Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Noor Ahmad Hazari"'
Publikováno v:
IEEE Access, Vol 12, Pp 119868-119883 (2024)
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the integration of communication and internet in its network. It facilitates the bidirectional flow of information and power making it vulnerable to attacks inc
Externí odkaz:
https://doaj.org/article/35a970dd55b74183b2292c4458d946f1
Publikováno v:
IEEE Access, Vol 12, Pp 89322-89338 (2024)
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from untrusted participants involved, resulting in the significant research being conducted in this domain. These challenges include, but are not limited to intell
Externí odkaz:
https://doaj.org/article/30357bbe332d4c66b08ab5016aed02e7
Publikováno v:
IEEE Access, Vol 9, Pp 121743-121758 (2021)
Physical Unclonable Functions (PUFs) are used for authentication and generation of secure cryptographic keys. However, recent research work has shown that PUFs, in general, are vulnerable to machine learning modeling attacks. From a subset of Challen
Externí odkaz:
https://doaj.org/article/65bbd168ac8647c99f32a02ba8837a43
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 17:1-20
Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Although PUFs are supposed to be unclonable or unbreakable, researchers have found that they are vulnera
Publikováno v:
MWSCAS
Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Although PUFs are supposed to be unclonable or unbreakable, researchers have found that ROPUFs, in gener
Publikováno v:
2019 IEEE National Aerospace and Electronics Conference (NAECON).
Ring Oscillator Physical Unclonable Function (ROPUF) has been the preferred choice for embedding hardware-oriented security and trust in FPGA based systems. Parameters such as uniformity, uniqueness, bit-aliasing, and reliability have been used to me
Autor:
Noor Ahmad Hazari, Mohammed Niamat
Publikováno v:
2017 IEEE National Aerospace and Electronics Conference (NAECON).
In recent years FPGAs have become vulnerable to hardware Trojan attacks due to their increased use in different applications like defense, automotive, image processing, etc. Among several types of hardware Trojan attacks in FPGAs, one of them is impl
Publikováno v:
2017 IEEE National Aerospace and Electronics Conference (NAECON).
In this paper, machine learning attacks are performed on a novel hybrid delay based Arbiter Ring Oscillator PUF (AROPUF). The AROPUF exhibits improved results when compared to traditional Arbiter Physical Unclonable Function (APUF). The challenge-res