-
1
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01Subjects: “…hardware security…”
Get full text
Article -
2
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
3
Secure interface architecture for the software defined system on wafer
Published 2024-10-01Subjects: Get full text
Article -
4
Survey of security for Android smart terminal
Published 2016-06-01“…Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the wireless security network,virus propagation killing and anti-phishing was illustrated.Thirdly,the OS safety was introduced from the perspective of system kernel,runtime environment and application framework.Fourthly,application security was showed containing the reverse engineering static analysis,behavior dynamic analysis,safety reinforcement and safety assessment.Fifthly,the privacy data protection was summarized including tracking,encryption and backup.Finally,the future development direction was prospected on the security framework and intelligent behavior analysis.…”
Get full text
Article -
5
Research on area-efficient low-entropy masking scheme for AES
Published 2019-05-01“…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
Get full text
Article -
6
Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection
Published 2021-04-01“…With the globalization of the integrated circuit industry, hardware Trojan is becoming the main threat to integrated circuits.At present, the side-channel analysis which can make a good trade-off between detection ability and cost, has attracted more attention from the academia.The side-channel analysis method based on electromagnetic radiation is one of the hotspots in hardware security field.The ability evaluation of electromagnetic radiation analysis method to detect hardware Trojan was focused, and the factor that limited their detection performance was explored.The experimental results on FPGA show that the electromagnetic radiation analysis method can effectively detect hardware Trojan whose electromagnetic radiation distribution is significantly different from surrounding circuits, but it cannot be applied to hardware Trojan with complex frequency distribution of electromagnetic radiation.…”
Get full text
Article -
7
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…However, traditional HTs protection techniques cannot guarantee complete protection against HTs, which poses a great challenge to the hardware security of SoW. In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
Get full text
Article -
8
MARPUF: physical unclonable function with improved machine learning attack resistance
Published 2021-08-01“…Although PUF is very useful in the area of hardware security, it is vulnerable to machine learning modelling attacks (ML‐MA) by modelling the challenge‐response pairs (CRPs) behaviour. …”
Get full text
Article -
9
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks
Published 2014-03-01“…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
Get full text
Article -
10
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
Published 2019-12-01“…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
Get full text
Article -
11
Identifying and understanding the nonlinear behavior of memristive devices
Published 2024-12-01“…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. …”
Get full text
Article -
12
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01“…Since operating system (OS) and hardware security have improved recently, researchers and hackers now seek vulnerabilities in other areas, such as firmware. …”
Get full text
Article -
13
sThing: A Novel Configurable Ring Oscillator Based PUF for Hardware-Assisted Security and Recycled IC Detection
Published 2025-01-01“…The ring oscillator (RO) is widely used to address different hardware security issues. For example, the RO-based physical unclonable function (PUF) generates a secure and reliable key for the cryptographic application, and the RO-based aging sensor is used for the efficient detection of recycled ICs. …”
Get full text
Article -
14
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
Get full text
Article