Counterfeiting is an emerging national security issue for military and homeland security officials, as well as the commercial industrial base. The detection and prevention of counterfeiting is one of the topics that will be presented at the 2010 IEEE International Conference on Technologies for Homeland Security (HST 10) in November.
Counterfeit products, such as electronics and computer systems and networks, compromise mission assurance, may introduce cybersecurity risks and cost companies billions of dollars in lost revenue. Vivek Pathak, in his paper, "Preventing Counterfeiting through Authenticated Product Labels," will discuss how a cryptography-based counterfeit detection method identifies counterfeit products and can pinpoint their source in the supply chain.
Pathak will present his paper during HST 10 at the Westin Waltham Boston in Waltham, Mass., USA, 8-10 November 2010.
The HST 10 Technical Program Committee is made up of leading science and technology experts from academia, national laboratories, federally funded research and development centers, the federal government and industry. The committee reviewed 135 papers and accepted 80, for a 59.3 percent acceptance rate. Thirty-seven papers came from outside of the United States.
"We know that attendees from many backgrounds come to the conference to learn about the state of the art and recent advances," said Dr. Robert Cunningham, leader of the Cyber Systems and Technology Group at MIT Lincoln Laboratory and HST 10 technical co-chair. "Some attendees come to deepen their understanding of their own field, and some come to gain breadth. Some come to learn about national priorities and future directions. This year's program has a little of something for everyone."
HST 10 will bring together global science and technology thought leaders to foster homeland security technology innovation. It will showcase selected technical papers highlighting emerging technologies in four tracks: cybersecurity; land and maritime border security; counter-WMD techniques, and critical infrastructure and key resources physical security; and attack and disaster preparation, recovery and response.