Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications 物联网应用中针对侧信道和故障分析的联合对策的轻量级安全策略设计
Journal of Hardware and Systems Security Pub Date : 2018-09-26 DOI: 10.1007/s41635-018-0049-y
Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh K. Ghosh
{"title":"Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications","authors":"Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh K. Ghosh","doi":"10.1007/s41635-018-0049-y","DOIUrl":"https://doi.org/10.1007/s41635-018-0049-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory 嵌入式存储器中可靠性、剩余性和恢复的硬件安全含义
Journal of Hardware and Systems Security Pub Date : 2018-09-26 DOI: 10.1007/s41635-018-0050-5
S. Skorobogatov
{"title":"Hardware Security Implications of Reliability, Remanence, and Recovery in Embedded Memory","authors":"S. Skorobogatov","doi":"10.1007/s41635-018-0050-5","DOIUrl":"https://doi.org/10.1007/s41635-018-0050-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection 探索RFC 7748的硬件实现:带侧通道保护的Curve25519和Curve448
Journal of Hardware and Systems Security Pub Date : 2018-09-26 DOI: 10.1007/s41635-018-0048-z
Pascal Sasdrich, T. Güneysu
{"title":"Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection","authors":"Pascal Sasdrich, T. Güneysu","doi":"10.1007/s41635-018-0048-z","DOIUrl":"https://doi.org/10.1007/s41635-018-0048-z","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses 微架构侧和隐蔽通道,攻击和防御的调查
Journal of Hardware and Systems Security Pub Date : 2018-09-13 DOI: 10.1007/s41635-018-0046-1
Jakub Szefer
{"title":"Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses","authors":"Jakub Szefer","doi":"10.1007/s41635-018-0046-1","DOIUrl":"https://doi.org/10.1007/s41635-018-0046-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123374932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems 计算系统安全与可靠性分析的广义理论框架
Journal of Hardware and Systems Security Pub Date : 2018-09-12 DOI: 10.1007/s41635-018-0047-0
Lake Bu, Jaya Dofe, Qiaoyan Yu, M. Kinsy
{"title":"SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems","authors":"Lake Bu, Jaya Dofe, Qiaoyan Yu, M. Kinsy","doi":"10.1007/s41635-018-0047-0","DOIUrl":"https://doi.org/10.1007/s41635-018-0047-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115582110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Old Frontier of Reverse Engineering: Netlist Partitioning 逆向工程的老前沿:网表划分
Journal of Hardware and Systems Security Pub Date : 2018-09-01 DOI: 10.1007/s41635-018-0043-4
Travis Meade, Kaveh Shamsi, Thao Le, J. Di, Shaojie Zhang, Yier Jin
{"title":"The Old Frontier of Reverse Engineering: Netlist Partitioning","authors":"Travis Meade, Kaveh Shamsi, Thao Le, J. Di, Shaojie Zhang, Yier Jin","doi":"10.1007/s41635-018-0043-4","DOIUrl":"https://doi.org/10.1007/s41635-018-0043-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond 物理安全外壳的过去,现在和未来:从电池支持的监控到基于puf的固有安全及超越
Journal of Hardware and Systems Security Pub Date : 2018-08-15 DOI: 10.1007/s41635-018-0045-2
J. Obermaier, Vincent Immler
{"title":"The Past, Present, and Future of Physical Security Enclosures: From Battery-Backed Monitoring to PUF-Based Inherent Security and Beyond","authors":"J. Obermaier, Vincent Immler","doi":"10.1007/s41635-018-0045-2","DOIUrl":"https://doi.org/10.1007/s41635-018-0045-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection 形式化方法在逆向工程和知识产权保护中的应用综述
Journal of Hardware and Systems Security Pub Date : 2018-08-01 DOI: 10.1007/s41635-018-0044-3
S. Keshavarz, Cunxi Yu, S. Ghandali, Xiaolin Xu, Daniel E. Holcomb
{"title":"Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection","authors":"S. Keshavarz, Cunxi Yu, S. Ghandali, Xiaolin Xu, Daniel E. Holcomb","doi":"10.1007/s41635-018-0044-3","DOIUrl":"https://doi.org/10.1007/s41635-018-0044-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection 基于fpga的加密密钥生成中的硬件木马攻击:影响与检测
Journal of Hardware and Systems Security Pub Date : 2018-06-20 DOI: 10.1007/s41635-018-0042-5
Vidya Govindan, R. Chakraborty, Pranesh Santikellur, A. Chaudhary
{"title":"A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection","authors":"Vidya Govindan, R. Chakraborty, Pranesh Santikellur, A. Chaudhary","doi":"10.1007/s41635-018-0042-5","DOIUrl":"https://doi.org/10.1007/s41635-018-0042-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures 通过基于模拟、数字和生理的签名保护医疗设备免受硬件木马攻击
Journal of Hardware and Systems Security Pub Date : 2018-06-19 DOI: 10.1007/s41635-018-0040-7
Taimour Wehbe, V. Mooney, O. Inan, D. Keezer
{"title":"Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures","authors":"Taimour Wehbe, V. Mooney, O. Inan, D. Keezer","doi":"10.1007/s41635-018-0040-7","DOIUrl":"https://doi.org/10.1007/s41635-018-0040-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信