{"title":"Security assessment of synthesized actuation sequences for digital microfluidic biochips","authors":"Pushpita Roy, A. Banerjee","doi":"10.1109/ISED.2017.8303937","DOIUrl":null,"url":null,"abstract":"In this paper, we address the problem of security in the context of Digital Microfluidic Biochips (DMFB) realizations, more specifically, we take up the concern of security threats on a given actuation sequence. Given a bio-chemical reaction synthesized for actuation on a given DMF architecture, we propose an automated method for verifying whether the synthesized actuation sequence is secure against malicious dispense attacks, using droplets dispensed by an attacker when the desired reaction is in execution. The foundation of our method lies in symbolic encoding. We highlight the benefits of the proposed approach through simulations on some well-known assay benchmarks.","PeriodicalId":147019,"journal":{"name":"2017 7th International Symposium on Embedded Computing and System Design (ISED)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 7th International Symposium on Embedded Computing and System Design (ISED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISED.2017.8303937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, we address the problem of security in the context of Digital Microfluidic Biochips (DMFB) realizations, more specifically, we take up the concern of security threats on a given actuation sequence. Given a bio-chemical reaction synthesized for actuation on a given DMF architecture, we propose an automated method for verifying whether the synthesized actuation sequence is secure against malicious dispense attacks, using droplets dispensed by an attacker when the desired reaction is in execution. The foundation of our method lies in symbolic encoding. We highlight the benefits of the proposed approach through simulations on some well-known assay benchmarks.