Results 11 to 20 of about 522,468 (334)

Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2023
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj   +1 more source

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

open access: yesETRI Journal, 2023
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh   +3 more
doaj   +1 more source

Features of information security of computer systems

open access: yesБезопасность информационных технологий, 2021
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj   +1 more source

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

28 Nanometers FPGAs Support for High Throughput and Low Power Cryptographic Applications

open access: yesJournal of Advances in Information Technology, 2013
The current unprecedented advancements of communication systems and high performance computing urged for a high throughput applications with power consumption within a predefined budget.
Yaser Jararweh   +3 more
doaj   +1 more source

HardIDX: Practical and Secure Index with SGX [PDF]

open access: yes, 2017
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva   +13 more
core   +2 more sources

A Survey on Hardware Vulnerability Analysis Using Machine Learning

open access: yesIEEE Access, 2022
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from third-party vendors to reduce SoC design cost and meet time-to-market ...
Zhixin Pan, Prabhat Mishra
doaj   +1 more source

Design of SoC Security Check Architecture for Internet of Things Applications [PDF]

open access: yesJisuanji gongcheng, 2021
The rapid development of Internet of Things(IoT) applications and the trend of open source software and hardware impose an increasingly acute hardware security threat on IoT devices.An especially serious threat is the system-level attacks triggered by ...
YAN Huayu, CHEN Lan, TONG Xin, LI Ying
doaj   +1 more source

Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

open access: yes, 2020
Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems.
Balfanz D.   +6 more
core   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Home - About - Disclaimer - Privacy