Results 281 to 290 of about 3,209,774 (327)
Some of the next articles are maybe not open access.
Security Assessment of Nonvolatile Memory Against Physical Probing
EDFA Technical Articles, 2022Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks ...
Liton Kumar Biswas +3 more
openaire +1 more source
Private stateful circuits secure against probing attacks
Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007We discuss the following problem: how to guarantee privacy of a circuit if an adversary can eavesdrop on its wires, where the functionality of the circuit is assumed public and the adversary attempts to discover information regarding the computation, namely, input, intermediate results and output. We present a solution by introducing a private stateful
Yu Yu +2 more
openaire +1 more source
Bringing Analog Design Tools to Security: Modeling and Optimization of a Low Area Probing Detector
International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, 2018In this paper a probing detector consisting of digital gates is optimized. Probing attempt detectors are a solution for on-chip protection against probing of interconnects. They measure a wire and raise an alarm if an additional capacitance is recognized.
A. Herrmann +3 more
semanticscholar +1 more source
A Tool for Security Measuring and Probe Management
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016Designing and maintaining correct security countermeasures to support trustworthiness require comprehensive understanding of current security posture, i.e., Situational Awareness (SA). Security SA means that a decision maker is aware of protected assets, existing vulnerabilities, and risk mitigation techniques.
Evesti Antti +2 more
openaire +4 more sources
EM Probes Characterisation for Security Analysis
2012Along with the vast use of cryptography in security devices came the emergence of attacks like Electro-Magnetic analysis (EMA) where the measurement of the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used.
Mounier, Benjamin +4 more
openaire +2 more sources
Detection of probing attempts in secure ICs
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents
Salvador Manich +2 more
openaire +1 more source
PPTM: Privacy-Aware Participatory Traffic Monitoring Using Mobile Secure Probes
2015 16th IEEE International Conference on Mobile Data Management, 2015Privacy became one of the main concerns in location-based services in general and in community-based traffic monitoring in particular. This demonstration presents a new approach for privacy preserving online traffic monitoring using mobile probes. It combines hardware and software solutions, and a secure protocol to collect, aggregate and share the ...
Ton That, Dai Hai +2 more
openaire +3 more sources
Leveraging Probe Data to Assess Security Checkpoint Wait Times
Transportation Research Record: Journal of the Transportation Research Board, 2013The process of traveling to an airport, passing through various processes, and ultimately departing the airport involves many activities. This paper focuses on the use of probe data obtained from phones with discoverable Bluetooth devices to sample the time needed for passengers to travel from the nonsterile to the sterile side of an airport facility.
Stephen M. Remias +2 more
openaire +1 more source
Enhanced Security with Deep Learning-Based Intrusion Detection
2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI)The Internet of Things (IoT) is widely used in modern culture, particularly in intelligent transportation systems and smart homes. According to IHS Markit, there will be 125 billion linked devices by 2030, up from 27 billion in 2017.
P. Kumar +3 more
semanticscholar +1 more source
Top 10 IoT security probing areas
2023 IEEE World AI IoT Congress (AIIoT), 2023Puthiyavan Udayakumar, R. Anandan
openaire +1 more source

