Showing 1 - 14 results of 14 for search '"hardware security"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Survey of security for Android smart terminal by Yan-ping XU, Zhao-feng MA, Zhong-hua WANG, Xin-xin NIU, Yi-xian YANG

    Published 2016-06-01
    “…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
    Get full text
    Article
  5. 5

    Research on area-efficient low-entropy masking scheme for AES by Jiuxing JIANG, Jiao HOU, Hai HUANG, Yuying ZHAO, Xinxin FENG

    Published 2019-05-01
    “…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
    Get full text
    Article
  6. 6

    Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection by Yongkang TANG, Xing HU, Ting SU, Shaoqing LI

    Published 2021-04-01
    “…With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits.At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more attention from the academia.The side-channel analysis method based on electromagnetic radiation is one of the hotspots in hardware security field.The ability evaluation of electromagnetic radiation analysis method to detect hardware Trojan was focused, and the factor that limited their detection performance was explored.The experimental results on FPGA show that the electromagnetic radiation analysis method can effectively detect hardware Trojan whose electromagnetic radiation distribution is significantly different from surrounding circuits, but it cannot be applied to hardware Trojan with complex frequency distribution of electromagnetic radiation.…”
    Get full text
    Article
  7. 7

    DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer by Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao

    Published 2024-01-01
    “…However, traditional HTs protection techniques cannot guarantee complete protection against HTs, which poses a great challenge to the hardware security of SoW. In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
    Get full text
    Article
  8. 8

    MARPUF: physical unclonable function with improved machine learning attack resistance by Somanath Tripathy, Vikash Kumar Rai, Jimson Mathew

    Published 2021-08-01
    “…Although PUF is very useful in the area of hardware security, it is vulnerable to machine learning modelling attacks (ML‐MA) by modelling the challenge‐response pairs (CRPs) behaviour. …”
    Get full text
    Article
  9. 9

    Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu

    Published 2014-03-01
    “…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
    Get full text
    Article
  10. 10

    A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things by Chen Dong, Jinghui Chen, Wenzhong Guo, Jian Zou

    Published 2019-12-01
    “…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
    Get full text
    Article
  11. 11

    Identifying and understanding the nonlinear behavior of memristive devices by Sahitya Yarragolla, Torben Hemke, Fares Jalled, Tobias Gergs, Jan Trieschmann, Tolga Arul, Thomas Mussenbrock

    Published 2024-12-01
    “…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. …”
    Get full text
    Article
  12. 12

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. …”
    Get full text
    Article
  13. 13

    sThing: A Novel Configurable Ring Oscillator Based PUF for Hardware-Assisted Security and Recycled IC Detection by Saswat Kumar Ram, Sauvagya Ranjan Sahoo, Banee Bandana Das, Kamalakanta Mahapatra, Saraju P. Mohanty

    Published 2025-01-01
    “…The ring oscillator (RO) is widely used to address different hardware security issues. For example, the RO-based physical unclonable function (PUF) generates a secure and reliable key for the cryptographic application, and the RO-based aging sensor is used for the efficient detection of recycled ICs. …”
    Get full text
    Article
  14. 14

    TVD‐PB logic circuit based on camouflaging circuit for IoT security by Yuejun Zhang, Qiufeng Wu, Pengjun Wang, Liang Wen, Zhicun Luan, Chongyan Gu

    Published 2022-01-01
    “…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
    Get full text
    Article