نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

1999
Steve Martin

This paper describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. An overview of key management requirements for systems implementing those security mechanisms will also be discussed. There are two specific headers that are used to provide security services in IPv4 and IPv6. These headers are the IP Authentication Header (AH) and th...

Journal: :Eurasip Journal on Wireless Communications and Networking 2022

Abstract Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to globalization IC design manufacturing. Malicious circuits, also known as hardware Trojans, are found able degrade performance or even leak confidential information, accordingly it is definitely an immediate concern develop detection techniques against Trojans. This paper presents...

2017
Raj Gautam Dutta Xiaolong Guo Yier Jin

A rapidly growing third-party intellectual property (IP) market provides IP consumers with more options for designing electronic systems. It also reduces the development time and expertise needed to compete in a market where profit windows are very narrow. However, one key issue that has been neglected is the security of electronic systems built upon third-party IP cores. Historically, IP consu...

Journal: :IEEE Trans. Software Eng. 1996
Olin Sibert Phillip A. Porras Robert Lindell

| An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. In this paper, we discuss the imbalance in scrutiny for ha...

2017
Ren Ding Chenxiong Qian Chengyu Song William Harris Taesoo Kim Wenke Lee

Control-Flow Integrity (CFI), as a means to prevent control-flow hijacking attacks, enforces that each instruction transfers control to an address in a set of valid targets. The security guarantee of CFI thus depends on the definition of valid targets, which conventionally are defined as the result of a static analysis. Unfortunately, previous research has demonstrated that such a definition, a...

2011
Srujan Das Kotikela Mahadevan Gomathisankaran

Computer security aims at protecting confidentiality, integrity, and availability of sensitive information that are processed, used, or stored by computing systems. Computer scientists working in the field of computer security have successfully designed and developed software and hardware mechanisms to provide security in modern day computing devices. As compared to hardware security mechanisms...

Journal: :Datenschutz und Datensicherheit - DuD 2009

Journal: :J. Electronic Testing 2011
Rajat Subhra Chakraborty Swarup Bhunia

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

2014
Alexandra Mikityuk

This work introduces a novel content protection security framework within the virtual Set-Top Box (vSTB) concept. This concept presents a fundamental change in the creation and delivery of media services such as IP Television, by shifting most of the STB’s service execution environment to a network infrastructure. This shift enables a so-called cloud-based rendering of the User Interface and th...

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید