Results 131 to 140 of about 8,466 (185)
TICS: Trusted Industry Control System Based on Hardware Security Module
The new attack technologies have caused great security threats to industry control system, especially APT attacks such as Stuxnet, BlackEnergy, WannaCrypt. Traditional protection methods fail to defend the hackers attacks on the cyber and physical components of ICS. This paper propose an ICS terminal defense solution in establishing the trustworthiness
Yu Qin, Wei Feng, Yingjun Zhang
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Module-OT: A Hardware Security Module for Operational Technology
2020 IEEE Texas Power and Energy Conference (TPEC), 2020Increased penetration levels of renewable energy and other types of distributed energy resources (DERs) on the modern electric grid-combined with technological advancements for electric system monitoring and control-introduce new cyberattack vectors and increase the cyberattack surface of energy systems. According to the IEEE Std.
Ricardo Siqueira de Carvalho+3 more
openaire +2 more sources
Analysis of a hardware security module's high-availability setting [PDF]
Analysis of a hardware security module (HSM) revealed two flaws that could lead to security problems. The first involved key deletion; the second involved unauthorized members of a group of HSMs. Neither flaw is probably fatal, if organizations develop organizational ways to work around it.
S. Neuhaus, B. Koppel
openaire +1 more source
A study of Secure cryptographic based Hardware security module in a cloud environment
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen.
S. Shivagami, J. Divya
openaire +2 more sources
A Trusted IaaS Environment with Hardware Security Module
IEEE Transactions on Services Computing, 2016With the proliferation of cloud computing, security concerns about confidentiality violations of user data by the privileged domain and system administrators have been growing. This paper proposes secure cloud architecture with a hardware security module, which isolates cloud user data from potentially malicious privileged domains or cloud ...
Jinho Seol+4 more
openaire +1 more source
Design and LSI prototyping of security module with hardware trojan
2015 IEEE International Conference on Consumer Electronics (ICCE), 2015To examine the tamper resistance of consumer security products using cryptographic circuits, the present study develops countermeasure-annulled hardware Trojan and manufactures its prototyping as ASIC using 018 um CMOS. The present study also verifies the validity and effect of the hardware Trojan on the prototyping LSI by performing evaluation tests.
Masaya Yoshikawa+2 more
openaire +2 more sources
2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +2 more sources
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +2 more sources
Fingerprinting Hardware Security Module Using ICs Radiations
Torres, Lionel+3 more
openaire +2 more sources
A hardware security module for quadrotor communication
2012 International Conference on Field-Programmable Technology, 2012This paper presents a hardware architecture for secure quadrotor communication. Both, the control data sent by the ground station and the information data sent by the quadrotor are encrypted and authenticated. The system is implemented on an FPGA and integrated on an extension board.
openaire +2 more sources
TinyI2C - A Protocol Stack for connecting Hardware Security Modules to IoT Devices
2020 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom), 2020To enhance the security of devices in the Internet of Things, devices are augmented with Hardware Security Modules (HSMs). To connect HSMs to their hosting devices, serial interfaces, e.g. I2C, are used. On top of these interfaces, a protocol stack is utilized to establish a reliable communication channel.
Christian Lesjak+3 more
openaire +2 more sources