Zobrazeno 1 - 10
of 122
pro vyhledávání: '"embedded system security"'
Autor:
Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
In this work, we look into an attack vector known as flash erase suppression. Many microcontrollers have a feature that allows the debug interface protection to be deactivated after wiping the entire flash memory. The flash erase suppression attack e
Externí odkaz:
https://doaj.org/article/1eb37620882e4283bee6f6b875d71ce5
Publikováno v:
IEEE Access, Vol 10, Pp 132675-132684 (2022)
Embedded systems are deployed in many fields, from industrial applications to personal products. However, there are growing concerns regarding the security of these embedded systems as the number of attacks targeting them has increased. Control flow
Externí odkaz:
https://doaj.org/article/065360bcd1714e999cb31afe55dc3109
Publikováno v:
IEEE Access, Vol 8, Pp 184298-184311 (2020)
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performance, suppressing the traditional side-channel analysis. To launch the successful attack on a particular public key cryptographic (PKC) algorithm, a lar
Externí odkaz:
https://doaj.org/article/58c4ffdb074b4fb0b23bbb566210d5d9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Burns, Alan, Goddard, Steve
Publikováno v:
Leibniz Transactions on Embedded Systems, Vol 7, Iss 1, Pp 0:i-0:i (2021)
Embedded systems are now an integral part of our lives. We have smart phones, smart meters, smart appliances, smart cars, smart grids, and smart houses--most relying on embedded systems with outdated security mechanisms, if they have any at all. A re
Externí odkaz:
https://doaj.org/article/22f4192a5add4a14b11056f77b4b9b37
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 2 (2019)
Voltage fault injection is a powerful active side channel attack that modifies the execution-flow of a device by creating disturbances on the power supply line. The attack typically aims at skipping security checks or generating side-channels that gr
Externí odkaz:
https://doaj.org/article/5e1b8a12d5ad4fa1a8850acd99b0b576
Publikováno v:
Applied Sciences, Vol 9, Iss 1, p 64 (2018)
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving
Externí odkaz:
https://doaj.org/article/b8ff831dd3644ce09a9aae85fc54aec0
Publikováno v:
Sensors, Vol 12, Iss 6, Pp 7994-8012 (2012)
Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private information or control restricted operations. MSP430, a 16-bit microcontroller, is used in WSN
Externí odkaz:
https://doaj.org/article/eaf5a9209f804618b03d0f74bdb98c5a
Publikováno v:
IEEE Access
IEEE Access, Vol 8, Pp 184298-184311 (2020)
IEEE Access, Vol 8, Pp 184298-184311 (2020)
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performance, suppressing the traditional side-channel analysis. To launch the successful attack on a particular public key cryptographic (PKC) algorithm, a lar