Results 21 to 30 of about 8,466 (185)

The K2 Architecture for Trustworthy Hardware Security Modules [PDF]

open access: hybridProceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023
Anish Athalye   +3 more
openaire   +3 more sources

Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration [PDF]

open access: goldIEEE Access
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami   +9 more
doaj   +2 more sources

A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory [PDF]

open access: goldIEEE Journal of the Electron Devices Society, 2020
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin   +5 more
doaj   +2 more sources

A Fast AES Hardware Security Module for Internet of Things Applications

open access: closedInternational Journal on Advanced Science, Engineering and Information Technology, 2020
As the Internet of Things is used in various fields, Internet of Things security has become important. Since most Internet of Things devices is implemented as embedded systems, they provide a software-implemented encryption algorithm. Most embedded systems use relatively low-performance CPUs and the software processes data serially, making it difficult
HyunSeo Lim   +3 more
openaire   +2 more sources

Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]

open access: yes, 2010
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire   +2 more sources

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

open access: yesCryptography, 2023
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as
Geraldine Shirley Nicholas   +3 more
doaj   +1 more source

Hardware-Assisted System for Program Execution Security of SOC

open access: yesITM Web of Conferences, 2016
With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus.
Wang Xiang   +7 more
doaj   +1 more source

Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2021
Abstract In practice, there are numerous settings where mutually distrusting parties need to perform distributed computations on their private inputs. For instance, participants in a first-price sealed-bid online auction do not want their bids to be disclosed.
Broadnax, Brandon   +5 more
openaire   +3 more sources

A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems

open access: yesIEEE Access, 2019
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection.
Jun Yang   +3 more
doaj   +1 more source

A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2016
How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs.
Tianshu Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy