Results 311 to 320 of about 2,442,732 (352)

Computer Vision for Hardware Security [PDF]

open access: possible, 2020
The application of computer vision to hardware security has the potential to address the limitations of both electrical testing and traditional physical inspection approaches to hardware security. This chapter begins by providing an overview of basic computer vision concepts as well as a description of pipeline tasks.
Daniel E. Capecci   +4 more
openaire   +1 more source

Hardware-Level Secure Coding

IEEE Embedded Systems Letters
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti   +1 more
openaire   +2 more sources

Improving Hardware Security for LoRaWAN

2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. LoRaWAN is one of the most outstanding technologies for massive IoT communications due to features such as large coverage and low power consumption. In this
Natalia Chinchilla-Romero   +3 more
openaire   +2 more sources

Trends in Hardware Security: From basics to ASICs

IEEE Solid-State Circuits Magazine, 2019
This article presents an excerpt of the tutorial on hardware security delivered at the 2019 IEEE International Solid-State Circuits Conference [4] and an introduction to a performance scaling trend perspective for security primitives. The latter provides
M. Alioto
semanticscholar   +1 more source

Hardware Security of CE Devices [Hardware Matters]

IEEE Consumer Electronics Magazine, 2017
In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores.
openaire   +2 more sources

Machine Learning in Hardware Security

2020
The ever-increasing demand for higher computing capabilities constantly pushes the development of the semiconductor industry and is making modern hardware an extremely complicated artifact. However, with the increased complexity of today’s hardware systems, their security is also challenged by various vulnerabilities coming from different perspectives.
Wenhao Wang   +6 more
openaire   +2 more sources

Secured Hardware Design - An Overview

2008 IEEE Region 5 Conference, 2008
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices.
Waleed K. Al-Assadi, S. Burugapalli
openaire   +2 more sources

Hardware Encapsulation of Security Services

2003
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty.
Adrian Baldwin, Simon Shiu
openaire   +2 more sources

New Directions in Hardware Security

2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), 2016
Summary form only. Over the last decade, Hardware Security has developed to become one of the major research areas in Electronics and Computer Engineering and Computer Science. Hardware Security research deals with cutting-edge problems and their solutions in the domains of Detection and Prevention against Hardware Trojans, Counterfeit Electronics ...
openaire   +2 more sources

Introduction to Hardware Security and Trust

2012
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.
Mohammad Tehranipoor, Cliff Wang
openaire   +2 more sources

Home - About - Disclaimer - Privacy