Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Christian Wachsmann"'
Autor:
Mohammed Ashraf, Christian Wachsmann, Ozgur Sinanoglu, Nimisha Limaye, Arun K. Kanuparthi, Mohammed Nabeel
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 10:1507-1518
Publikováno v:
CITplus. 25:16-17
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly use
Publikováno v:
IEEE Transactions on Information Forensics and Security. 11:1106-1116
We present a side-channel attack based on remanence decay in volatile memory and show how it can be exploited effectively to launch a noninvasive cloning attack against SRAM physically unclonable functions (PUFs)—an important class of PUFs typicall
Publikováno v:
Synthesis Lectures on Information Security, Privacy, and Trust. 9:1-91
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly use
Autor:
Jan-Erik Ekberg, Carlos V. Rozas, Kari Kostiainen, Steffen Schulz, Christian Wachsmann, Nadarajah Asokan, Ahmad-Reza Sadeghi, Anand Rajan
Publikováno v:
Proceedings of the IEEE. 102:1189-1206
Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly use
Autor:
Christian Wachsmann, Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi
Publikováno v:
DAC
Embedded systems are at the core of many security-sensitive and safety-critical applications, including automotive, industrial control systems, and critical infrastructures. Existing protection mechanisms against (software-based) malware are inflexib
Publikováno v:
DAC
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industrie 4.0" and Internet of Thi
Publikováno v:
Physically Unclonable Functions (PUFs) ISBN: 9783031012167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::abec5ba2f65fed93bc798fc76f189e41
https://doi.org/10.1007/978-3-031-02344-6_2
https://doi.org/10.1007/978-3-031-02344-6_2