Results 31 to 40 of about 2,442,732 (352)
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security
The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two technologies has created many interesting and unique opportunities, but also left some issues in ...
Wenye Liu+8 more
semanticscholar +1 more source
Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan+4 more
doaj +1 more source
The mitigation of non-line-of-sight propagation conditions is one of main challenges in wireless signal–based indoor localization. When radio frequency identification localization technology is applied in applications, the received signal strength ...
Jie Wu, Minghua Zhu, Bo Xiao, Wei He
doaj +1 more source
Consolidating Security Notions in Hardware Masking
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer+2 more
doaj +1 more source
On the Security Goals of White-Box Cryptography
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock+3 more
doaj +1 more source
Design and analysis of hardware Trojans in approximate circuits
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou+4 more
doaj +1 more source
Hardware Security in Sensor and its Networks
Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in ...
Mohammad Mezanur Rahman Monjur+7 more
doaj +1 more source
Towards Energy-Efficient and Secure Computing Systems
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems.
Zhiming Zhang, Qiaoyan Yu
doaj +1 more source
Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P+5 more
doaj +1 more source
WaC: A New Doctrine for Hardware Security [PDF]
In this paper, we promote the idea that recent woes in hardware security are not because of a lack of technical solutions but rather because market forces and incentives prevent those with the ability to fix problems from doing so.
A. Hastings, S. Sethumadhavan
semanticscholar +1 more source