Dyeing vegetables with harmful compounds has become an alarming public health issue over the past few years. Excessive consumption of these dyed vegetables can cause severe health hazards, including cancer. Copper sulfate, malachite green, and Sudan red are some of the non-food-grade dyes widely used on vegetables by untrusted entities in the food supply chain to make them look fresh and vibrant.
View Article and Find Full Text PDFACM J Emerg Technol Comput Syst
January 2019
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical devices, smart home appliances as well as traditional computing platforms such as personal computers and servers have been increasingly targeted with a variety of cyber attacks. Due to limited hardware resources for embedded devices and difficulty in wide-coverage and on-time software updates, software-only cyber defense techniques, such as traditional anti-virus and malware detectors, do not offer a silver-bullet solution. Hardware-based security monitoring and protection techniques, therefore, have gained significant attention.
View Article and Find Full Text PDFACM Transact Des Autom Electron Syst
January 2019
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives as well as in critical infrastructures such as power grid, satellite communication, and public transportation. In the past few decades, the security of software running on these systems has received significant attention. However, hardware has been assumed to be trustworthy and reliable "by default" without really analyzing the vulnerabilities in the electronics supply chain.
View Article and Find Full Text PDFTraditional passwords are inadequate as cryptographic keys, as they are easy to forge and are vulnerable to guessing. Human biometrics have been proposed as a promising alternative due to their intrinsic nature. Electrocardiogram (ECG) is an emerging biometric that is extremely difficult to forge and circumvent, but has not yet been heavily investigated for cryptographic key generation.
View Article and Find Full Text PDF