标 题:可信计算(Trustworthy Computing)
时 间:2021 年 2 月 27 日 下午2:00pm – 3:30pm (Beijing Time)
Zoom 会议号:892 8336 0186
Zoom 密码:053029
报告人
:史又华 教授, 日本早稻田大学
邀请人
:王超 研究员
报告摘要:
随着人工智能和物联网在我们日常生活中扮演着越来越重要的角色,可信计算成为我们必须面临的最大挑战之一,例如人工智能技术存在被攻击和被恶意使用攻击自身硬件的风险。本讲座将讨论几个与安全相关的问题,如旁路攻击、伪造和硬件木马等,这些问题可能会使我们的智能手机或汽车的安全受到威胁。另一方面,这些脆弱性问题可能是在产品系统的设计和生存中无意造成的。因此,我们还将讨论有关设计工作,目的是在可信计算的设计阶段识别这些安全漏洞问题。
As artificial intelligence (AI) and internet of things (IoT) play more and more important roles in our daily lives, trustworthy computing becomes one of the biggest challenges that we must
face. For example, AI technologies have the risk of being attacked or might be used maliciously to attack our hardware. In this talk, we will discuss on several security related issues
such as side channel attack, counterfeiting and hardware Trojan (HT) that could make our smartphone or automotive to be compromised. On the other hand, it might be possible that
these vulnerability issues were created unintentionally.Therefore, we will also discuss on the design efforts that aim to identify these vulnerability issues in the design phase for trustworthy computing.
报告人介绍:
史又华教授分别于1999年和2002年获得中国东南大学电子工程学士和硕士学位。2005年获得早稻田大学的电子信息与通讯工程博士学位。现任早稻田大学理工学院教授。主要从事未来智慧化社会、智能系统、神经网络、自供电可穿戴系统、硬件安全和可信计算的多方面研究。在IEEE transactions on VLSI、IEEE transactions on computer-aided design and integrated circuit and systems、IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences等国际期刊上发表论文50余篇,获2012年IEEK最佳论文奖。
•Youhua Shi received the B.Eng. and M. S. degrees in electronic engineering from Southeast University, Nanjing, China, in 1999 and 2002, respectively, and the Dr. Eng. Degree in Electronics, Information and Communication Engineering from Waseda University, Tokyo, Japan, in 2005. He is currently a Professor in the Faculty of Science and Engineering, Waseda University. He is exploring various techniques for future intelligent society, and his current research activities mainly focus on intelligent systems (including both HW and SW for machine learning, neural networks etc.), self-powered wearable systems, and hardware security and trustworthy computing. He has published over 50 papers on IEEE transactions on VLSI、IEEE transactions on computer-aided design and integrated circuit and systems、IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, etc. In 2012, he was honored the best paper award from IEEK.