scispace - formally typeset
Journal ArticleDOI

Secure Randomized Checkpointing for Digital Microfluidic Biochips

TLDR
This paper defines security metrics and present techniques for improving performance through static checkpoint maps, and describes performance tradeoffs associated with static and random checkpoints.
Abstract
Digital microfluidic biochips (DMFBs) integrated with processors and arrays of sensors form cyberphysical systems and consequently face a variety of unique, recently described security threats. It has been noted that techniques used for error recovery can provide some assurance of integrity when a cyberphysical DMFB is under attack. This paper proposes the use of such hardware for security purposes through the randomization of checkpoints in both space and time, and provides design guidelines for designers of such systems. We define security metrics and present techniques for improving performance through static checkpoint maps, and describe performance tradeoffs associated with static and random checkpoints. We also provide detailed classification of attack models and demonstrate the feasibility of our techniques with case studies on assays implemented in typical DMFB hardware.

read more

Citations
More filters

Overcoming an untrusted computing base: detecting and removing malicious hardware automatically

TL;DR: This paper proposes BlueChip, a defensive strategy that has both a design-time component and a runtime component that is able to prevent all hardware attacks the authors evaluate while incurring a small runtime overhead.
Journal ArticleDOI

Micro-Electrode-Dot-Array Digital Microfluidic Biochips: Technology, Design Automation, and Test Techniques

TL;DR: Recent design tools for high-level synthesis and optimization of map bioassay protocols on a MEDA biochip are described, with the help of these tools, biochip users can concentrate on the development of nanoscale bioassays, leaving details of chip optimization and implementation to software tools.
Proceedings ArticleDOI

Security Implications of Cyberphysical Flow-Based Microfluidic Biochips

TL;DR: This work surveys cyberphysical flow-based microfluidic platforms and performs a security assessment, and describes an attack on digital polymerase chain reactions and how such attacks undermine research integrity.
Journal ArticleDOI

Toward Secure and Trustworthy Cyberphysical Microfluidic Biochips

TL;DR: This keynote paper highlights recent findings and trends in these field to motivate research in the nascent field of cyberphysical microfluidic biochip security and trust.
Journal ArticleDOI

Security Assessment of Micro-Electrode-Dot-Array Biochips

TL;DR: This paper identifies a new class of actuation tampering attacks specific to MEDA biochips: the micro-droplet attack, and shows that this new attack is stealthy as it produces a subtler difference in results compared to traditional DMFBs.
References
More filters
Journal ArticleDOI

Kinetic PCR Analysis: Real-time Monitoring of DNA Amplification Reactions

TL;DR: Results obtained with this approach indicate that a kinetic approach to PCR analysis can quantitate DNA sensitively, selectively and over a large dynamic range.
PatentDOI

Microfluidic large scale integration

TL;DR: The fluidic multiplexor as discussed by the authors is a combinatorial array of binary valve patterns that exponentially increases the processing power of a network by allowing complex fluid manipulations with a minimal number of inputs.
Journal ArticleDOI

Stuxnet: Dissecting a Cyberwarfare Weapon

R Langner
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Journal ArticleDOI

An Algorithm for Path Connections and Its Applications

TL;DR: The algorithm described in this paper is the outcome of an endeavor to answer the following question: Is it possible to find procedures which would enable a computer to solve efficiently path-connection problems inherent in logical drawing, wiring diagramming, and optimal route finding?
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Related Papers (5)