Zobrazeno 1 - 10
of 7 488
pro vyhledávání: '"fault injection"'
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 3, Pp 55-66 (2024)
Neural network object detectors are increasingly being used for aerial video analysis, with a growing demand for onboard processing on UAVs and other limited resources. However, the vulnerability of neural networks to adversarial noise, out-of-distri
Externí odkaz:
https://doaj.org/article/fb0518b83e8c4af6909e2c785f31707d
Autor:
Uğur Yayan, Alim Kerem Erdoğmuş
Publikováno v:
Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi, Vol 32, Iss 1, Pp 1159-1168 (2024)
Günümüzde, gelişen görüntü işleme teknikleri ile birlikte kamera tabanlı robotik inceleme sistemleri oldukça popülerlik kazanmıştır. Bu tür sistemler gıdadan, askeriyeye birçok sektörde yoğun olarak kullanılmaktadır. Bu sistemler
Externí odkaz:
https://doaj.org/article/373b214b34004ab0952b861d87602ab1
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Fault injection attacks are a serious concern for cryptographic hardware. Adversaries may extract sensitive information from the faulty output that is produced by a cryptographic circuit after actively disturbing its computation. Alternatively, the i
Externí odkaz:
https://doaj.org/article/151ea4762121423bba35019e999c1127
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Hardware faults are a known source of security vulnerabilities. Fault injection in secure embedded systems leads to information leakage and privilege escalation, and countless fault attacks have been demonstrated both in simulation and in practice. H
Externí odkaz:
https://doaj.org/article/b6efb1f4d82f4b9e9262d1f1ff300f8b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and a
Externí odkaz:
https://doaj.org/article/ae7eaca3ec8a4f929d2882c7b3951b93
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Fault injection attacks represent a type of active, physical attack against cryptographic circuits. Various countermeasures have been proposed to thwart such attacks, however, the design and implementation of which are intricate, error-prone, and lab
Externí odkaz:
https://doaj.org/article/359a33f72d8f4c53a3c77f7e0456a75c
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices. Concret
Externí odkaz:
https://doaj.org/article/b9e32f1a55b34d97b8dcc44b39abcdf3
Autor:
Marcello Barbirotta, Francesco Minervini, Carlos Rojas Morales, Adrian Cristal, Osman Unsal, Mauro Olivieri
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 5, Pp 553-565 (2024)
High-Performance Computing (HPC) systems are designed for large-scale processing and complex dataset analysis leveraging scalability, efficiency, and parallelism, often integrating specialized hardware structures such as Vector Processing Units (VPUs
Externí odkaz:
https://doaj.org/article/26116412d4934c9595d32832eb3f552f
Publikováno v:
IEEE Access, Vol 12, Pp 138201-138210 (2024)
With the relentless progression in autonomous driving and chassis control technologies, the safety requirements for commercial vehicle braking systems have intensified. Ensuring the safety and reliability of these systems during operation has become
Externí odkaz:
https://doaj.org/article/587659bb0d394742b8fc1d6b553a7d36
Publikováno v:
IEEE Access, Vol 12, Pp 68061-68108 (2024)
To meet the demanding requirements of VLSI design, including improved speed, reduced power consumption, and compact architectures, various IP cores from trusted and untrusted platforms are often integrated into a single System-on-Chip (SoC). However,
Externí odkaz:
https://doaj.org/article/4fcd732dc00241ae9abe05cf87e318f8