Results 1 to 10 of about 521,610 (289)
Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida +3 more
doaj +1 more source
Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs
The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance of Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number of
Yan Zhang +4 more
doaj +1 more source
The Study on Hardware Security and Its Defense Measures [PDF]
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj +1 more source
A Survey on Hardware Security: Current Trends and Challenges
Hardware security has become a critical concern due to the globalization of the Integrated Circuit (IC) supply chain and the complex network connections of computing-intensive devices.
Sonia Akter, Kasem Khalil, Magdy Bayoumi
doaj +1 more source
A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model.
Tiago D. Perez, Samuel Pagliarini
doaj +1 more source
Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj +1 more source
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh +3 more
doaj +1 more source
Features of information security of computer systems
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj +1 more source
A Novel Probability-Based Logic-Locking Technique: ProbLock
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj +1 more source
28 Nanometers FPGAs Support for High Throughput and Low Power Cryptographic Applications
The current unprecedented advancements of communication systems and high performance computing urged for a high throughput applications with power consumption within a predefined budget.
Yaser Jararweh +3 more
doaj +1 more source

