نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2015
Florian Lugou Ludovic Apvrille Aurélien Francillon

Critical and private applications of smart and connected objects such as health-related objects are now common, thus raising the need to design these objects with strong security guarantees. Many recent works offer practical hardware-assisted security solutions that take advantage of a tight cooperation between hardware and software to provide system-level security guarantees. Formally and cons...

Journal: مدیریت شهری 2015
Fatemeh Mehdi Poor, Reza Rasooli,

The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...

Journal: :IEEE Trans. Software Eng. 1996
Olin Sibert Phillip A. Porras Robert Lindell

| An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. In this paper, we discuss the imbalance in scrutiny for ha...

2017
Fareena Saqib Jim Plusquellic

Hardware obfuscation is a technique to conceal the design frommalicious insider and outsider adversaries. Obfuscation techniques transform the original design such that the obfuscated version is functionally equivalent to the original design, but it does not reveal the design details and is much harder to reverse-engineer [1]. As discussed earlier in Chap.1, the business model of distributed an...

2011
Srujan Das Kotikela Satyajeet Nimgaonkar Mahadevan Gomathisankaran

In general, computer security aims at providing confidentiality, integrity and availability to computing systems. Traditionally, researchers in the fields of computer security have used software and hardware mechanisms for implementing security in computing systems. Software only security approaches typically deal with application level and Operating System (OS) level security mechanisms. Thoug...

2012

Software and hardware security is a reality that all stakeholders must face, from hardware engineers to software developers to customers. As a direct result, the technology industry is facing a growing need for engineers who understand security principles at varying levels of abstraction. These engineers will need security-oriented perspectives stemming from both theoretical and practical disci...

2011
Georg Sigl

The design of security controllers, or more generally of microcontroller platforms implementing measures against hardware attacks, is still a very tedious handwork. Standardized and broadly available design tools as well as the necessary knowledge are rarely available and make secure hardware design a black art, known only within specialized companies building smart cards or Pay TV chips, for e...

2005

Embedded systems present significant security challenges due to their limited resources and power constraints. We propose a novel security architecture for embedded systems (SANES) that leverages the capabilities of reconfigurable hardware to provide efficient and flexible architectural support to both security standards and a range of attacks. This paper shows the efficiency of reconfigurable ...

Journal: :IACR Cryptology ePrint Archive 2016
Onur Demir Wenjie Xiong Faisal Zaghloul Jakub Szefer

Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification approaches and techniques for hardware/software systems at different levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, base...

2006
Rongzhen Yang Liang He Shoufeng Yang Forni Gary Fei Liu Jiayue Chang Manxue Guo

In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payment, the vulnerability of software solution and the advantage of hardware security solution are identified and analyzed, finally a hardware based wireless security platform for ‘Best Practice’ is proposed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید