Samer Moein
University of Victoria
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Samer Moein.
international conference on computer engineering and systems | 2015
Samer Moein; Jayaram Subramnian; T. Aaron Gulliver; Fayez Gebali; M. Watheq El-Kharashi
The majority of techniques that have been developed to detect hardware trojans are based on only specific attributes. Further, the ad hoc approaches that have been employed to design methods for trojan detection are largely ineffective. These trojans have a number of attributes which can be used in a systematic way to develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to develop a new approach to hardware trojan identification and classification.
Archive | 2015
Samer Moein; Fayez Gebali
Current embedded system, such as cell phones and smart-cards, in corporate security devices or cryptographic processor. Therefore hardware attacks targets this security devices. In this paper we discuss brifely Accessibility/Resources/Time (ART) schema that quantifies hardware attacks. Hardware attacks could be covert or overt based on awareness of the targeted system. In this paper, we provide an overview of overt attack and quantify the attack using the ART schema.
international conference on computer engineering and systems | 2015
Samer Moein; Salman Khan; T. Aaron Gulliver; Fayez Gebali; M. Watheq El-Kharashi
This paper considers the classification of hardware trojans in semiconductor chips. The phases of the chip production life-cycle are reviewed and opportunities for trojan insertion are discussed. Trojans are classified using a comprehensive attribute taxonomy based on eight categories. A matrix describing the relationships between these attributes is defined which can be used to identify hardware trojans.
IEEE Access | 2016
Samer Moein; Thomas Aaron Gulliver; Fayez Gebali; Abdulrahman Alkandari
This paper examines hardware trojan threats to semiconductor chips, which is particularly important for chips intended for vital infrastructure and critical applications. The phases of the chip production life-cycle are considered in terms of the opportunities for trojan insertion. Trojans are examined based on eight attribute categories. A matrix identifying the relationships between these attributes is defined. This matrix is used to characterize hardware trojans from both the attacker and defender perspectives. Two case studies are given to illustrate the usefulness of the proposed approach.
international conference on computer engineering and systems | 2015
Samer Moein; Fayez Gebali; T. Aaron Gulliver; M. Watheq El-Kharashi
Modern VLSI chips have high complexity and usually contain cryptographic processors to protect their data and external communications. Attackers target the hardware to imitate or understand the system design, gain access to the system or obtain encryption keys. They may also want to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, risk levels are defined for hardware attacks based on the accessibility, resources, and time required to successfully attack a system.
Journal of Cryptographic Engineering | 2016
Samer Moein; Fayez Gebali; T. Aaron Gulliver
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce system reliability. In this paper, an algebraic methodology is proposed to examine hardware attacks based on the attack properties and associated risks. This methodology is employed to construct algorithms to develop hardware attack and defence strategies. It can also be used to predict system vulnerabilities and assess the security of a system.
Indonesian Journal of Electrical Engineering and Computer Science | 2018
Abdulrahman Alkandari; Samer Moein
Received Jan 15, 2018 Revised Mar 14, 2018 Accepted Mar 30, 2018 Blood veins detection process can be cumbersome for nurses and medical practioners when it comes to special overweight type of patients. This simple routine procedure can lead the process into an extreme calamity for these patients. In this paper, we emphasized on a process for the detection of the vein in real time using the consecrations of Matlab to prevent or at least reduce the number of inescapable calamity for patients during the infusion of a needle by phlebotomy or doctor in everyday lives. Hemoglobin of the blood tissues engrossed the Near Infrared (NIR) illuminated light and Night vision camera is used to capture the scene and enhance the vein pattern clearly using Contrast Limited Adaptive Histogram Equalization (CLAHE) method. This simple approach can successfully also lead to localizing bleeding spots, clots from stroke ... etc among other things.
Archive | 2017
Nicholas Houghton; Samer Moein; Fayez Gebali; T. Aaron Gulliver
Hardware trojans are accidental or malicious modifications of integrated circuits. There is currently no accepted standard for describing trojans or the methods used to detect them. A taxonomic structure was recently proposed that is a viable candidate for standardization. Universal use of this structure by the hardware security community will help bring much needed cohesion to the discipline. Although this approach is intuitive, the computations required can be onerous and thus prone to error. Therefore, an online system has been developed which hosts applications that automate techniques for trojan characterization and classification. Their use will standardize hardware security analysis and provide a database of known trojans and detection methods for statistical analysis.
pacific rim conference on communications, computers and signal processing | 2015
Ali Alzahrani; Samer Moein; Nicholas Houghton; Fayez Gebali
Over the last decade, the demand for privacy and data confidentiality in communication and storage processes have increased exponentially. Cryptography can be the solution for this demand. However, the critical issue occurs when there is a need for computing publicly on sensitive information or delegating computation to untrusted machines. This must be done in such a way that preserves the information privacy and accessibility. For this reason, we need an encryption algorithm that allows computation on information without revealing details about them. In 1978 Rivest, Adleman and Dertouzos [1] raised a crucial question: can we use a special privacy homomorphism to encrypt the data and do an unlimited computations on it while it remains encrypted without the necessity of decrypting it? Researchers made extensive efforts to achieve such encryption algorithm. In this paper, we introduce the implementation of the CRT-based somewhat homomorphic encryption over the integers scheme. The main goal is to provide a proof of concept of this new and promising encryption algorithm.
Archive | 2014
Samer Moein; Fayez Gebali; Issa Traore