نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

Journal: :سیاست 0
غلامرضا کریمی استادیار دانشگاه تربیت معلم تهران

in order to elucidate the significance and the position of international cultural relations in transformation of global peace and security, we should initially study its indicators through the cultural relationships among the nations, public, private and international organizations, social movements, international displacement /migration and modern communication technologies and then we should ...

Journal: :CoRR 2016
Amr Al-Anwar Mona A. Aboelnaga Yousra Alkabani M. Watheq El-Kharashi Hassan Bedour

Hardware Trojan detection and protection is becoming more crucial as more untrusted third parties manufacture many parts of critical systems nowadays. The most common way to detect hardware Trojans is comparing the untrusted design with a golden (trusted) one. However, third party intellectual properties (IPs) are black boxes with no golden IPs to trust. So, previous attempts to detect hardware...

Journal: :Proceedings of the IEEE 2014
Ramesh Karri Farinaz Koushanfar

Since the 1990s, there has been a steady trend away from inhouse integrated circuit (IC) design and fabrication toward outsourcing various aspects of design, fabrication, testing, and packaging of ICs. The emergence of such a globalized, horizontal semiconductor business model created hitherto unknown security and trust concerns in the ICs and the information systems (rooted in these ICs), whic...

2013
P. G. Gopinath K. Adithya B. Ajay I. J. Cox M. L. Miller J. Kilian F. T. Leighton Y. P. Wang M. J. Chen T. H. Tsai J. L. Wong N. Narayan R. D. Newbould J. D. Carothers J. J. Rodriguez

This paper presents a novel intellectual-property (IP) identification scheme using the existing System-on-a-Chip (SOC) watermarking design. An efficient and novel principle is established for IP identification which depends on the current IP design flow. The principle is embedding different Advanced Encryption Standard (AES) encoders in to System-on-a-Chip (SOC) based watermarked devices at beh...

Journal: :International Journal of Future Generation Communication and Networking 2013

2015
Yu Bi Yier Jin Dhananjay S. Phatak

With the globalization of the integrated circuit (IC) design flow of chip fabrication, intellectual property (IP) piracy is becoming the main security threat. While most of the protection methods are dedicated for digital circuits, we are trying to protect radio-frequency (RF) designs. For the first time, we applied the split manufacturing method in RF circuit protection. Three different implem...

2011
Marialisa Scatá Aurelio La Corte

Spam over Internet Telephony is becoming a large problem of the Voice over IP Architectures. Voice over IP has become a valid alternative to the Public Switched Telephone Network and it has a new paradigm for providing telephony services at a lower cost and higher flexibility. In the meantime, with Voice over IP the privacy becomes so hard and the benefits introduced are as strong as the securi...

2011
Sergei Skorobogatov

Many semiconductor chips used in a wide range of applications require protection against physical attacks or tamper resistance. These attacks assume that a direct access to the chip is possible with either establishing electrical connections to signal wires or at least doing some measurements. The importance of protection against physical attacks is dictated by the amount of valuable and sensit...

Journal: :IACR Cryptology ePrint Archive 2016
Onur Demir Wenjie Xiong Faisal Zaghloul Jakub Szefer

Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification approaches and techniques for hardware/software systems at different levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, base...

2008
Jörg Platte

The Security Architecture for Microprocessors (SAM ) is a lightweight and high-performance combined hardand software security extension for microprocessors. SAM has been designed to provide a secure remote code execution environment. It can be used to implement effective copy-protection schemes and provides mechanisms to prevent data and algorithm disclosure. SAM provides protection even if an ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید