Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Special Issue: 2019 PAINE Conference—Physical Assurance and Inspection of Electronics 特刊:2019年PAINE会议-电子产品的物理保证和检查
Journal of Hardware and Systems Security Pub Date : 2020-02-11 DOI: 10.1007/s41635-020-00091-0
N. Asadi, M. Tehranipoor
{"title":"Special Issue: 2019 PAINE Conference—Physical Assurance and Inspection of Electronics","authors":"N. Asadi, M. Tehranipoor","doi":"10.1007/s41635-020-00091-0","DOIUrl":"https://doi.org/10.1007/s41635-020-00091-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Neural Network–Based Detection and Verification of Microelectronic Images 基于深度神经网络的微电子图像检测与验证
Journal of Hardware and Systems Security Pub Date : 2020-01-04 DOI: 10.1007/s41635-019-00088-4
Md. Alimoor Reza, Zhenhua Chen, David J. Crandall
{"title":"Deep Neural Network–Based Detection and Verification of Microelectronic Images","authors":"Md. Alimoor Reza, Zhenhua Chen, David J. Crandall","doi":"10.1007/s41635-019-00088-4","DOIUrl":"https://doi.org/10.1007/s41635-019-00088-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122016837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Decomposition Workflow for Integrated Circuit Verification and Validation 集成电路验证与验证的分解工作流程
Journal of Hardware and Systems Security Pub Date : 2020-01-02 DOI: 10.1007/s41635-019-00086-6
Adam G. Kimura, Jonathan Scholl, James Schaffranek, Matt Sutter, Andrew Elliott, Michael Strizich, G. Via
{"title":"A Decomposition Workflow for Integrated Circuit Verification and Validation","authors":"Adam G. Kimura, Jonathan Scholl, James Schaffranek, Matt Sutter, Andrew Elliott, Michael Strizich, G. Via","doi":"10.1007/s41635-019-00086-6","DOIUrl":"https://doi.org/10.1007/s41635-019-00086-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Throughput/Area Efficient Implementation of Scalable Polynomial Basis Multiplication 可扩展多项式基乘法的吞吐量/面积高效实现
Journal of Hardware and Systems Security Pub Date : 2020-01-02 DOI: 10.1007/s41635-019-00087-5
Bahram Rashidi
{"title":"Throughput/Area Efficient Implementation of Scalable Polynomial Basis Multiplication","authors":"Bahram Rashidi","doi":"10.1007/s41635-019-00087-5","DOIUrl":"https://doi.org/10.1007/s41635-019-00087-5","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126462969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A practical application of game theory to optimize selection of hardware Trojan detection strategies 实际应用博弈论优化选择硬件木马检测策略
Journal of Hardware and Systems Security Pub Date : 2019-12-28 DOI: 10.1007/s41635-019-00089-3
Jonathan Graf, Whitney Batchelor, S. Harper, Ryan Marlow, E. Carlisle, P. Athanas
{"title":"A practical application of game theory to optimize selection of hardware Trojan detection strategies","authors":"Jonathan Graf, Whitney Batchelor, S. Harper, Ryan Marlow, E. Carlisle, P. Athanas","doi":"10.1007/s41635-019-00089-3","DOIUrl":"https://doi.org/10.1007/s41635-019-00089-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
“S-Box” Implementation of AES Is Not Side Channel Resistant AES的“S-Box”实现不能抵抗侧信道
Journal of Hardware and Systems Security Pub Date : 2019-12-05 DOI: 10.1007/s41635-019-00082-w
C. Ashokkumar, B. Roy, Bhargav Sri Venkatesh, L. Bernard, Menezes
{"title":"“S-Box” Implementation of AES Is Not Side Channel Resistant","authors":"C. Ashokkumar, B. Roy, Bhargav Sri Venkatesh, L. Bernard, Menezes","doi":"10.1007/s41635-019-00082-w","DOIUrl":"https://doi.org/10.1007/s41635-019-00082-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering 基于混沌的复杂微指令集缓解指令逆向工程
Journal of Hardware and Systems Security Pub Date : 2019-11-29 DOI: 10.1007/s41635-019-00085-7
Md. Sakib Hasan, M. Majumder, A. S. Shanta, Mesbah Uddin, G. Rose
{"title":"A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering","authors":"Md. Sakib Hasan, M. Majumder, A. S. Shanta, Mesbah Uddin, G. Rose","doi":"10.1007/s41635-019-00085-7","DOIUrl":"https://doi.org/10.1007/s41635-019-00085-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography 基于SRAM PUF和公钥加密的片对片认证方法
Journal of Hardware and Systems Security Pub Date : 2019-11-26 DOI: 10.1007/s41635-019-00080-y
I. Karageorgos, Mehmet Meric Isgenc, S. Pagliarini, L. Pileggi
{"title":"Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography","authors":"I. Karageorgos, Mehmet Meric Isgenc, S. Pagliarini, L. Pileggi","doi":"10.1007/s41635-019-00080-y","DOIUrl":"https://doi.org/10.1007/s41635-019-00080-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An In-depth Study of MPU-Based Isolation Techniques 基于单片机的隔离技术的深入研究
Journal of Hardware and Systems Security Pub Date : 2019-11-22 DOI: 10.1007/s41635-019-00078-6
Abderrahmane Sensaoui, O. Aktouf, D. Hély, Stéphane Di Vito
{"title":"An In-depth Study of MPU-Based Isolation Techniques","authors":"Abderrahmane Sensaoui, O. Aktouf, D. Hély, Stéphane Di Vito","doi":"10.1007/s41635-019-00078-6","DOIUrl":"https://doi.org/10.1007/s41635-019-00078-6","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks 基于定时攻击的三步模型安全缓存分析
Journal of Hardware and Systems Security Pub Date : 2019-11-20 DOI: 10.1007/s41635-019-00075-9
Shuwen Deng, Wenjie Xiong, Jakub Szefer
{"title":"Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks","authors":"Shuwen Deng, Wenjie Xiong, Jakub Szefer","doi":"10.1007/s41635-019-00075-9","DOIUrl":"https://doi.org/10.1007/s41635-019-00075-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125350345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信