Active Debris Removal missions consist of sending a satellite in space and removing one or more debris from their current orbit. A key challenge is to obtain information about the uncooperative target. By gathering the velocity, position, and rotation of t ...
The upcoming Internet of Things (IoT) is foreseen to encompass massive numbers of connected devices, smart objects, and cyber-physical systems. Due to the large scale and massive deployment of devices, it is deemed infeasible to safeguard 100% of the devic ...
Albeit very appealing, FPGA multitenancy in the cloud computing environment is currently on hold due to a number of recently discovered vulnerabilities to side-channel attacks and covert communication. In this work, we successfully demonstrate a new attack ...
Siderophores are iron chelators secreted by bacteria to scavenge iron(III) from their surrounding environment. They possess their own internalization pathway that is sufficiently unselective to be hijacked, making them suitable for Trojan Horse strategy ap ...
Hardware security concerns such as IP piracy and hardware Trojans have triggered research into circuit protection and malicious logic detection from various design perspectives. In this paper, emerging technologies are investigated by leveraging their uniq ...
The golden age of antimicrobial drug development is a distant memory, and the likelihood of there being another seems slim. In part, this is because the pharmaceutical industry, which has now adopted an unsustainable business model, abandoned the anti-infe ...