Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Understanding Security Threats in Emerging Neuromorphic Computing Architecture 理解新兴神经形态计算体系结构中的安全威胁
Journal of Hardware and Systems Security Pub Date : 2021-02-13 DOI: 10.1007/s41635-021-00110-8
Chidhambaranathan Rajamanikkam, Rajesh Js, Sanghamitra Roy, Koushik Chakraborty
{"title":"Understanding Security Threats in Emerging Neuromorphic Computing Architecture","authors":"Chidhambaranathan Rajamanikkam, Rajesh Js, Sanghamitra Roy, Koushik Chakraborty","doi":"10.1007/s41635-021-00110-8","DOIUrl":"https://doi.org/10.1007/s41635-021-00110-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130913572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design 采用超低功耗管理的28纳米CMOS工艺实现可重构TPM,用于物联网SoC设计
Journal of Hardware and Systems Security Pub Date : 2021-01-19 DOI: 10.1007/s41635-020-00109-7
Zenan Huang, Xiao Zhang, Jiebin Su, Zhixin Zhou, Hongyin Luo, Donghui Guo
{"title":"Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design","authors":"Zenan Huang, Xiao Zhang, Jiebin Su, Zhixin Zhou, Hongyin Luo, Donghui Guo","doi":"10.1007/s41635-020-00109-7","DOIUrl":"https://doi.org/10.1007/s41635-020-00109-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Designing a Secure RISC-V System-on-Chip: ITUS 设计一个安全的RISC-V片上系统:ITUS
Journal of Hardware and Systems Security Pub Date : 2020-11-10 DOI: 10.1007/s41635-020-00108-8
Vinay B. Y. Kumar, S. Deb, Naina Gupta, S. Bhasin, Jawad Haj-Yahya, A. Chattopadhyay, A. Mendelson
{"title":"Towards Designing a Secure RISC-V System-on-Chip: ITUS","authors":"Vinay B. Y. Kumar, S. Deb, Naina Gupta, S. Bhasin, Jawad Haj-Yahya, A. Chattopadhyay, A. Mendelson","doi":"10.1007/s41635-020-00108-8","DOIUrl":"https://doi.org/10.1007/s41635-020-00108-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132647207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure 基于多层可重构网络基础设施的概率性硬件木马攻击
Journal of Hardware and Systems Security Pub Date : 2020-11-02 DOI: 10.1007/s41635-020-00107-9
R. Mukherjee, Vidya Govindan, Sandhya Koteshwara, A. Das, K. Parhi, R. Chakraborty
{"title":"Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure","authors":"R. Mukherjee, Vidya Govindan, Sandhya Koteshwara, A. Das, K. Parhi, R. Chakraborty","doi":"10.1007/s41635-020-00107-9","DOIUrl":"https://doi.org/10.1007/s41635-020-00107-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Side-Channel Analysis of Curve25519 with Machine Learning 基于机器学习的Curve25519系统侧信道分析
Journal of Hardware and Systems Security Pub Date : 2020-10-16 DOI: 10.1007/s41635-020-00106-w
Léo Weissbart, Łukasz Chmielewski, S. Picek, L. Batina
{"title":"Systematic Side-Channel Analysis of Curve25519 with Machine Learning","authors":"Léo Weissbart, Łukasz Chmielewski, S. Picek, L. Batina","doi":"10.1007/s41635-020-00106-w","DOIUrl":"https://doi.org/10.1007/s41635-020-00106-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129855138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes KASUMI的相关功率分析及KASUMI s - box若干等价类的功率回弹分析
Journal of Hardware and Systems Security Pub Date : 2020-10-16 DOI: 10.1007/s41635-020-00104-y
Devansh Gupta, S. Tripathy, Bodhisatwa Mazumdar
{"title":"Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes","authors":"Devansh Gupta, S. Tripathy, Bodhisatwa Mazumdar","doi":"10.1007/s41635-020-00104-y","DOIUrl":"https://doi.org/10.1007/s41635-020-00104-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129308542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fault Attack on SKINNY Cipher 对SKINNY Cipher的故障攻击
Journal of Hardware and Systems Security Pub Date : 2020-10-08 DOI: 10.1007/s41635-020-00103-z
Navid Vafaei, Sayandeep Saha, N. Bagheri, Debdeep Mukhopadhyay
{"title":"Fault Attack on SKINNY Cipher","authors":"Navid Vafaei, Sayandeep Saha, N. Bagheri, Debdeep Mukhopadhyay","doi":"10.1007/s41635-020-00103-z","DOIUrl":"https://doi.org/10.1007/s41635-020-00103-z","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115343636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures E2BaSeP: SDN架构中基于贝叶斯的有效防范ARP欺骗攻击的安全协议
Journal of Hardware and Systems Security Pub Date : 2020-10-01 DOI: 10.1007/s41635-020-00105-x
Vianney Kengne Tchendji, Fabrice Mvah, C. T. Djamégni, Yannick Florian Yankam
{"title":"E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures","authors":"Vianney Kengne Tchendji, Fabrice Mvah, C. T. Djamégni, Yannick Florian Yankam","doi":"10.1007/s41635-020-00105-x","DOIUrl":"https://doi.org/10.1007/s41635-020-00105-x","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure and Stateful Power Transitions in Embedded Systems 嵌入式系统中的安全和有状态电源转换
Journal of Hardware and Systems Security Pub Date : 2020-08-30 DOI: 10.1007/s41635-020-00099-6
Archanaa S. Krishnan, Charles Suslowicz, P. Schaumont
{"title":"Secure and Stateful Power Transitions in Embedded Systems","authors":"Archanaa S. Krishnan, Charles Suslowicz, P. Schaumont","doi":"10.1007/s41635-020-00099-6","DOIUrl":"https://doi.org/10.1007/s41635-020-00099-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128488866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs RTL设计中硬件木马漏洞评估与定位框架
Journal of Hardware and Systems Security Pub Date : 2020-08-27 DOI: 10.1007/s41635-020-00100-2
S. A. Islam, Love Kumar Sah, S. Katkoori
{"title":"A Framework for Hardware Trojan Vulnerability Estimation and Localization in RTL Designs","authors":"S. A. Islam, Love Kumar Sah, S. Katkoori","doi":"10.1007/s41635-020-00100-2","DOIUrl":"https://doi.org/10.1007/s41635-020-00100-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信