نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2009
Kerry Courtright Mohammad Iftekhar Husain Ramalingam Sridhar

Security in the area of embedded systems has been drawing enormous attention lately. Although recent advances in hardwarebased security models have shown promise for faster and more reliable security solutions, particular characteristics of embedded systems, such as computation and energy constraints, pose a unique challenge for the security researchers in this domain. Among hardware-based secu...

2016
Viacheslav Izosimov Martin Törngren

In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical applicat...

2003
Ruby B. Lee

Secure information processing increases in importance as more of our daily transactions are carried out in cyberspace. Cyber security provides assurances and safeguards necessary for the smooth functioning of cyber space interactions and services. Such interactions and services are built upon hardware and software technology for computing, communications and storage. Yet hardware and software t...

Journal: :IACR Cryptology ePrint Archive 2017
Hannes Groß Stefan Mangard

The continually growing number of security-related autonomous devices requires efficient mechanisms to counteract low-cost side-channel analysis (SCA) attacks. Masking provides high resistance against SCA at an adjustable level of security. A high level of SCA resistance, however, goes hand in hand with an increasing demand for fresh randomness which drastically increases the implementation cos...

2011
Michael B. Bilzor Ted Huffmire

Security in computing systems to date has focused mostly on software. In this research, we explore the application and enforceability of well-defined security requirements in hardware designs. The principal threats to hardware systems demonstrated in the academic literature to date involve some type of subversion, often called a Hardware Trojan or malicious inclusion. Detecting these has proved...

2013
Christopher E. Everett Damon McCoy

Security research and teaching using cyber-physical systems (e.g., automotive networks) is challenging because of the need to replicate the interactions between the hardware components and the control software of the systems. These interactions are challenging to replicate because of the dynamic inputs in real-world environments that cause various interactions of the hardware components and con...

2012
Sumedha Kaushik Ankur Singhal

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

Journal: :J. UCS 2010
Martin Pirker Ronald Toegl

The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisation platform for security sensitive software modules. The amalgam of these technologies allows an attractive off-the-shelf environment, capable of supporting security levels potentially higher than commonly deployed toda...

Journal: :JCP 2009
Wei-Peng Liu Jun Hu Xing Zhang

With the development of attack technique, new security problems have become more and more popular, traditional security means such as: firewall, IDS and so on expose to be limited, there is a basic consensus that solving the problem of information security is from terminal. Based on the deep analysis of the relation between the concept of “security” and “trusted” in computer system, this paper ...

2016
Guilherme Cox Zi Yan Abhishek Bhattacharjee Vinod Ganapathy

Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. We show that these prior techniques either sacrifice snapshot consistency or impose a performance penalty on applications executing atop the target. We present a new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید