Hardware Trust and Assurance in Image Analysis and Machine Learning Perspectives

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (31 July 2021) | Viewed by 5162

Special Issue Editor


E-Mail Website
Guest Editor
Department of electrical and computer engineering, University of Florida, Gainesville, FL 32611, USA
Interests: hardware security; physical inspection and assurance; 3D imaging and image processing; multi modal imaging; failure analysis

Special Issue Information

The complex long life of the electronic devices coupled with their diverse applications are making them increasingly vulnerable to various forms of threats. Large industry and government efforts are put in place across the globe to address the supply chain security problem and to offer solutions, training, and services. The number of programs introduced by governments have increased over the years in this area.

Although much focus is given to digital domain and testing, physical inspection, image analysis and machine learning for hardware trust and assurance is gaining a lot of attention recently.

Multi-disciplinary research and multi-pronged approaches are sought for development of a fully operational attack targeting different phases in the entire life cycle of an electronic system. Artificial intelligence (AI) and computer vision (CV) play a crucial role in design and development of both threats and countermeasures in hardware. Within the scope of hardware security there a number of areas that require extensive research including physical inspection, decomposition, hardware Trojan design and detection, side-channel analysis, security of Internet of Things (IoT), and secure massive data communication and processing.

Human-level performance of the intelligent and complex tasks, brings in its own pros and cons. The challenges and potential solutions, encourage the researchers to investigate hardware-level vulnerabilities of AI (i.e. implementation attacks, model stealing, etc.), the hardware-level trustworthiness of AI (i.e. robust AI hardware accelerator, implementation attack resilient AI chip design, countermeasures), and the applications of AI for hardware security. In particular, if failure analysis and imaging tools such as voltage imaging or contactless probing techniques are used to provide side information for inspection or attack. In addition, physical fingerprinting based on analog parameters are rapidly providing opportunities for unique countermeasures.

  • Emerging topics in physical inspection and assurance
  • Counterfeit Detection and Anti-Counterfeit Technique
  • Image analysis and artificial intelligence for assurance and inspection
  • Chip and PCB level decomposition for assurance
  • Electro-optical probing using PEM, EOP, EOFM, etc.
  • Hardware Trojan Models and Detection Techniques
  • Trusted and Malicious Hardware-Level AI systems
  • Cross-Layer Hardware Security
  • Security Verification of Intellectual Properties and Integrated Circuits
  • Computer Vision for Hardware Security
  • Robustness in Hardware-Level Computer Vision Algorithms
  • Hardware Implementation of Biometrics, Forensics, and Physical Security Systems
  • Fault Injection and Mitigation for Hardware-Level AI Systems

Dr. Navid Asadi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Emerging topics in physical inspection and assurance
  • Counterfeit Detection and Anti-Counterfeit Technique
  • Image analysis and artificial intelligence for assurance and inspection
  • Chip and PCB level decomposition for assurance
  • Electro-optical probing using PEM, EOP, EOFM, etc.
  • Hardware Trojan Models and Detection Techniques
  • Trusted and Malicious Hardware-Level AI systems
  • Cross-Layer Hardware Security
  • Security Verification of Intellectual Properties and Integrated Circuits
  • Computer Vision for Hardware Security
  • Robustness in Hardware-Level Computer Vision Algorithms
  • Hardware Implementation of Biometrics, Forensics, and Physical Security Systems
  • Fault Injection and Mitigation for Hardware-Level AI Systems

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

43 pages, 18994 KiB  
Review
An Overview of Medical Electronic Hardware Security and Emerging Solutions
by Shayan Taheri and Navid Asadizanjani
Electronics 2022, 11(4), 610; https://doi.org/10.3390/electronics11040610 - 16 Feb 2022
Cited by 2 | Viewed by 4704
Abstract
Electronic healthcare technology is widespread around the world and creates massive potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns with respect to the cyber vulnerabilities of medical tools, malicious medical errors, and security attacks on healthcare data [...] Read more.
Electronic healthcare technology is widespread around the world and creates massive potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns with respect to the cyber vulnerabilities of medical tools, malicious medical errors, and security attacks on healthcare data and devices. Increased connectivity to existing computer networks has exposed the medical devices/systems and their communicating data to new cybersecurity vulnerabilities. Adversaries leverage the state-of-the-art technologies, in particular artificial intelligence and computer vision-based techniques, in order to launch stronger and more detrimental attacks on the medical targets. The medical domain is an attractive area for cybercrimes for two fundamental reasons: (a) it is rich resource of valuable and sensitive data; and (b) its protection and defensive mechanisms are weak and ineffective. The attacks aim to steal health information from the patients, manipulate the medical information and queries, maliciously change the medical diagnosis, decisions, and prescriptions, etc. A successful attack in the medical domain causes serious damage to the patient’s health and even death. Therefore, cybersecurity is critical to patient safety and every aspect of the medical domain, while it has not been studied sufficiently. To tackle this problem, new human- and computer-based countermeasures are researched and proposed for medical attacks using the most effective software and hardware technologies, such as artificial intelligence and computer vision. This review provides insights to the novel and existing solutions in the literature that mitigate cyber risks, errors, damage, and threats in the medical domain. We have performed a scoping review analyzing the four major elements in this area (in order from a medical perspective): (1) medical errors; (2) security weaknesses of medical devices at software- and hardware-level; (3) artificial intelligence and/or computer vision in medical applications; and (4) cyber attacks and defenses in the medical domain. Meanwhile, artificial intelligence and computer vision are key topics in this review and their usage in all these four elements are discussed. The review outcome delivers the solutions through building and evaluating the connections among these elements in order to serve as a beneficial guideline for medical electronic hardware security. Full article
Show Figures

Figure 1

Back to TopTop