By Topic

Proceedings of the IEEE

Issue 8 • Date Aug. 2014

Filter Results

Displaying Results 1 - 19 of 19
  • Front cover

    Publication Year: 2014, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (466 KB)
    Freely Available from IEEE
  • Proceedings of the IEEE publication information

    Publication Year: 2014, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s): 1117
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Energy return on energy invested (eroi): a quintessential but possibly inadequate metric for sustainability in a solar-powered world? [point of view]

    Publication Year: 2014, Page(s):1118 - 1122
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (246 KB) | HTML iconHTML
    Freely Available from IEEE
  • Trustworthy Hardware [Scanning the Issue]

    Publication Year: 2014, Page(s):1123 - 1125
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Physical Unclonable Functions and Applications: A Tutorial

    Publication Year: 2014, Page(s):1126 - 1141
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    This paper describes the use of physical unclonable functions (PUFs) in low-cost authentication and key generation applications. First, it motivates the use of PUFs versus conventional secure nonvolatile memories and defines the two primary PUF types: “strong PUFs” and “weak PUFs.” It describes strong PUF implementations and their use for low-cost authentication. After ... View full abstract»

    Open Access
  • Public Physical Unclonable Functions

    Publication Year: 2014, Page(s):1142 - 1156
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1465 KB) | HTML iconHTML

    A physical unclonable function (PUF) is an integrated circuit (IC) that serves as a hardware security primitive due to its complexity and the unpredictability between its outputs and the applied inputs. PUFs have received a great deal of research interest and significant commercial activity. Public PUFs (PPUFs) address the crucial PUF limitation of being a secret-key technology. To some extent, th... View full abstract»

    Open Access
  • Microcontrollers as (In)Security Devices for Pervasive Computing Applications

    Publication Year: 2014, Page(s):1157 - 1173
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2163 KB) | HTML iconHTML

    Often overlooked, microcontrollers are the central component in embedded systems which drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low cost, and with myriads of pervasive applications. An increasing number of microcontroller-equipped systems are security and safety critical. In this tutorial, we take a critical look at the security aspects of today's mi... View full abstract»

    Open Access
  • Trustworthiness of Medical Devices and Body Area Networks

    Publication Year: 2014, Page(s):1174 - 1188
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2186 KB) | HTML iconHTML

    Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in these medical devices is toward increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as IWMDs become more “intelligent,” they also become less trustworthy-less reliable ... View full abstract»

    Open Access
  • Mobile Trusted Computing

    Publication Year: 2014, Page(s):1189 - 1206
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (855 KB) | HTML iconHTML

    Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users. In this survey, we describe the current state of trusted computing solutions for mobile devices from research, standardizati... View full abstract»

    Open Access
  • Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain

    Publication Year: 2014, Page(s):1207 - 1228
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3972 KB) | HTML iconHTML

    As the electronic component supply chain grows more complex due to globalization, with parts coming from a diverse set of suppliers, counterfeit electronics have become a major challenge that calls for immediate solutions. Currently, there are a few standards and programs available that address the testing for such counterfeit parts. However, not enough research has yet addressed the detection and... View full abstract»

    Open Access
  • Hardware Trojan Attacks: Threat Analysis and Countermeasures

    Publication Year: 2014, Page(s):1229 - 1247
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2746 KB) | HTML iconHTML

    Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been considered trusted. The emergence of hardware Trojan attacks violates this root of trust. These attacks, in the form of malicious modifications of electronic hardware at different stages of its life cycle, ... View full abstract»

    Open Access
  • FPGA Security: Motivations, Features, and Applications

    Publication Year: 2014, Page(s):1248 - 1265
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1143 KB) | HTML iconHTML

    Since their inception, field-programmable gate arrays (FPGAs) have grown in capacity and complexity so that now FPGAs include millions of gates of logic, megabytes of memory, high-speed transceivers, analog interfaces, and whole multicore processors. Applications running in the FPGA include communications infrastructure, digital cinema, sensitive database access, critical industrial control, and h... View full abstract»

    Open Access
  • Regaining Trust in VLSI Design: Design-for-Trust Techniques

    Publication Year: 2014, Page(s):1266 - 1282
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3144 KB) | HTML iconHTML

    Designers use third-party intellectual property (IP) cores and outsource various steps in their integrated circuit (IC) design flow, including fabrication. As a result, security vulnerabilities have been emerging, forcing IC designers and end-users to reevaluate their trust in hardware. If an attacker gets hold of an unprotected design, attacks such as reverse engineering, insertion of malicious c... View full abstract»

    Open Access
  • A Primer on Hardware Security: Models, Methods, and Metrics

    Publication Year: 2014, Page(s):1283 - 1295
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1330 KB) | HTML iconHTML

    The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, includ... View full abstract»

    Open Access
  • STARS: Software Industry [Scanning Our Past]

    Publication Year: 2014, Page(s):1296 - 1303
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1416 KB) | HTML iconHTML

    The author states that software products are critical to commercial, social, governmental, and entertainment activities throughout the world, yet we do not think about them except when they fail to operate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future Special Issues/Special Sections of the Proceedings

    Publication Year: 2014, Page(s): 1304
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • IEEE Global History Network

    Publication Year: 2014, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (518 KB)
    Freely Available from IEEE

Aims & Scope

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Joel Trussell
North Carolina State University