Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kenneth H. Heffner is active.

Publication


Featured researches published by Kenneth H. Heffner.


IEEE Transactions on Multi-Scale Computing Systems | 2017

Introduction to Cyber-Physical System Security: A Cross-Layer Perspective

Jacob Wurm; Yier Jin; Yang Liu; Shiyan Hu; Kenneth H. Heffner; Fahim Rahman; Mark Tehranipoor

Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as power grids, transportation systems, home automation systems, etc. Because cyber-physical systems are widely used in these applications, the security considerations of these systems should be of very high importance. Compromise of these systems in critical infrastructure will cause catastrophic consequences. In this paper, we will investigate the security vulnerabilities of currently deployed/implemented cyber-physical systems. Our analysis will be from a cross-layer perspective, ranging from full cyber-physical systems to the underlying hardware platforms. In addition, security solutions are introduced to aid the implementation of security countermeasures into cyber-physical systems by manufacturers. Through these solutions, we hope to alter the mindset of considering security as an afterthought in CPS development procedures.


IEEE Transactions on Multi-Scale Computing Systems | 2016

Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing

Shiyan Hu; Yier Jin; Kenneth H. Heffner; Mark Tehranipoor

The increasing complexity of networked computing systems makes modern network systems vulnerable to various attacks against their resources, infrastructure, and operability. While the reasons for such attacks may be tied to complex sociological issues, the cause of the inadequate defense solutions lies in the single-layered approach used to address computer systems security. Current security approaches separate defense strategies into distinct realms, either hardware or software. Accordingly, cross-layer approaches for secure computing and circuit systems are entirely lacking. In addition, the wide usage of third-party IP cores and outsourcing fabrication/packaging services make it possible for malicious hardware modules to enter the design flow and complicate the problem of trusted system design and verification. Although hardware security has been under investigation for years, systematically understanding the security threats to hardware infrastructure from a cross-layer perspective is an emerging research topic. Therefore, this special issue intends to serve as a forum to present state-of-the-art security solutions crossing software and hardware layers towards trustworthy computing system development.


Archive | 1995

Multilayer protective coating for integrated circuits and multichip modules and method of applying same

Kenneth H. Heffner; Curtis W. Anderson


Archive | 1995

Process for coating an integrated circuit device with a molten spray

Kenneth H. Heffner; Curtis W. Anderson


Archive | 2005

System and method for detecting unauthorized access to electronic equipment or components

Edwin D. Cruzado; Kenneth H. Heffner


Journal of Applied Polymer Science | 2005

Thermal analysis of novel underfill materials with optimum processing characteristics

Yang Liu; Yi-Feng Wang; Timofey G. Gerasimov; Kenneth H. Heffner; Julie P. Harmon


Archive | 2010

Microelectronic security coatings

Kenneth H. Heffner


Archive | 1995

Process for applying a molten droplet coating for integrated circuits

Kenneth H. Heffner; Curtis W. Anderson


Archive | 2005

Thermally conductive composite and uses for microelectronic packaging

Julianne P. Harmon; Kenneth H. Heffner; Scott G. Fleischman; William J. Dalzell


Archive | 1996

Coating delicate circuits

Kenneth H. Heffner; Curtis W. Anderson

Collaboration


Dive into the Kenneth H. Heffner's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shiyan Hu

Michigan Technological University

View shared research outputs
Top Co-Authors

Avatar

Yang Liu

Michigan Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge