|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910556895903321 |
|
|
Titolo |
Security of biochip cyberphysical systems / / Shayan Mohammed [and four others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (135 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Biochips - Testing |
Cooperating objects (Computer systems) - Automatic control |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Acknowledgment -- Contents -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Threat to Integrity -- 1.2 The Threat to IP Rights -- 1.3 Book's Scope and Road Map -- 1.4 Biochip Systems -- 1.4.1 Digital Microfluidic Biochips -- 1.4.2 Continuous-Flow Microfluidic Biochips -- 1.4.3 Biochip Cyber-Physical System -- 1.5 Related Work -- 1.5.1 Attacks -- 1.5.2 Defenses: Tampering -- 1.5.3 Defenses: IP Theft -- 2 Threat Landscape -- 2.1 Online Tampering -- 2.1.1 Case Study: Immunoassay -- 2.1.1.1 Parameter Tampering -- 2.1.1.2 Contamination -- 2.1.1.3 Miscalibration -- 2.2 Fabrication Tampering -- 2.2.1 Case Study: Microfluidic Trojan -- 2.2.1.1 Design of a Multi-Height Valve -- 2.2.1.2 Draining of Valve Pressure -- 2.2.1.3 Attack Model -- 2.3 Reverse-Engineering -- 2.3.1 Case Study: Bioassay Theft -- 3 Architecture for Security -- 3.1 Security Metric -- 3.2 Micro-Electrode-Dot-Array -- 3.2.1 Unique Features of MEDA -- 3.3 MEDA Attack Space -- 3.3.1 Granular Attacks -- 3.3.2 Shadow Attacks -- 3.4 MEDA Defense -- 3.4.1 Micro-Attack Aware Checkpoint -- 3.4.1.1 Golden Droplet Map Generation -- 3.4.2 Shadow Attack Aware Checkpoints -- 3.5 Experimental Results -- 3.5.1 Micro-Attack Aware Checkpoints -- 3.5.2 Shadow-Attack Aware Checkpoints -- 4 Tools for Security -- 4.1 Checkpoint-Based Security -- 4.2 Exact Analysis of Checkpoint-Based Security -- 4.2.1 Symbolic Formulation -- 4.2.2 Ensure Valid DMFB Execution -- 4.2.3 Ensure Expected Behavior at |
|
|
|
|