Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Securing Wireless Communication via Hardware-Based Packet Obfuscation 通过基于硬件的数据包混淆保护无线通信
Journal of Hardware and Systems Security Pub Date : 2019-05-16 DOI: 10.1007/s41635-019-00070-0
James Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, I. Savidis, K. Dandekar
{"title":"Securing Wireless Communication via Hardware-Based Packet Obfuscation","authors":"James Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, I. Savidis, K. Dandekar","doi":"10.1007/s41635-019-00070-0","DOIUrl":"https://doi.org/10.1007/s41635-019-00070-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Defective Pin Detection for Recycled Microelectronics Identification 用于回收微电子识别的缺陷引脚自动检测
Journal of Hardware and Systems Security Pub Date : 2019-05-08 DOI: 10.1007/s41635-019-00069-7
P. Ghosh, Aritra Bhattacharya, Domenic Forte, R. Chakraborty
{"title":"Automated Defective Pin Detection for Recycled Microelectronics Identification","authors":"P. Ghosh, Aritra Bhattacharya, Domenic Forte, R. Chakraborty","doi":"10.1007/s41635-019-00069-7","DOIUrl":"https://doi.org/10.1007/s41635-019-00069-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Practical Partial Hardware Reverse Engineering Analysis 实用部分硬件逆向工程分析
Journal of Hardware and Systems Security Pub Date : 2019-04-06 DOI: 10.1007/s41635-019-00068-8
Franck Courbon
{"title":"Practical Partial Hardware Reverse Engineering Analysis","authors":"Franck Courbon","doi":"10.1007/s41635-019-00068-8","DOIUrl":"https://doi.org/10.1007/s41635-019-00068-8","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Targeted modification of hardware trojans 针对硬件木马进行针对性修改
Journal of Hardware and Systems Security Pub Date : 2019-03-18 DOI: 10.1007/s41635-018-0058-x
J. Hamlet, J. Mayo, V. Kammler
{"title":"Targeted modification of hardware trojans","authors":"J. Hamlet, J. Mayo, V. Kammler","doi":"10.1007/s41635-018-0058-x","DOIUrl":"https://doi.org/10.1007/s41635-018-0058-x","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS) 2017年硬件与系统安全(HaSS)杂志特刊
Journal of Hardware and Systems Security Pub Date : 2019-03-01 DOI: 10.1007/s41635-019-00067-9
Sk Subidh Ali, Debdeep Mukhopadhyay
{"title":"Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS)","authors":"Sk Subidh Ali, Debdeep Mukhopadhyay","doi":"10.1007/s41635-019-00067-9","DOIUrl":"https://doi.org/10.1007/s41635-019-00067-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-Key Encryption with Integrated Keyword Search 集成关键字搜索的公钥加密
Journal of Hardware and Systems Security Pub Date : 2019-03-01 DOI: 10.1007/s41635-019-00066-w
V. Saraswat, R. Sahu, G. Sharma, Veronika Kuchta, O. Markowitch
{"title":"Public-Key Encryption with Integrated Keyword Search","authors":"V. Saraswat, R. Sahu, G. Sharma, Veronika Kuchta, O. Markowitch","doi":"10.1007/s41635-019-00066-w","DOIUrl":"https://doi.org/10.1007/s41635-019-00066-w","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Generalized Format Preserving Encryption Framework Using MDS Matrices 一种基于MDS矩阵的通用保格式加密框架
Journal of Hardware and Systems Security Pub Date : 2019-03-01 DOI: 10.1007/s41635-019-00065-x
D. Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, S. K. Sanadhya
{"title":"A Generalized Format Preserving Encryption Framework Using MDS Matrices","authors":"D. Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, S. K. Sanadhya","doi":"10.1007/s41635-019-00065-x","DOIUrl":"https://doi.org/10.1007/s41635-019-00065-x","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Data Center Against Power Attacks 保护数据中心免受电源攻击
Journal of Hardware and Systems Security Pub Date : 2019-02-05 DOI: 10.1007/s41635-019-0064-7
Rajesh Js, Chidhambaranathan Rajamanikkam, Koushik Chakraborty, Sanghamitra Roy
{"title":"Securing Data Center Against Power Attacks","authors":"Rajesh Js, Chidhambaranathan Rajamanikkam, Koushik Chakraborty, Sanghamitra Roy","doi":"10.1007/s41635-019-0064-7","DOIUrl":"https://doi.org/10.1007/s41635-019-0064-7","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131383465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis 基于机器学习的基于执行跟踪分析的dos攻击检测技术
Journal of Hardware and Systems Security Pub Date : 2019-01-26 DOI: 10.1007/s41635-018-0061-2
H. Abbasi, Naser Ezzati-Jivan, M. Bellaiche, C. Talhi, M. Dagenais
{"title":"Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis","authors":"H. Abbasi, Naser Ezzati-Jivan, M. Bellaiche, C. Talhi, M. Dagenais","doi":"10.1007/s41635-018-0061-2","DOIUrl":"https://doi.org/10.1007/s41635-018-0061-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches 间谍卡特尔:在最后一级缓存上并行驱逐+基于时间的缓存攻击
Journal of Hardware and Systems Security Pub Date : 2019-01-12 DOI: 10.1007/s41635-018-0062-1
Himanshi Jain, D. Anthony Balaraju, C. Rebeiro
{"title":"Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches","authors":"Himanshi Jain, D. Anthony Balaraju, C. Rebeiro","doi":"10.1007/s41635-018-0062-1","DOIUrl":"https://doi.org/10.1007/s41635-018-0062-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信