نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

Journal: :International Journal of Power Electronics and Drive Systems 2023

Globalization of the chip design and manufacturing industry has imposed significant threats to hardware security integrated circuits (ICs). It made ICs more susceptible various attacks. Blockchain provides a trustworthy distributed platform store immutable records related evidence intellectual property (IP) creation, authentication provenance, confidential data storage. However, blockchain enco...

2018
Wei Hu Ryan Kastner

Hardware is an increasingly attractive attack surface since it controls low-level access to critical resources like cryptographic keys, personally identifiable information, and firmware. Unfortunately, it is difficult to assess the security vulnerabilities of a hardware design, which is a consequence of too few hardware security design tools and metrics. In this work, we describe important secu...

2011
Srujan Das Kotikela Mahadevan Gomathisankaran

Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...

2012
Gedare Bloom Eugen Leontie Bhagirath Narahari Rahul Simha

This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network, and data security because of the nature of hardware. Often, hardware design and manufacturing occur before or during software development, and as a result, we must consider hardware security early in pr...

Journal: :Theoretical Computer Science 2021

Hardware security tokens have now been used for several decades to store cryptographic keys. When deployed, the of corresponding schemes fundamentally relies on tamper-resistance – a very strong assumption in practice. Moreover, even secure tokens, which are expensive and cumbersome, can often be subverted. We introduce new primitive called Encryption with Password-protected Assisted Decryption...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Journal: :Technologies (Basel) 2022

Free and open-source hardware (FOSH) development has been shown to increase innovation reduce economic costs. This article reviews the opportunity use FOSH as a sanction undercut imports exports from target criminal country. A formal methodology is presented for selecting strategic national investments in improve both security global safety. In this methodology, first country that threatening o...

Journal: :IEEE Security & Privacy 2023

The articles in this special issue focus on ongoing research efforts the development, use, and evaluation of emerging hardware features techniques to improve system security. We have seen emergence new software security by limiting memory access within an address space, such as Intel’s protection keys (MPKs) extended page table (EPT) switching, among others. Researchers also proposed hardware-a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید