Results 151 to 160 of about 776,400 (220)

A bio inspired hybrid optimization framework for efficient real time malware detection. [PDF]

open access: yesSci Rep
Abualhaj MM   +7 more
europepmc   +1 more source

Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]

open access: yesSci Rep
Dokku NS   +5 more
europepmc   +1 more source

DCDC PUF an enhanced implementation of ring oscillator based PUF. [PDF]

open access: yesSci Rep
Younes L   +4 more
europepmc   +1 more source

Ephemeral Key-based Hybrid Hardware Obfuscation

2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2022
Mission-critical systems often employ intellectual property (IP) that is the backbone of the system. The current ASIC ecosystem involves multiple third-party fabrication facilities, which is a cause of concern due to risks such as reverse engineering (RE)
Neelam Nasir   +4 more
openaire   +2 more sources

Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM

IEEJ Transactions on Industry Applications, 2019
Obfuscation is a method to conceal the structure and function of software. Obfuscator-LLVM (oLLVM) is a set of tools for software obfuscation, which is implemented as middle-end passes in an LLVM framework.
Yuumi Matsuoka   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy