Results 11 to 20 of about 526,457 (288)

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

Deduction with XOR Constraints in Security API Modelling [PDF]

open access: yes, 2005
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach   +13 more
core   +2 more sources

28 Nanometers FPGAs Support for High Throughput and Low Power Cryptographic Applications

open access: yesJournal of Advances in Information Technology, 2013
The current unprecedented advancements of communication systems and high performance computing urged for a high throughput applications with power consumption within a predefined budget.
Yaser Jararweh   +3 more
doaj   +1 more source

A New Doctrine for Hardware Security

open access: yesCoRR, 2020
In this paper, we promote the idea that recent woes in hardware security are not because of a lack of technical solutions but rather because market forces and incentives prevent those with the ability to fix problems from doing so. At the root of the problem is the fact that hardware security comes at a cost; Present issues in hardware security can be ...
Hastings, Adam K., Sethumadhavan, Simha
openaire   +3 more sources

A Survey on Hardware Vulnerability Analysis Using Machine Learning

open access: yesIEEE Access, 2022
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from third-party vendors to reduce SoC design cost and meet time-to-market ...
Zhixin Pan, Prabhat Mishra
doaj   +1 more source

Inertial measurement unit–aided dual-frequency radio frequency identification localization in line-of-sight and non-line-of-sight hybrid environment

open access: yesInternational Journal of Distributed Sensor Networks, 2018
The mitigation of non-line-of-sight propagation conditions is one of main challenges in wireless signal–based indoor localization. When radio frequency identification localization technology is applied in applications, the received signal strength ...
Jie Wu, Minghua Zhu, Bo Xiao, Wei He
doaj   +1 more source

Design of SoC Security Check Architecture for Internet of Things Applications [PDF]

open access: yesJisuanji gongcheng, 2021
The rapid development of Internet of Things(IoT) applications and the trend of open source software and hardware impose an increasingly acute hardware security threat on IoT devices.An especially serious threat is the system-level attacks triggered by ...
YAN Huayu, CHEN Lan, TONG Xin, LI Ying
doaj   +1 more source

Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]

open access: yesJisuanji gongcheng, 2016
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj   +1 more source

Hardware-Assisted Security Monitoring Unit for Real-Time Ensuring Secure Instruction Execution and Data Processing in Embedded Systems

open access: yesMicromachines, 2021
The hardware security of embedded systems is raising more and more concerns in numerous safety-critical applications, such as in the automotive, aerospace, avionic, and railway systems.
Xiang Wang   +6 more
doaj   +1 more source

Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF

open access: yesIEEE Access, 2021
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy