Results 11 to 20 of about 521,610 (289)
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva +13 more
core +2 more sources
A Survey on Hardware Vulnerability Analysis Using Machine Learning
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from third-party vendors to reduce SoC design cost and meet time-to-market ...
Zhixin Pan, Prabhat Mishra
doaj +1 more source
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems.
Balfanz D. +6 more
core +1 more source
In today's cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be executed ...
Michael Bartock +8 more
openaire +2 more sources
The mitigation of non-line-of-sight propagation conditions is one of main challenges in wireless signal–based indoor localization. When radio frequency identification localization technology is applied in applications, the received signal strength ...
Jie Wu, Minghua Zhu, Bo Xiao, Wei He
doaj +1 more source
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software ...
Simranjeet Sidhu +2 more
doaj +1 more source
Design of SoC Security Check Architecture for Internet of Things Applications [PDF]
The rapid development of Internet of Things(IoT) applications and the trend of open source software and hardware impose an increasingly acute hardware security threat on IoT devices.An especially serious threat is the system-level attacks triggered by ...
YAN Huayu, CHEN Lan, TONG Xin, LI Ying
doaj +1 more source
Deduction with XOR Constraints in Security API Modelling [PDF]
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach +13 more
core +2 more sources
Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj +1 more source
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan +4 more
doaj +1 more source

