Journal of Hardware and Systems Security最新文献

筛选
英文 中文
Analysis of Diagonal Constants for Extension of Salsa to 64 Bit Salsa扩展到64位的对角常数分析
Journal of Hardware and Systems Security Pub Date : 2019-01-05 DOI: 10.1007/s41635-018-0057-y
Bhagwan N. Bathe, Bharti Hariramani, A. Bhattacharjee, S. V. Kulgod
{"title":"Analysis of Diagonal Constants for Extension of Salsa to 64 Bit","authors":"Bhagwan N. Bathe, Bharti Hariramani, A. Bhattacharjee, S. V. Kulgod","doi":"10.1007/s41635-018-0057-y","DOIUrl":"https://doi.org/10.1007/s41635-018-0057-y","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120897495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems 智能电网嵌入式系统的硬件层智能采集
Journal of Hardware and Systems Security Pub Date : 2019-01-04 DOI: 10.1007/s41635-018-0063-0
Charalambos Konstantinou, M. Maniatakos
{"title":"Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems","authors":"Charalambos Konstantinou, M. Maniatakos","doi":"10.1007/s41635-018-0063-0","DOIUrl":"https://doi.org/10.1007/s41635-018-0063-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
IPA: an Instruction Profiling–Based Micro-architectural Side-Channel Attack on Block Ciphers 基于指令分析的分组密码微架构侧信道攻击
Journal of Hardware and Systems Security Pub Date : 2018-12-12 DOI: 10.1007/s41635-018-0060-3
Manaar Alam, Sarani Bhattacharya, S. Sinha, C. Rebeiro, Debdeep Mukhopadhyay
{"title":"IPA: an Instruction Profiling–Based Micro-architectural Side-Channel Attack on Block Ciphers","authors":"Manaar Alam, Sarani Bhattacharya, S. Sinha, C. Rebeiro, Debdeep Mukhopadhyay","doi":"10.1007/s41635-018-0060-3","DOIUrl":"https://doi.org/10.1007/s41635-018-0060-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133823479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs—Extended Version 高阶字母pufs的变长位映射和纠错码-扩展版
Journal of Hardware and Systems Security Pub Date : 2018-12-11 DOI: 10.1007/s41635-018-0056-z
Vincent Immler, Matthias Hiller, Qinzhi Liu, A. Lenz, A. Wachter-Zeh
{"title":"Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs—Extended Version","authors":"Vincent Immler, Matthias Hiller, Qinzhi Liu, A. Lenz, A. Wachter-Zeh","doi":"10.1007/s41635-018-0056-z","DOIUrl":"https://doi.org/10.1007/s41635-018-0056-z","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Hardware Reverse Engineering and Obfuscation 嘉宾评论:硬件逆向工程和混淆
Journal of Hardware and Systems Security Pub Date : 2018-12-01 DOI: 10.1007/s41635-018-0059-9
Domenic Forte, Yousef Iskander
{"title":"Guest Editorial: Hardware Reverse Engineering and Obfuscation","authors":"Domenic Forte, Yousef Iskander","doi":"10.1007/s41635-018-0059-9","DOIUrl":"https://doi.org/10.1007/s41635-018-0059-9","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing 检测硬件木马插入不受信任的铸造厂使用物理检测和先进的图像处理
Journal of Hardware and Systems Security Pub Date : 2018-12-01 DOI: 10.1007/s41635-018-0055-0
Nidish Vashistha, M. T. Rahman, Haoting Shen, D. Woodard, N. Asadizanjani, M. Tehranipoor
{"title":"Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing","authors":"Nidish Vashistha, M. T. Rahman, Haoting Shen, D. Woodard, N. Asadizanjani, M. Tehranipoor","doi":"10.1007/s41635-018-0055-0","DOIUrl":"https://doi.org/10.1007/s41635-018-0055-0","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering 面向全集成电路逆向工程的大面积自动版图提取方法
Journal of Hardware and Systems Security Pub Date : 2018-10-31 DOI: 10.1007/s41635-018-0051-4
Raul Quijada, R. Dura, J. Pallares, X. Formatje, Salvador Hidalgo, F. Serra-Graells
{"title":"Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering","authors":"Raul Quijada, R. Dura, J. Pallares, X. Formatje, Salvador Hidalgo, F. Serra-Graells","doi":"10.1007/s41635-018-0051-4","DOIUrl":"https://doi.org/10.1007/s41635-018-0051-4","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Unravelling Security Issues of Runtime Permissions in Android 解开Android运行时权限的安全问题
Journal of Hardware and Systems Security Pub Date : 2018-10-25 DOI: 10.1007/s41635-018-0053-2
E. Alepis, C. Patsakis
{"title":"Unravelling Security Issues of Runtime Permissions in Android","authors":"E. Alepis, C. Patsakis","doi":"10.1007/s41635-018-0053-2","DOIUrl":"https://doi.org/10.1007/s41635-018-0053-2","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks ACORN v3和Grain v1对TMDTO攻击的启示
Journal of Hardware and Systems Security Pub Date : 2018-10-25 DOI: 10.1007/s41635-018-0054-1
A. Siddhanti, S. Maitra, Nishant Sinha
{"title":"Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks","authors":"A. Siddhanti, S. Maitra, Nishant Sinha","doi":"10.1007/s41635-018-0054-1","DOIUrl":"https://doi.org/10.1007/s41635-018-0054-1","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123239004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessment of a Chip Backside Protection 芯片背面保护的评估
Journal of Hardware and Systems Security Pub Date : 2018-10-17 DOI: 10.1007/s41635-018-0052-3
E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit
{"title":"Assessment of a Chip Backside Protection","authors":"E. Amini, A. Beyreuther, N. Herfurth, A. Steigert, B. Szyszka, C. Boit","doi":"10.1007/s41635-018-0052-3","DOIUrl":"https://doi.org/10.1007/s41635-018-0052-3","url":null,"abstract":"","PeriodicalId":122880,"journal":{"name":"Journal of Hardware and Systems Security","volume":"545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信