Results 31 to 40 of about 776,400 (220)

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation [PDF]

open access: yesAsian Hardware-Oriented Security and Trust Symposium, 2018
Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly focus on functional locking of a design to prevent black-box usage ...
Prabuddha Chakraborty   +2 more
semanticscholar   +1 more source

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]

open access: yes, 2018
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco   +2 more
core   +2 more sources

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

Interlocking obfuscation for anti-tamper hardware [PDF]

open access: yesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013
Tampering and Reverse Engineering of a chip to extract the hardware Intellectual Property (IP) core or to inject malicious alterations is a major concern. Digital systems susceptible to tampering are of immense concern to defense organizations. First, offshore chip manufacturing allows the design secrets of the IP cores to be transparent to the foundry
Avinash R. Desai   +4 more
openaire   +1 more source

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]

open access: yes, 2018
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier   +3 more
core   +1 more source

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]

open access: yes, 2018
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan   +3 more
core   +1 more source

Noise‐based logic locking scheme against signal probability skew analysis

open access: yesIET Computers & Digital Techniques, 2021
Due to integrated circuit (IC) production chain globalisation, several new threats such as hardware trojans, counterfeiting and overproduction are threatening the IC industry. So logic locking is deployed to hinder these security threats.
Ahmad Rezaei, Ali Mahani
doaj   +1 more source

In the quest of vision-sensors-on-chip: Pre-processing sensors for data reduction [PDF]

open access: yes, 2017
This paper shows that the implementation of vision systems benefits from the usage of sensing front-end chips with embedded pre-processing capabilities - called CVIS.
Brea Sánchez, Víctor   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy