Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa 通过观察和故障注入主动屏蔽物理攻击:ChaXa
Journal of Hardware and Systems Security Pub Date : 2023-02-10 DOI: 10.1007/s41635-023-00131-5
Clément Gaine, J. Nikolovski, D. Aboulkassimi, J. Dutertre
{"title":"Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa","authors":"Clément Gaine, J. Nikolovski, D. Aboulkassimi, J. Dutertre","doi":"10.1007/s41635-023-00131-5","DOIUrl":"https://doi.org/10.1007/s41635-023-00131-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122116611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-on-Chip Trust Validation Using Security Assertions 使用安全断言的片上网络信任验证
Journal of Hardware and Systems Security Pub Date : 2022-12-01 DOI: 10.1007/s41635-022-00129-5
Aruna Jayasena, B. Kumar, Subodha Charles, Hasini Witharana, P. Mishra
{"title":"Network-on-Chip Trust Validation Using Security Assertions","authors":"Aruna Jayasena, B. Kumar, Subodha Charles, Hasini Witharana, P. Mishra","doi":"10.1007/s41635-022-00129-5","DOIUrl":"https://doi.org/10.1007/s41635-022-00129-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning 基于高光谱扫描的硬件木马无损检测新特征选择
Journal of Hardware and Systems Security Pub Date : 2022-06-01 DOI: 10.1007/s41635-022-00127-7
Erik J. Jorgensen, A. Kacmarcik, Milos Prvulović, A. Zajić
{"title":"Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning","authors":"Erik J. Jorgensen, A. Kacmarcik, Milos Prvulović, A. Zajić","doi":"10.1007/s41635-022-00127-7","DOIUrl":"https://doi.org/10.1007/s41635-022-00127-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116230912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock 基于DRAM时钟电磁辐射的高速、远距离、穿墙隐蔽信道
Journal of Hardware and Systems Security Pub Date : 2022-06-01 DOI: 10.1007/s41635-022-00128-6
Zihao Zhan, Zhenkai Zhang, X. Koutsoukos
{"title":"A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock","authors":"Zihao Zhan, Zhenkai Zhang, X. Koutsoukos","doi":"10.1007/s41635-022-00128-6","DOIUrl":"https://doi.org/10.1007/s41635-022-00128-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication PAKAMAC:一种基于puf的互认证无钥匙汽车入口系统
Journal of Hardware and Systems Security Pub Date : 2022-05-21 DOI: 10.1007/s41635-022-00126-8
Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay
{"title":"PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication","authors":"Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay","doi":"10.1007/s41635-022-00126-8","DOIUrl":"https://doi.org/10.1007/s41635-022-00126-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115609648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods 保护第三方HDL IP:使用进化方法的可行性研究
Journal of Hardware and Systems Security Pub Date : 2022-03-31 DOI: 10.1007/s41635-022-00125-9
Bayley King, Rashmi Jha, T. Kebede, David Kap
{"title":"Securing 3rd-Party HDL IP: a Feasibility Study Using Evolutionary Methods","authors":"Bayley King, Rashmi Jha, T. Kebede, David Kap","doi":"10.1007/s41635-022-00125-9","DOIUrl":"https://doi.org/10.1007/s41635-022-00125-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential Fault Attack on Feistel-Based Sponge AE Schemes 基于feistel海绵声发射方案的差分故障攻击
Journal of Hardware and Systems Security Pub Date : 2022-03-21 DOI: 10.1007/s41635-022-00124-w
Amit Jana
{"title":"Differential Fault Attack on Feistel-Based Sponge AE Schemes","authors":"Amit Jana","doi":"10.1007/s41635-022-00124-w","DOIUrl":"https://doi.org/10.1007/s41635-022-00124-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic 具有多安全特性的安全启动框架和可重构逻辑的逻辑锁定应用
Journal of Hardware and Systems Security Pub Date : 2021-11-29 DOI: 10.1007/s41635-021-00123-3
Geraldine Shirley Nicholas, A. Siddiqui, Sam Reji Joseph, Gregory Williams, F. Saqib
{"title":"A Secure Boot Framework with Multi-security Features and Logic-Locking Applications for Reconfigurable Logic","authors":"Geraldine Shirley Nicholas, A. Siddiqui, Sam Reji Joseph, Gregory Williams, F. Saqib","doi":"10.1007/s41635-021-00123-3","DOIUrl":"https://doi.org/10.1007/s41635-021-00123-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF 可重构密码原语的设计与分析:TRNG和PUF
Journal of Hardware and Systems Security Pub Date : 2021-11-09 DOI: 10.1007/s41635-021-00120-6
V. Rai, S. Tripathy, J. Mathew
{"title":"Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF","authors":"V. Rai, S. Tripathy, J. Mathew","doi":"10.1007/s41635-021-00120-6","DOIUrl":"https://doi.org/10.1007/s41635-021-00120-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans 扭转局势:使用比特流逆向工程检测FPGA木马
Journal of Hardware and Systems Security Pub Date : 2021-11-01 DOI: 10.1007/s41635-021-00122-4
Wafi Danesh, Joshua Banago, Mostafizur Rahman
{"title":"Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans","authors":"Wafi Danesh, Joshua Banago, Mostafizur Rahman","doi":"10.1007/s41635-021-00122-4","DOIUrl":"https://doi.org/10.1007/s41635-021-00122-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信