Results 11 to 20 of about 2,442,732 (352)
Hardware security without secure hardware: How to decrypt with a password and a server [PDF]
ISSN:0304 ...
Patrick Towa+6 more
openaire +4 more sources
On Hardware Security Bug Code Fixes by Prompting Large Language Models [PDF]
Novel AI-based code-writing Large Language Models (LLMs) such as OpenAI’s Codex have demonstrated capabilities in many coding-adjacent domains. In this work, we consider how LLMs may be leveraged to automatically repair identified security-relevant bugs ...
Baleegh Ahmad+4 more
semanticscholar +1 more source
Unlocking Hardware Security Assurance: The Potential of LLMs [PDF]
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-level integration through the utilization of multiple Intellectual Property (IP) cores. However, the integration of multiple IP cores also presents unique challenges owing
Xingyu Meng+7 more
semanticscholar +1 more source
Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida+3 more
doaj +1 more source
The Study on Hardware Security and Its Defense Measures [PDF]
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj +1 more source
High-Level Approaches to Hardware Security: A Tutorial [PDF]
Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising.
H. Pearce, R. Karri, Benjamin Tan
semanticscholar +1 more source
Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs
The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance of Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number of
Yan Zhang+4 more
doaj +1 more source
HW2VEC: a Graph Learning Tool for Automating Hardware Security [PDF]
The time-to-market pressure and continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain.
S. Yu+4 more
semanticscholar +1 more source
A Survey on Machine Learning in Hardware Security
Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures.
Troya Çağıl Köylü+4 more
semanticscholar +1 more source
Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutiérrez+5 more
semanticscholar +1 more source