Kenneth H. Heffner
Honeywell
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kenneth H. Heffner.
IEEE Transactions on Multi-Scale Computing Systems | 2017
Jacob Wurm; Yier Jin; Yang Liu; Shiyan Hu; Kenneth H. Heffner; Fahim Rahman; Mark Tehranipoor
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.
IEEE Transactions on Multi-Scale Computing Systems | 2016
Shiyan Hu; Yier Jin; Kenneth H. Heffner; Mark Tehranipoor
The increasing complexity of networked computing systems makes modern network systems vulnerable to various attacks against their resources, infrastructure, and operability. While the reasons for such attacks may be tied to complex sociological issues, the cause of the inadequate defense solutions lies in the single-layered approach used to address computer systems security. Current security approaches separate defense strategies into distinct realms, either hardware or software. Accordingly, cross-layer approaches for secure computing and circuit systems are entirely lacking. In addition, the wide usage of third-party IP cores and outsourcing fabrication/packaging services make it possible for malicious hardware modules to enter the design flow and complicate the problem of trusted system design and verification. Although hardware security has been under investigation for years, systematically understanding the security threats to hardware infrastructure from a cross-layer perspective is an emerging research topic. Therefore, this special issue intends to serve as a forum to present state-of-the-art security solutions crossing software and hardware layers towards trustworthy computing system development.
Archive | 1995
Kenneth H. Heffner; Curtis W. Anderson
Archive | 1995
Kenneth H. Heffner; Curtis W. Anderson
Archive | 2005
Edwin D. Cruzado; Kenneth H. Heffner
Journal of Applied Polymer Science | 2005
Yang Liu; Yi-Feng Wang; Timofey G. Gerasimov; Kenneth H. Heffner; Julie P. Harmon
Archive | 2010
Kenneth H. Heffner
Archive | 1995
Kenneth H. Heffner; Curtis W. Anderson
Archive | 2005
Julianne P. Harmon; Kenneth H. Heffner; Scott G. Fleischman; William J. Dalzell
Archive | 1996
Kenneth H. Heffner; Curtis W. Anderson