Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Anomadarshi Barua"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
Spoofing a passive Hall sensor with fake magnetic fields can inject false data into the downstream of connected systems. Several works have tried to provide a defense against the intentional spoofing to different sensors over the last six years. Howe
Externí odkaz:
https://doaj.org/article/29ba3d518b3948a192fd72f2b5a59bf4
Publikováno v:
Computer. 56:122-125
Publikováno v:
2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:1770-1782
A neuro-cognitive inspired architecture based on the Hierarchical Temporal Memory (HTM) is proposed for anomaly detection and simultaneous data prediction in real-time for smart grid μPMU data. The key technical idea is that the HTM learns a sparse
Publikováno v:
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design.
Publikováno v:
25th International Symposium on Research in Attacks, Intrusions and Defenses.
Over the last six years, several papers used memory deduplication to trigger various security issues, such as leaking heap-address and causing bit-flip in the physical memory. The most essential requirement for successful memory deduplication is to p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::680249b44b007ba400af183d0fd3fb7f
http://arxiv.org/abs/2210.03719
http://arxiv.org/abs/2210.03719
Autor:
Sujit Rokka Chhetri, Francesco Regazzoni, Mohammad Abdullah Al Faruque, Arquimedes Canedo, Anomadarshi Barua, Sina Faezi
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:667-678
In cyber-physical additive manufacturing systems, side-channel attacks have been used to reconstruct the G/M-code (which are instructions given to a manufacturing system) of 3D objects being produced. This method is effective for stealing intellectua
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:2697-2708
Since 2007, the use of side-channel measurements for detecting Hardware Trojan (HT) has been extensively studied. However, the majority of works either rely on a golden chip, or they rely on methods that are not robust against subtle acceptable chang
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::413599f7f7e31cf23eddd337680f1b30
https://doi.org/10.1007/978-3-642-27739-9_1652-1
https://doi.org/10.1007/978-3-642-27739-9_1652-1