Results 281 to 290 of about 3,209,774 (327)
Some of the next articles are maybe not open access.

Security Assessment of Nonvolatile Memory Against Physical Probing

EDFA Technical Articles, 2022
Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks ...
Liton Kumar Biswas   +3 more
openaire   +1 more source

Private stateful circuits secure against probing attacks

Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We discuss the following problem: how to guarantee privacy of a circuit if an adversary can eavesdrop on its wires, where the functionality of the circuit is assumed public and the adversary attempts to discover information regarding the computation, namely, input, intermediate results and output. We present a solution by introducing a private stateful
Yu Yu   +2 more
openaire   +1 more source

Bringing Analog Design Tools to Security: Modeling and Optimization of a Low Area Probing Detector

International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, 2018
In this paper a probing detector consisting of digital gates is optimized. Probing attempt detectors are a solution for on-chip protection against probing of interconnects. They measure a wire and raise an alarm if an additional capacitance is recognized.
A. Herrmann   +3 more
semanticscholar   +1 more source

A Tool for Security Measuring and Probe Management

2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016
Designing and maintaining correct security countermeasures to support trustworthiness require comprehensive understanding of current security posture, i.e., Situational Awareness (SA). Security SA means that a decision maker is aware of protected assets, existing vulnerabilities, and risk mitigation techniques.
Evesti Antti   +2 more
openaire   +4 more sources

EM Probes Characterisation for Security Analysis

2012
Along with the vast use of cryptography in security devices came the emergence of attacks like Electro-Magnetic analysis (EMA) where the measurement of the Electro-Magnetic (EM) waves radiated from an integrated circuit are used to extract sensitive information. Several research papers have covered EMA but very few have focused on the probes used.
Mounier, Benjamin   +4 more
openaire   +2 more sources

Detection of probing attempts in secure ICs

2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Physical attacks focus on extracting information from internal parts of IC's. One way to achieve this is by means of connecting probes to wires, so that the content of internal buses and registers can be revealed. Protection against this type of attacks exists, but usually is bulky and expensive, e.g. the shielding of secured areas. This paper presents
Salvador Manich   +2 more
openaire   +1 more source

PPTM: Privacy-Aware Participatory Traffic Monitoring Using Mobile Secure Probes

2015 16th IEEE International Conference on Mobile Data Management, 2015
Privacy became one of the main concerns in location-based services in general and in community-based traffic monitoring in particular. This demonstration presents a new approach for privacy preserving online traffic monitoring using mobile probes. It combines hardware and software solutions, and a secure protocol to collect, aggregate and share the ...
Ton That, Dai Hai   +2 more
openaire   +3 more sources

Leveraging Probe Data to Assess Security Checkpoint Wait Times

Transportation Research Record: Journal of the Transportation Research Board, 2013
The process of traveling to an airport, passing through various processes, and ultimately departing the airport involves many activities. This paper focuses on the use of probe data obtained from phones with discoverable Bluetooth devices to sample the time needed for passengers to travel from the nonsterile to the sterile side of an airport facility.
Stephen M. Remias   +2 more
openaire   +1 more source

Enhanced Security with Deep Learning-Based Intrusion Detection

2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI)
The Internet of Things (IoT) is widely used in modern culture, particularly in intelligent transportation systems and smart homes. According to IHS Markit, there will be 125 billion linked devices by 2030, up from 27 billion in 2017.
P. Kumar   +3 more
semanticscholar   +1 more source

Top 10 IoT security probing areas

2023 IEEE World AI IoT Congress (AIIoT), 2023
Puthiyavan Udayakumar, R. Anandan
openaire   +1 more source

Home - About - Disclaimer - Privacy