Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Samer Moein is active.

Publication


Featured researches published by Samer Moein.


international conference on computer engineering and systems | 2015

Classification of hardware trojan detection techniques

Samer Moein; Jayaram Subramnian; T. Aaron Gulliver; Fayez Gebali; M. Watheq El-Kharashi

The majority of techniques that have been developed to detect hardware trojans are based on only specific attributes. Further, the ad hoc approaches that have been employed to design methods for trojan detection are largely ineffective. These trojans have a number of attributes which can be used in a systematic way to develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification.


Archive | 2015

Quantifying Overt Hardware Attacks: Using ART Schema

Samer Moein; Fayez Gebali

Current embedded system, such as cell phones and smart-cards, in corporate security devices or cryptographic processor. Therefore hardware attacks targets this security devices. In this paper we discuss brifely Accessibility/Resources/Time (ART) schema that quantifies hardware attacks. Hardware attacks could be covert or overt based on awareness of the targeted system. In this paper, we provide an overview of overt attack and quantify the attack using the ART schema.


international conference on computer engineering and systems | 2015

An attribute based classification of hardware trojans

Samer Moein; Salman Khan; T. Aaron Gulliver; Fayez Gebali; M. Watheq El-Kharashi

This paper considers the classification of hardware trojans in semiconductor chips. The phases of the chip production life-cycle are reviewed and opportunities for trojan insertion are discussed. Trojans are classified using a comprehensive attribute taxonomy based on eight categories. A matrix describing the relationships between these attributes is defined which can be used to identify hardware trojans.


IEEE Access | 2016

A New Characterization of Hardware Trojans

Samer Moein; Thomas Aaron Gulliver; Fayez Gebali; Abdulrahman Alkandari

This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications. The phases of the chip production life-cycle are considered in terms of the opportunities for trojan insertion. Trojans are examined based on eight attribute categories. A matrix identifying the relationships between these attributes is defined. This matrix is used to characterize hardware trojans from both the attacker and defender perspectives. Two case studies are given to illustrate the usefulness of the proposed approach.


international conference on computer engineering and systems | 2015

Hardware attack risk assessment

Samer Moein; Fayez Gebali; T. Aaron Gulliver; M. Watheq El-Kharashi

Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external communications. Attackers target the hardware to imitate or understand the system design, gain access to the system or obtain encryption keys. They may also want to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, risk levels are defined for hardware attacks based on the accessibility, resources, and time required to successfully attack a system.


Journal of Cryptographic Engineering | 2016

Hardware attacks: an algebraic approach

Samer Moein; Fayez Gebali; T. Aaron Gulliver

Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, an algebraic methodology is proposed to examine hardware attacks based on the attack properties and associated risks. This methodology is employed to construct algorithms to develop hardware attack and defence strategies. It can also be used to predict system vulnerabilities and assess the security of a system.


Indonesian Journal of Electrical Engineering and Computer Science | 2018

Implementation of Monitoring System for Air Quality using Raspberry PI: Experimental Study

Abdulrahman Alkandari; Samer Moein

Received Jan 15, 2018 Revised Mar 14, 2018 Accepted Mar 30, 2018 Blood veins detection process can be cumbersome for nurses and medical practioners when it comes to special overweight type of patients. This simple routine procedure can lead the process into an extreme calamity for these patients. In this paper, we emphasized on a process for the detection of the vein in real time using the consecrations of Matlab to prevent or at least reduce the number of inescapable calamity for patients during the infusion of a needle by phlebotomy or doctor in everyday lives. Hemoglobin of the blood tissues engrossed the Near Infrared (NIR) illuminated light and Night vision camera is used to capture the scene and enhance the vein pattern clearly using Contrast Limited Adaptive Histogram Equalization (CLAHE) method. This simple approach can successfully also lead to localizing bleeding spots, clots from stroke ... etc among other things.


Archive | 2017

The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis

Nicholas Houghton; Samer Moein; Fayez Gebali; T. Aaron Gulliver

Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization. Universal use of this structure by the hardware security community will help bring much needed cohesion to the discipline. Although this approach is intuitive, the computations required can be onerous and thus prone to error. Therefore, an online system has been developed which hosts applications that automate techniques for trojan characterization and classification. Their use will standardize hardware security analysis and provide a database of known trojans and detection methods for statistical analysis.


pacific rim conference on communications, computers and signal processing | 2015

CRT based somewhat homomorphic encryption over the integers

Ali Alzahrani; Samer Moein; Nicholas Houghton; Fayez Gebali

Over the last decade, the demand for privacy and data confidentiality in communication and storage processes have increased exponentially. Cryptography can be the solution for this demand. However, the critical issue occurs when there is a need for computing publicly on sensitive information or delegating computation to untrusted machines. This must be done in such a way that preserves the information privacy and accessibility. For this reason, we need an encryption algorithm that allows computation on information without revealing details about them. In 1978 Rivest, Adleman and Dertouzos [1] raised a crucial question: can we use a special privacy homomorphism to encrypt the data and do an unlimited computations on it while it remains encrypted without the necessity of decrypting it? Researchers made extensive efforts to achieve such encryption algorithm. In this paper, we introduce the implementation of the CRT-based somewhat homomorphic encryption over the integers scheme. The main goal is to provide a proof of concept of this new and promising encryption algorithm.


Archive | 2014

Analysis of Covert Hardware Attacks

Samer Moein; Fayez Gebali; Issa Traore

Collaboration


Dive into the Samer Moein's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Issa Traore

University of Victoria

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Salman Khan

University of Victoria

View shared research outputs
Researchain Logo
Decentralizing Knowledge