Hardware is a part of every electronic device you use. Whether it’s your car or sensor in a chip that controls the temperature inside your home, it is important that there is no compromise on the system we do not trust so much.
Recently, the cyber attacks primarily point out to the software, but now they have moved into deeper layers of hardware, which protect the guards with new challenges. Instead, to make sure that this software is firmly secure, researchers still have to find ways to fundamentally save basic hardware.This is the main center of Assistant Professor Dr. Javed Jian “GV” Registrar in Electrical & Computer Engineering Department at Texas & M. University.
Usually, hardware designers prepare hardware design and then create access to the other part of the world, or to the foundation where the design will be developed. Consequently, the hardware may have hardware towers or dangerous components that are dangerous to dangerous components. Hardware designers are usually worried about electricity, performance and reliability. Rajandarwan preferred them to safety.
“I want to think of them, ‘okay, what if we have to do this design, how does this affect security?’ It is in mind that it is the hardware engineers want to build in the next generation. ‘
It is important about the nature of the attacks that may occur in the foundation and consider the safety of these designs in the presence of a number of organizations in supply chain.
Regarding the “virus, think of the electric grid, our country’s infrastructure, smart grid and mission control system.” “They are not actually in hardware attacks, but affect the software system. If the hardware itself is affected, it creates many problems.”
Rajdhan first started studying security security while earning his Ph.D. At New York University Though his initial research project was not on security, he helped to handle the hardware security competition, embedded in security security. More importantly, Rajinder said that he realized that he enjoyed the subject which ultimately led to this research.
Because hardware is in every electronic system, hardware security needs help from experts from different fields.
Rajanran said, “Contact points that spread across different fields are the most interesting and most important aspects of this work.” “It’s like finding a connection between different things and searching for this area. Hardware security is very new. We look around, we rotate around and there is a new problem that keeps us.