نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2005

............................................................................................................................................. 3 Introduction......................................................................................................................................... 3 Elements of security....................................................................................

2010
T. Subashri R. Arunachalam B. Gokul Vinoth Kumar Vaidehi V.

A high speed security algorithm is always important for wired/wireless environment. The symmetric block cipher plays a major role in the bulk data encryption. One of the best existing symmetric security algorithms to provide data security is AES. AES has the advantage of being implemented in both hardware and software. Hardware implementation of the AES has the advantage of increased throughput...

Journal: :CoRR 2017
Ruan de Clercq Ingrid Verbauwhede

Control Flow Integrity (CFI) is a computer security technique that detects runtime attacks by monitoring a program’s branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many a...

Journal: :CoRR 2017
Sergei Skorobogatov

This paper introduces a deep level teardown process of a personal medical device – the OmniPod® wireless tubeless insulin pump. This starts with mechanical teardown exposing the engineering solutions used inside the device. Then the electronic part of the device is analysed followed by components identification. Finally, the firmware extraction is performed allowing further analysis of the firm...

2013
Michael Hölzl

Copyright is held by the author/owner(s). UbiComp ’13 Adjunct, Sept 8-12, 2013, Zurich, Switzerland. ACM 978-1-4503-2139-6/13/09...$15.00. Abstract Insu cient security and privacy level on mobile devices, have made it di cult to utilize sensitive systems like mobile banking, mobile credit cards, mobile ticketing or mobile passports. Solving these challenges in security and privacy, could provid...

2003
Song J. Park

Following paper examines hardware implementation methods regarding Advanced Encryption Standard (AES). Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. An overview of existing AES hardware implementation techniques are summarized. Then the direction of reconfigurable coprocessor as a cryptography hardware is proposed. Keyw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید