YoVDO

EM Fingerprints - Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle

Offered By: IEEE via YouTube

Tags

Supply Chain Security Courses Cybersecurity Courses Experimental Design Courses System Architecture Courses

Course Description

Overview

Explore the critical issue of unauthorized hardware substitutions in the supply chain and learn about a proposed solution using electromagnetic (EM) fingerprints in this 32-minute IEEE conference talk. Delve into the problem statement, understand the attackers' sphere of influence, and discover why supply chain attacks are becoming increasingly prevalent. Examine the proposed approach, including observations and design principles, and compare it to existing methods. Gain insights into the system architecture, experimental setup, and evaluation methods used to validate the effectiveness of EM fingerprints in identifying hardware substitutions. Conclude with a discussion on future directions and participate in a Q&A session to further explore this critical topic in cybersecurity and supply chain management.

Syllabus

Intro
Problem Statement
Attackers Sphere of Influence
Why Supply Chain Attacks?
Proposed Approach
Observations and Design Principles (contd)
Existing Approaches
System Architecture
Experimental Setup
Experiments and Evaluation Method
Future Directions
Questions


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

The Data Scientist’s Toolbox
Johns Hopkins University via Coursera
MARS2014-1x: Metabolic Applied Research Strategy
Ethicon via Independent
Experimentation for Improvement
McMaster University via Coursera
Molecular Biology - Part 1: DNA Replication and Repair
Massachusetts Institute of Technology via edX
Introduction to Linear Models and Matrix Algebra
Harvard University via edX