Hardware-Assisted System for Program Execution Security of SOC
With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus.
Wang Xiang +7 more
doaj +1 more source
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E. +4 more
core +1 more source
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as
Geraldine Shirley Nicholas +3 more
doaj +1 more source
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks
How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs.
Tianshu Wang +3 more
doaj +1 more source
A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection.
Jun Yang +3 more
doaj +1 more source
SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks
Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to
Po-Hung Yang, Sung-Ming Yen
doaj +1 more source
Virtualization of the Encryption Card for Trust Access in Cloud Computing
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu +5 more
doaj +1 more source
Hardware Security Module for secure delegated Quantum Cloud Computing [PDF]
Pepijn W.H. Pinkse
openalex +2 more sources
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan +3 more
doaj +1 more source

