Past Events

ICTS Seminar - Post-Attempted Coup in Turkey: Quo Vadis? - Aug. 3, 2016
ICTS Seminar - Post-Attempted Coup in Turkey: Quo Vadis? - Aug. 3, 2016
Potomac Institute for Policy Studies August 3, 2016 Place: The International Law Institute In the wake of the failed coup in July, many questions have arisen both domestically and internationally regarding Turkey’s future political, social, economic, and strategic direction. Interdisciplinary ac...
ICTS Event -The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies
ICTS Event -The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies
Potomac Institute for Policy Studies July 27, 2016 The latest terrorist incidents in Nice, Baton Rouge, Dallas, Orlando and elsewhere, are once again a grim reminder of the expanding operational roles of "lone wolves." Whether they are self-radicalized or linked to home-grown or foreign groups, the...
ICTS Seminar -“Aviation Security: Past Lessons, Future Outlook, and ‘Best Practices’ Responses”
ICTS Seminar -“Aviation Security: Past Lessons, Future Outlook, and ‘Best Practices’ Responses”
Potomac Institute for Policy Studies June 28, 2016 From aircraft hijackings in the 1970s to 9/11 and the mystery of the Malaysia Airlines Flight 370 in 2014 to the latest destruction of EgyptAir Flight 804 in 2016, critical questions regarding the future outlook for aviation security continue to ch...
ICTS Seminar - Latin American Security Challenges: From the Olympics to Zika - June 23, 2016
ICTS Seminar - Latin American Security Challenges: From the Olympics to Zika - June 23, 2016
International Center for Terrorism Studies at The Potomac Institute for Policy Studies, Inter-University Center for Terrorism Studies, Inter-University Center for Legal Studies at the International Law Institute, Center for National Security Law-University of Virginia School of Law Latin America i...
ICTS Seminar - Maritime Security: Quo Vadis? - May 23, 2016
ICTS Seminar - Maritime Security: Quo Vadis? - May 23, 2016
International Center for Terrorism Studies at the Potomac Institute for Policy Studies, Inter-University Center for Terrorism Studies, Inter-University Center for Legal Studies at the International Law Institute, Center for National Security Law at University of Virginia School of Law The latest t...
ICTS Seminar  - Populist Politics: From Protests to Violence - May 10, 2016
ICTS Seminar - Populist Politics: From Protests to Violence - May 10, 2016
Potomac Institute for Policy Studies International Center for Terrorism Studies, at the Potomac Institute for Policy Studies May 10, 2016 The current election campaigns in the United States and abroad have once again refocused the world’s attention on “populist politics.” Single-issue concern...

Employing X-Ray Tomography for Security: A Hardware Security Symposium with Michael Sutherland

On Thursday October 18th, 2018, the Potomac Institute's VITAL Center hosted Mr. Mike Sutherland of Defense Microelectronics Activity (DMEA), who discussed the current state of X-Ray tomography, and its current use cases for imaging the internal structure of integrated circuits in 3 dimensions using a transmission X-Ray microscope. Mr. Sutherland presented data from both lab and synchrotron-based system approaches to demonstrate many of the benefits and limitations of using X-Ray tomography. Mr. Sutherland also discussed the emerging research and development efforts in the field.

Mr. Mike Sutherland has worked as a computer scientist at DMEA since 2014. He is currently the lead researcher there working on X-Ray microscope hardware and software to image the internal nature of integrated circuits. In addition to his work on X-Ray tomography, Mr. Sutherland also works on image analysis and machine learning efforts to analyze integrated circuits for reverse engineering purposes

About the Hardware Security Symposium Speaker Series

Microelectronics are key components in our defense systems, and assuring that they are both readily available and secure is critical for US national security. Hardware-based threats can have serious impacts on military or critical infrastructure, and hardware vulnerabilities include malicious insertions, Trojan horses, counterfeit parts, and rapid obsolescence. While the USG has made large investments in software-focused cybersecurity, hardware-based approaches have not received as much attention. The Hardware Security Symposium Speaker Series brings together leading experts in Trusted microelectronics from academia, government, and Industry, to discuss hardware security threats, and ways to mitigate them.