نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

Journal: :CoRR 2018
Payman Behnam

With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...

Journal: :IEEE Transactions on Very Large Scale Integration Systems 2022

Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC) chips in a practical utilization environment. This article provides overviews of physical attacks cryptographic circuits, associated vulnerabilities an IC chip, and protection schemes the vertical unification systems, packaging technologies. The design principles on-chip monitoring circuits to sense attack...

Journal: :Electronics 2023

Various hardware security concerns, such as Trojans and IP piracy, have sparked studies in the field employing alternatives to CMOS chips. Spintronic devices are among most-promising for applications that need low power consumption, non-volatility, ease of integration with silicon substrates. This article looked at how can be made more secure by utilizing special features spintronics devices. S...

2005
Guy Gogniat Wayne P. Burleson Lilian Bossuet

This paper stresses why configurable computing is a promising target to guarantee the hardware security of ambient systems. Many works have focused on configurable computing to demonstrate its efficiency but as far as we know none have addressed the security issue from system to circuit levels. This paper recalls main hardware attacks before focusing on issues to build secure systems on configu...

Journal: :IACR Cryptology ePrint Archive 2017
Shuwen Deng Doguhan Gümüsoglu Wenjie Xiong Y. Serhan Gener Onur Demir Jakub Szefer

Due to lack of practical and scalable security verification tools and methodologies, very few of the existing hardware-software security architectures have been thoroughly checked at the design time. To address this issue, our project develops a security verification methodology that is applicable to different hardware-software security architectures during the design phase. The verification fr...

2006
Kenneth Revett Sérgio Tenreiro de Magalhães Henrique M. Dinis Santos

Security is a critical component of most computer systems – especially those used in E-commerce activities over the Internet. Global access to information makes security a critical design issue in these systems. Deployment of sophisticated hardware based authentication systems is prohibitive in all but the most sensitive installations. What is required is a reliable, hardware independent and ef...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید