Главная
Study mode:
on
1
Intro
2
Problem Statement
3
Attackers Sphere of Influence
4
Why Supply Chain Attacks?
5
Proposed Approach
6
Observations and Design Principles (contd)
7
Existing Approaches
8
System Architecture
9
Experimental Setup
10
Experiments and Evaluation Method
11
Future Directions
12
Questions
Description:
Explore the critical issue of unauthorized hardware substitutions in the supply chain and learn about a proposed solution using electromagnetic (EM) fingerprints in this 32-minute IEEE conference talk. Delve into the problem statement, understand the attackers' sphere of influence, and discover why supply chain attacks are becoming increasingly prevalent. Examine the proposed approach, including observations and design principles, and compare it to existing methods. Gain insights into the system architecture, experimental setup, and evaluation methods used to validate the effectiveness of EM fingerprints in identifying hardware substitutions. Conclude with a discussion on future directions and participate in a Q&A session to further explore this critical topic in cybersecurity and supply chain management.

EM Fingerprints - Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle

IEEE
Add to list
0:00 / 0:00