The K2 Architecture for Trustworthy Hardware Security Modules [PDF]
Anish Athalye+3 more
openaire +3 more sources
Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration [PDF]
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami+9 more
doaj +2 more sources
A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory [PDF]
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin+5 more
doaj +2 more sources
A Fast AES Hardware Security Module for Internet of Things Applications
As the Internet of Things is used in various fields, Internet of Things security has become important. Since most Internet of Things devices is implemented as embedded systems, they provide a software-implemented encryption algorithm. Most embedded systems use relatively low-performance CPUs and the software processes data serially, making it difficult
HyunSeo Lim+3 more
openaire +2 more sources
Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire +2 more sources
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as
Geraldine Shirley Nicholas+3 more
doaj +1 more source
Hardware-Assisted System for Program Execution Security of SOC
With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus.
Wang Xiang+7 more
doaj +1 more source
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules [PDF]
Abstract In practice, there are numerous settings where mutually distrusting parties need to perform distributed computations on their private inputs. For instance, participants in a first-price sealed-bid online auction do not want their bids to be disclosed.
Broadnax, Brandon+5 more
openaire +3 more sources
A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection.
Jun Yang+3 more
doaj +1 more source
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks
How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs.
Tianshu Wang+3 more
doaj +1 more source