Temkin, Ivan Sekyonda, and Nick Tangchakkrachai. For questions or comments, contact jvantas1@binghamton.edu.
E N D
EECE Dept. Binghamton University Detection of Covertly Embedded Hardware in Digital Systems Justin VanTassel
Hardware Tampering • Software Attacks • Rootkits • Backdoors • Spyware • Key loggers • Viruses • List goes on and on… • Hardware Attacks? EECE Dept. Binghamton University Images taken from wikipedia.org
Main Idea • Finite State Machine Model EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
Example - Stoplight EECE Dept. Binghamton University
One Hot State Encoding EECE Dept. Binghamton University
Reprogrammable Devices • FPGA (Field Programmable Gate Arrays) • Speed optimization • Area constraints • LUT (Look up tables) EECE Dept. Binghamton University
People Involved with Research • Professor Summerville • Jim Moronski (PhD) • QiongGui (PhD) • Justin VanTassel (MS) • Alex Pang (MS) • Kyle Temkin (BS) • Ivan Sekyonda (BS) • Nick Tangchakkrachai (BS) EECE Dept. Binghamton University
Questions/Comments • Email: jvantas1@binghamton.edu EECE Dept. Binghamton University