نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

Fault attacks are active, physical that an adversary can leverage to alter the control-flow of embedded devices gain access sensitive information or bypass protection mechanisms. Due severity these attacks, manufacturers deploy hardware-based fault defenses into security-critical systems, such as secure elements. The development countermeasures is a challenging task due complex interplay circui...

Journal: :Integration 2017
Travis Meade Shaojie Zhang Yier Jin

In modern Integrated Circuits (IC) design flow, from specification to chip fabrication, various security threats are emergent. These range from malicious modifications in the design, to the Electronic Design Automation (EDA) tools, during layout or fabrication, or to the packaging. Of particular concern are modifications made to third-party IP cores and commercial off-the-shelf (COTS) chips whe...

رحمانی, علی, هاشمی, سید محمد,

Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...

رحمانی, علی, هاشمی, سید محمد,

Introduction: Everyone in the community has this right that to have a “decent work”. The “decent Work” program is one of the strategies of the International Labor Organization in the field of labor and social security. This program implies that each individual:1) Have access to employment in equal conditions, 2) as a result of employment, having the right to social dialogue, 3) having fundament...

2011
Alexandra Dmitrienko Zecir Hadzic Hans Löhr Ahmad-Reza Sadeghi Marcel Winandy

Mobile phones are increasingly used in the e-health domain. In this context, enabling secure access to health records from mobile devices is of particular importance because of the high security and privacy requirements for sensitive medical data. Standard operating systems and software, as they are deployed on current smartphones, cannot protect sensitive data appropriately, even though modern...

2005
Kripashankar Mohan Bhagirath Narahari Rahul Simha Paul Ott Alok N. Choudhary Joseph Zambreno

Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security challenges in the design of embedded systems. This short paper evaluates the performance of a hardware/software co-design methodology for embedded software protection. Secure software is created using a secure compiler that in...

Journal: :Design Autom. for Emb. Sys. 2004
Amr T. Abdel-Hamid Sofiène Tahar El Mostapha Aboulhamid

Intellectual property (IP) block reuse is essential for facilitating the design process of system-ona-chip. Sharing IP designs poses significant high security risks. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we survey and classify different techniques used for watermarking IP designs. To this end, we defined several eval...

2006
Ivo Pooters

During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full userdata integrity protection mechanism. In this paper an approach is made to a full user data integrity protection mechanism in the UMTS access network. The cu...

Journal: :journal of computing and security 0
mahmood deypir yousef purebrahim

block ciphers have wide applications for hardware and software implementations. in this paper, a new block cipher algorithm with provable security is proposed. the whole structure of the algorithm is novel and has a good encryption and decryption performance. additionally, it has good security with few number of rounds. the structure of the proposed algorithm consists of 4-rounds feistel-like w...

2007
Muhammad Sher

v Abstract With the emergence of mobile multimedia services, such as unified messaging, click to dial, cross network multiparty conferencing and seamless multimedia streaming services, the fixed–mobile convergence and voice–data integration has started, leading to an overall Internet–Telecommunications merger. The IP Multimedia Subsystem (IMS) is considered as the next generation service delive...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید