Results 251 to 260 of about 526,457 (288)
Some of the next articles are maybe not open access.

Hardware Trojan for security LSI

2013 IEEE International Conference on Consumer Electronics (ICCE), 2013
A hardware Trojan has become a serious problem of consumer electronics in recent years. The present study proposes a new hardware Trojan in a countermeasure circuit and evaluates the weakness of the countermeasure circuit through simulation experiments.
Masaya Yoshikawa   +2 more
openaire   +1 more source

A foundry's view of hardware security

2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), 2018
A system is as secure as its weakest link. Current computing systems employ a multiple-layer approach to build a trusted environment. At the bottom of this multi-layer approach is a hardware root of trust which other layers build upon. It is important to assure this root of trust is secure and free from any weakness. Recently there is surge of research
openaire   +1 more source

University research in hardware security

2014 IEEE Hot Chips 26 Symposium (HCS), 2014
This article consists of a collection of slides from the author's conference presentation on hardware security. Some of the specific topics discussed include: examples of using Moving Target Defense for Secure Hardware design (DHS/AFRL project); system performance evaluations; network security considerations; secure processors; dynamic information flow
openaire   +1 more source

Hardware aspects of secure computing

Proceedings of the May 5-7, 1970, spring joint computer conference on - AFIPS '70 (Spring), 1970
It makes no sense to discuss software for privacy-preserving or secure time-shared computing without considering the hardware on which it is to run. Software access controls rely upon certain pieces of hardware. If these can go dead or be deliberately disabled without warning, then all that remains is false security.
openaire   +1 more source

Hardware Attacks and Security Education

2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016
This paper aims to develop and evaluate information assurance and security learning materials on hardware/firmware attacks for undergraduate education. Topics include firmware worms, application programming interface, and operating systems. Computing devices are equipped with firmware that performs basic hardware testing and loads operating systems ...
Dan Chia-Tien Lo   +2 more
openaire   +1 more source

Mobile hardware security

2014 IEEE Hot Chips 26 Symposium (HCS), 2014
Vikas Chandra, Rob Aitken
openaire   +1 more source

Hardware Security Appliances for Trust

2003
This paper looks at the trust relationships that exist within an outsourcing scenario finding that whilst some of the trust relationships are clear other implicit trust relationships need exposing. These implicit trust relationships are often a result of information supplied for the main explicit task for which an entity is being trusted.
Adrian Baldwin, Simon Shiu
openaire   +1 more source

Hardware Security and its Adversaries

Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
Cryptographic reasoning has embraced the idea of "provable security", however, as soon as crypto protocols and primitives are implemented in SW/HW, security and trust become relative to the attacker who may also attempt to embed Trojans, malicious firmware, and exploit implementation vulnerabilities and side channels.
openaire   +1 more source

Securing the Smart Grid with Hardware Security Modules

2012
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire   +1 more source

Hardware Security Features for Secure Embedded Devices

2007
Secure embedded Devices for the mobile, financial and automotive markets require more and more security features to resist today’s field attacks. At the software level, side-channel attacks such as timing attacks, power attacks, electro-magnetic attacks and radio-frequency attacks on embedded devices have been described for a number of years now, and ...
Helena Handschuh, Elena Trichina
openaire   +1 more source

Home - About - Disclaimer - Privacy