Results 41 to 50 of about 621 (141)

Keep the PokerFace on! Thwarting cache side channel attacks by memory bus monitoring and cache obfuscation

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
Cloud instances are vulnerable to cross-core, cross-VM attacks against the shared, inclusive last-level cache. Automated cache template attacks, in particular, are very powerful as the vulnerabilities do not need to be manually identified.
Arun Raj, Janakiram Dharanipragada
doaj   +1 more source

TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans

open access: yesIEEE Access
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque   +3 more
doaj   +1 more source

Trusted execution environments for quantum computers

open access: yesFrontiers in Computer Science
The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both.
Theodoros Trochatos   +6 more
doaj   +1 more source

Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants

open access: yesApplied Sciences
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj   +1 more source

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis

open access: yesChips
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine ...
Will Lillis   +2 more
doaj   +1 more source

Hardware Validation for Semi-Coherent Transmission Security

open access: yesInformation
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher   +2 more
doaj   +1 more source

Automated Hardware Logic Obfuscation Framework Using GPT

open access: yes2024 IEEE 17th Dallas Circuits and Systems Conference (DCAS)
Obfuscation stands as a promising solution for safeguarding hardware intellectual property (IP) against a spectrum of threats including reverse engineering, IP piracy, and tampering. In this paper, we introduce Obfus-chat, a novel framework leveraging Generative Pre-trained Transformer (GPT) models to automate the obfuscation process.
Latibari, Banafsheh Saber   +7 more
openaire   +2 more sources

Machine Learning and Deep Learning Approaches for SQL Injection Detection: A Review

open access: yesNTU Journal of Engineering and Technology
Structured Query Language Injection (SQLi) remains one of the most serious threats to web applications and has the ability to bypass traditional signature-based detection through obfuscation and zero-day payloads.
Sahar Saadallah Ahmed   +1 more
doaj   +1 more source

Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid

open access: yesEnergies
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive.
Daniel Sousa-Dias   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy