نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

Journal: :Solid-state Electronics 2023

This work investigates the variability of tungsten disulfide (WS2)-based devices by experimental characterization in view possible application field hardware security. To this aim, a preliminary analysis was performed measurements across voltages and temperatures on set seven Si/SiO2/WS2 back-gated devices, also considering effect different stabilization conditions their conductivity. Obtained ...

2003
Shaomeng Li Jim Tørresen Oddvar Søråsen

One type of network security strategy is using an Intrusion detection system (IDS). We are implementing an IDS in FPGA-based (Field Programmable Gate Array) reconfigurable hardware. This is to achieve higher speed and more efficient performance of network security, as networks develop very fast with consequently more demanding constraints. This study provides novel hardware architectures for an...

2010
Helena Handschuh Geert Jan Schrijen Pim Tuyls

Counterfeiting of goods in general and of electronic goods in particular is a growing concern with a huge impact on the global economy, the society, and the security of its critical infrastructure. Various examples are known where companies suffer from economic and brand damage due to competition with counterfeit goods. In some cases the use of counterfeit components has even led to tragic acci...

2013
Marko Wolf

Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directl...

2015
Yubo Li Kevin Skadron

Cyber-security has become an increasingly important issue in today’s integrated circuit designs. The use of commercial off-the-shelf products and design outsourcing have introduced uncertainty in the supply chain and posed security threats such as an inside attacks. This paper describes the implementation of an FPGA design based on soft-core processor, and how triple modular redundancy (TMR) is...

2017

An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...

2017

An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...

2010
Michael B. Bilzor Ted Huffmire

Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...

2013
Jeyavijayan Rajendran

Today’s System on Chip (SoC) is being incorporated with digital, analog, radio frequency, photonic and other devices [1]. More recently, sensors, actuators, and biochips are also being integrated into these already powerful SoCs. On one hand, SoC integration has been enabled by advances in mixed system integration and the increase in the wafer sizes (currently about 300 mm and projected to be 4...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید