Results 61 to 70 of about 809,010 (236)
Hardware security and reliability verification based on fault propagation model
Large scale integrate circuits is facing serious threat such as design vulnerabilities, side channels, and hardware Trojans. Traditional functional verification method is difficult to ensure high test coverage, and it is also difficult to detect security
ZHANG Xige +5 more
doaj +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi +2 more
wiley +1 more source
Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing
Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption.
Ashraf, Mohammed +3 more
core +1 more source
Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari +4 more
wiley +1 more source

