Zobrazeno 1 - 10
of 142
pro vyhledávání: '"Computer security compromised by hardware failure"'
Publikováno v:
ASPLOS
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective way to formally verify important
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:405-417
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted third-party vendors has raised security concerns for computer system designers. The existing approaches, designed to ensure the trustworthiness of either
Publikováno v:
IEEE Circuits and Systems Magazine. 17:32-62
Severe security threats and alerts associated with the use of smart devices have drawn increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT devices pose a unique and challenging scenario for hardware securit
Publikováno v:
Chinese Journal of Electronics. 25:801-806
Control flow monitoring, information flow tracking and memory monitoring are the three main solutions to enhance the security of embedded system at the hardware architecture level. However, most of the current studies about the security of embedded s
Autor:
Paul C. Kocher
Publikováno v:
Communications of the ACM. 59:22-25
Computer security problems have far exceeded the limits of the human brain. What can we do about it?
Autor:
Yu-ichi Hayashi
Publikováno v:
Radio Science. 51:1213-1219
As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and cap
Publikováno v:
IEEE Transactions on Services Computing. 9:343-356
With the proliferation of cloud computing, security concerns about confidentiality violations of user data by the privileged domain and system administrators have been growing. This paper proposes secure cloud architecture with a hardware security mo
Publikováno v:
Journal of Cryptographic Engineering. 6:325-337
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also
Autor:
Jatinder Singh
Publikováno v:
Indian Journal of Science and Technology. 10:1-3
After demonetization in INDIA, eWallets are very actively participating for financial transactions in Indian economy. Very huge population in INDIA, today,is using eWallets. In one side, eWallets are providing very convenience in shopping and online
Autor:
Yier Jin
Publikováno v:
Electronics, Vol 4, Iss 4, Pp 763-784 (2015)
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptogra