Results 301 to 310 of about 2,442,732 (352)
Some of the next articles are maybe not open access.
2010
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Cynthia E. Irvine+5 more
openaire +2 more sources
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Cynthia E. Irvine+5 more
openaire +2 more sources
The Evolution of Hardware-Assisted Security
2021In this chapter, we study the security mechanisms implemented in modern hardware architectures. In essence, hardware-based security can be more effective against powerful attacks, while at the same time minimize the imposed runtime overheads of the security checks themselves.
Sotirios Ioannidis+3 more
openaire +2 more sources
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020Machine learning techniques have significantly changed our lives. They helped improving our everyday routines, but they also demonstrated to be an extremely helpful tool for more advanced and complex applications.
F. Regazzoni+18 more
semanticscholar +1 more source
Parallelizing security checks on commodity hardware
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, 2008Speck (Speculative Parallel Check) is a system thataccelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows sequential invocations of a particular security check to run in parallel without sacrificing the safety of the ...
Peter M. Chen+3 more
openaire +2 more sources
Computer Fraud & Security, 2004
Abstract The Internet is a polluted place, infested by viruses and over-populated by unsolicited junk such as spam and popups. While in theory there exist all the tools we need to protect ourselves from these nuisances and risks, in practice it is impossible for most casual users and for many companies to steer clear of them.
openaire +2 more sources
Abstract The Internet is a polluted place, infested by viruses and over-populated by unsolicited junk such as spam and popups. While in theory there exist all the tools we need to protect ourselves from these nuisances and risks, in practice it is impossible for most casual users and for many companies to steer clear of them.
openaire +2 more sources
IEEE International Symposium on On-Line Testing and Robust System Design, 2020
Internet of Things (IoT) is experiencing significant growth in the safety-critical applications which have caused new security challenges. These devices are becoming targets for different types of physical attacks, which are exacerbated by their ...
Z. Kazemi+3 more
semanticscholar +1 more source
Internet of Things (IoT) is experiencing significant growth in the safety-critical applications which have caused new security challenges. These devices are becoming targets for different types of physical attacks, which are exacerbated by their ...
Z. Kazemi+3 more
semanticscholar +1 more source
Hardware implementation of bluetooth security
IEEE Pervasive Computing, 2003Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
Nicolas Sklavos+3 more
openaire +2 more sources
On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective
Euromicro Symposium on Digital Systems Design, 2020As medical devices more and more use Internet of Things based technologies, serious concerns are raised about their security and the privacy of patient’s personal health data.
Konstantinos Nomikos+5 more
semanticscholar +1 more source
2010
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +2 more sources
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +2 more sources
Secure Hardware Design for Trust
2012Abstract : In this work, we have developed a technique called Logic Encryption to harden computer circuitry against these malicious threats by hiding the functionality of a design. The functionality of a design will be concealed until it is configured by a designer after fabrication and all critical computing components are under Air Force custody and ...
Garrett S. Rose, Youngok Pino
openaire +2 more sources