Results 11 to 20 of about 2,442,732 (352)

Hardware security without secure hardware: How to decrypt with a password and a server [PDF]

open access: yesTheoretical Computer Science, 2021
ISSN:0304 ...
Patrick Towa   +6 more
openaire   +4 more sources

On Hardware Security Bug Code Fixes by Prompting Large Language Models [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2023
Novel AI-based code-writing Large Language Models (LLMs) such as OpenAI’s Codex have demonstrated capabilities in many coding-adjacent domains. In this work, we consider how LLMs may be leveraged to automatically repair identified security-relevant bugs ...
Baleegh Ahmad   +4 more
semanticscholar   +1 more source

Unlocking Hardware Security Assurance: The Potential of LLMs [PDF]

open access: yesarXiv.org, 2023
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-level integration through the utilization of multiple Intellectual Property (IP) cores. However, the integration of multiple IP cores also presents unique challenges owing
Xingyu Meng   +7 more
semanticscholar   +1 more source

Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study

open access: yesIEEE Access, 2022
The integrated circuit (IC) ecosystem, today, is widely distributed. Usually, a handful of companies is involved in the development of a single chip – an environment that presents many opportunities for malicious activities such as the insertion ...
Felipe Almeida   +3 more
doaj   +1 more source

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

High-Level Approaches to Hardware Security: A Tutorial [PDF]

open access: yesACM Transactions on Embedded Computing Systems, 2022
Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising.
H. Pearce, R. Karri, Benjamin Tan
semanticscholar   +1 more source

Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs

open access: yesIEEE Access, 2021
The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance of Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number of
Yan Zhang   +4 more
doaj   +1 more source

HW2VEC: a Graph Learning Tool for Automating Hardware Security [PDF]

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust, 2021
The time-to-market pressure and continuous growing complexity of hardware designs have promoted the globalization of the Integrated Circuit (IC) supply chain.
S. Yu   +4 more
semanticscholar   +1 more source

A Survey on Machine Learning in Hardware Security

open access: yesACM Journal on Emerging Technologies in Computing Systems, 2023
Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures.
Troya Çağıl Köylü   +4 more
semanticscholar   +1 more source

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks

open access: yesIEEE Access, 2022
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutiérrez   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy