Results 21 to 30 of about 2,442,732 (352)

Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2023
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj   +1 more source

Logic Locking Using Emerging 2T/3T Magnetic Tunnel Junctions for Hardware Security

open access: yesIEEE Access, 2022
With the advancement of beyond CMOS devices, a new approach to utilize the inherent physics of such emerging structures for various applications is of great interest in recent research.
Divyanshu Divyanshu   +4 more
semanticscholar   +1 more source

A Survey on Split Manufacturing: Attacks, Defenses, and Challenges

open access: yesIEEE Access, 2020
In today's integrated circuit (IC) ecosystem, owning a foundry is not economically viable, and therefore most IC design houses are now working under a fabless business model.
Tiago D. Perez, Samuel Pagliarini
doaj   +1 more source

Features of information security of computer systems

open access: yesБезопасность информационных технологий, 2021
Presented is a comprehensive analysis of the issues of technological independence and information security of the computing system. The systematic approach involves the analysis of protection technologies at all levels of architecture and its interaction
Dmitry P. Zegzhda, Igor Y. Zhukov
doaj   +1 more source

Physically Unclonable Function Using GSHE Driven SOT Assisted p-MTJ for Next Generation Hardware Security Applications

open access: yesIEEE Access, 2022
The increasing threat of security attacks on hardware security applications has driven research towards exploring beyond CMOS devices as an alternative.
Divyanshu Divyanshu   +4 more
semanticscholar   +1 more source

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

open access: yesETRI Journal, 2023
Hardware security primitives, also known as physical unclonable functions(PUFs), perform innovative roles to extract the randomness unique to specific hardware.
Mi-Kyung Oh   +3 more
doaj   +1 more source

A Novel Probability-Based Logic-Locking Technique: ProbLock

open access: yesSensors, 2021
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit.
Michael Yue, Sara Tehranipoor
doaj   +1 more source

Introduction to Hardware Security [PDF]

open access: yesElectronics, 2015
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware.
openaire   +3 more sources

A Survey on Hardware Vulnerability Analysis Using Machine Learning

open access: yesIEEE Access, 2022
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from third-party vendors to reduce SoC design cost and meet time-to-market ...
Zhixin Pan, Prabhat Mishra
doaj   +1 more source

Hardware-Assisted Security Monitoring Unit for Real-Time Ensuring Secure Instruction Execution and Data Processing in Embedded Systems

open access: yesMicromachines, 2021
The hardware security of embedded systems is raising more and more concerns in numerous safety-critical applications, such as in the automotive, aerospace, avionic, and railway systems.
Xiang Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy