Results 251 to 260 of about 526,457 (288)
Some of the next articles are maybe not open access.
Hardware Trojan for security LSI
2013 IEEE International Conference on Consumer Electronics (ICCE), 2013A hardware Trojan has become a serious problem of consumer electronics in recent years. The present study proposes a new hardware Trojan in a countermeasure circuit and evaluates the weakness of the countermeasure circuit through simulation experiments.
Masaya Yoshikawa +2 more
openaire +1 more source
A foundry's view of hardware security
2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), 2018A system is as secure as its weakest link. Current computing systems employ a multiple-layer approach to build a trusted environment. At the bottom of this multi-layer approach is a hardware root of trust which other layers build upon. It is important to assure this root of trust is secure and free from any weakness. Recently there is surge of research
openaire +1 more source
University research in hardware security
2014 IEEE Hot Chips 26 Symposium (HCS), 2014This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow
openaire +1 more source
Hardware aspects of secure computing
Proceedings of the May 5-7, 1970, spring joint computer conference on - AFIPS '70 (Spring), 1970It makes no sense to discuss software for privacy-preserving or secure time-shared computing without considering the hardware on which it is to run. Software access controls rely upon certain pieces of hardware. If these can go dead or be deliberately disabled without warning, then all that remains is false security.
openaire +1 more source
Hardware Attacks and Security Education
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016This paper aims to develop and evaluate information assurance and security learning materials on hardware/firmware attacks for undergraduate education. Topics include firmware worms, application programming interface, and operating systems. Computing devices are equipped with firmware that performs basic hardware testing and loads operating systems ...
Dan Chia-Tien Lo +2 more
openaire +1 more source
Hardware Security Appliances for Trust
2003This paper looks at the trust relationships that exist within an outsourcing scenario finding that whilst some of the trust relationships are clear other implicit trust relationships need exposing. These implicit trust relationships are often a result of information supplied for the main explicit task for which an entity is being trusted.
Adrian Baldwin, Simon Shiu
openaire +1 more source
Hardware Security and its Adversaries
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015Cryptographic reasoning has embraced the idea of "provable security", however, as soon as crypto protocols and primitives are implemented in SW/HW, security and trust become relative to the attacker who may also attempt to embed Trojans, malicious firmware, and exploit implementation vulnerabilities and side channels.
openaire +1 more source
Securing the Smart Grid with Hardware Security Modules
2012Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire +1 more source
Hardware Security Features for Secure Embedded Devices
2007Secure embedded Devices for the mobile, financial and automotive markets require more and more security features to resist today’s field attacks. At the software level, side-channel attacks such as timing attacks, power attacks, electro-magnetic attacks and radio-frequency attacks on embedded devices have been described for a number of years now, and ...
Helena Handschuh, Elena Trichina
openaire +1 more source

