Results 231 to 240 of about 526,457 (288)
Some of the next articles are maybe not open access.
Virtualization and Hardware-Based Security
IEEE Security and Privacy, 2008Hypervisors allow virtualization at the hardware level. These technologies have security-related strengths as well as weaknesses. The authors examine emerging hardware and software virtualization technologies in the context of modern computing environments and requirements.
Ronald Perez, Reiner Sailer
exaly +2 more sources
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby B. Lee +2 more
openaire +1 more source
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby B. Lee +2 more
openaire +1 more source
Standards for Hardware Security
GetMobile: Mobile Computing and Communications, 2019Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs).
Ujjwal Guin +2 more
openaire +1 more source
Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, 2011
This special session addresses the increasingly critical area of hardware security in VLSI. As computing becomes ubiquitous, most systems need to implement various layers of security, all of which rely on the security of the underlying hardware. At the same time, persistent trends in VLSI are producing challenges and opportunities in the design of ...
Wayne P. Burleson, Yusuf Leblebici
openaire +1 more source
This special session addresses the increasingly critical area of hardware security in VLSI. As computing becomes ubiquitous, most systems need to implement various layers of security, all of which rely on the security of the underlying hardware. At the same time, persistent trends in VLSI are producing challenges and opportunities in the design of ...
Wayne P. Burleson, Yusuf Leblebici
openaire +1 more source
Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
Hardware implementation of bluetooth security
IEEE Pervasive Computing, 2003Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
Paraskevas Kitsos +3 more
openaire +1 more source
Challenges and Methodologies of Hardware Security
2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), 2018An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011.
Kin Fun Li, Narges Attarmoghaddam
openaire +1 more source
Verifiable Security Templates for Hardware
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020High-level synthesis (HLS) research generally focuses on transferring "software engineering virtues" (e.g., modularity, abstraction, extensibility, etc.) to hardware development with the ultimate goal of making hardware development as agile as software development.
William L. Harrison, Gerard Allwein
openaire +1 more source
IEEE Embedded Systems Letters
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti +1 more
openaire +2 more sources
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti +1 more
openaire +2 more sources

