Results 1 to 10 of about 526,358 (189)

A Survey on Hardware Security: Current Trends and Challenges

open access: yesIEEE Access, 2023
Hardware security has become a critical concern due to the globalization of the Integrated Circuit (IC) supply chain and the complex network connections of computing-intensive devices.
Sonia Akter, Kasem Khalil, Magdy Bayoumi
doaj   +3 more sources

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

open access: yesJournal of Sensor and Actuator Networks, 2019
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu   +2 more
doaj   +3 more sources

Hardware security without secure hardware: How to decrypt with a password and a server [PDF]

open access: yesTheoretical Computer Science, 2021
ISSN:0304 ...
Blazy, Olivier   +5 more
openaire   +4 more sources

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

open access: yesIEEE Access, 2022
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida   +3 more
doaj   +1 more source

Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs

open access: yesIEEE Access, 2021
The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance of Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number of
Yan Zhang   +4 more
doaj   +1 more source

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

A Survey on Split Manufacturing: Attacks, Defenses, and Challenges

open access: yesIEEE Access, 2020
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model.
Tiago D. Perez, Samuel Pagliarini
doaj   +1 more source

Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2023
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj   +1 more source

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

open access: yesETRI Journal, 2023
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh   +3 more
doaj   +1 more source

Features of information security of computer systems

open access: yesБезопасность информационных технологий, 2021
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj   +1 more source

Home - About - Disclaimer - Privacy