Author Archives: admin

Hardware Security – Introduction to Hardware Security and Trust book

I helped co-author a chapter in a book on hardware security that is listed below.  A few universities are using it as a textbook in senior-level or graduate-level classes related to hardware security.  If you are interested in a particular chapter, you can purchase online access to an individual chapter.

Introduction to Hardware Security and Trust, Mohammad Tehranipoor and Cliff Wang, Eds.  New York: Springer, 2012.  ISBN 978-1-4419-8079-3 or e-ISBN 978-1-4419-8080-9.  Website

 

Hardware Security – Trust-hub.org

I met with Mohammad Tehranipoor today.  We can no longer trust the hardware and just focus on software or network security.  The IC chips today are composed of different cores from multiple suppliers that you may or may not trust.  A core is a blueprint on how to perform a function in hardware.  An attacker could add extra circuits to the IC chip to do an extra unanticipated function like shutting down when given a special code.  Trust-hub.org focuses on this emerging area of hardware security.

Windows 7 – Enable Telnet

Windows 7 does not have telnet enabled by default. Some legacy equipment may need telnet, especially when first configuring it.

Here are the steps.

  • Click on “Start”.
  • Click on “Control Panel”.
  • Click on “Program and Features”.
  • Click on “Turn Windows Features on or off”.
  • Check “Telnet Client” and click “ok”.

2012 British Car Show

I went to a British Car Show today.  It was a beautiful day to see some wonderful cars.  For more pictures, see here.