A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Review of THz-based semiconductor assurance
2021
Optical Engineering: The Journal of SPIE
Until recent hardware advances, THz systems lacked the signal quality and reliability for use as an effective nondestructive testing (NDT) method. ...
of counterfeit pharmaceutical tablets. ...
Hardware Threats
Hardware Trojan A hardware Trojan is defined as a malicious, intentional modification of a circuit design that results in undesired behavior when the circuit is deployed. 67 However ...
doi:10.1117/1.oe.60.6.060901
fatcat:uycncszevvdevmznjn5soksmsm
REFICS: Assimilating Data-Driven Paradigms into Reverse Engineering and Hardware Assurance on Integrated Circuits
2021
IEEE Access
His research interests include the domain of hardware security, including the investigation of hardware security primitives, hardware Trojan detection and prevention, electronics supplychain security, ...
The primary obstacle is the negative connotation behind RE as an attack mechanism used by an adversary to illegally acquire design schematics and counterfeit IP rather than a hardware assurance tool. ...
doi:10.1109/access.2021.3114360
fatcat:lwwg2qgf6je7hnwdlx5yf3spqy
Hardware Security in IoT Devices with Emphasis on Hardware Trojans
2019
Journal of Sensor and Actuator Networks
However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. ...
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. ...
B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper. ...
doi:10.3390/jsan8030042
fatcat:zuzw6sf2hzgdfiz65p2joz2g6a
Towards a Hardware Trojan Detection Cycle
2014
2014 Ninth International Conference on Availability, Reliability and Security
Intentionally inserted malfunctions in integrated circuits, referred to as Hardware Trojans, have become an emerging threat. ...
However, these detection and prevention mechanisms are still hardly integrated in the industry's Hardware development life cycles. ...
ACKNOWLEDGMENTS This work was supported by the FIT-IT program (project number 835922) and the COMET K1 program by FFG (Austrian Research Funding Agency). ...
doi:10.1109/ares.2014.45
dblp:conf/IEEEares/DabrowskiHUKW14
fatcat:6n7dbitosrdlthrksdgfftus5y
Hardware Trojans in Reconfigurable Computing
2021
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)
A special thanks goes to my colleague cum mentor Tobias Wiersema who has been there all the time for scientific discussions in a very professional way and also his help regarding social matters in Germany ...
I would like to meekly express my thanks to all my colleagues, friends, family, and specifically to those mentioned in the following lines. ...
Reconfigurable hardware is made up of an array of identical re-programmable cells connected via distributed programmable interconnect structure, thus more vulnerable to attacks, such as counterfeiting ...
doi:10.1109/vlsi-soc53125.2021.9606974
fatcat:udwjtbtd4vdsljv64s3qgsjeey
FPIC: A Novel Semantic Dataset for Optical PCB Assurance
[article]
2023
arXiv
pre-print
Additionally, we outline new hardware security methodologies enabled by our data set. ...
Outsourced printed circuit board (PCB) fabrication necessitates increased hardware assurance capabilities. ...
Threats to PCBAs Optical assurance has been proposed for identifying counterfeit and maliciously-modified ("trojan") components and PCBAs. ...
arXiv:2202.08414v2
fatcat:4ptz34ektrfebp67jpwsriqbie
Interdiction in practice—Hardware Trojan against a high-security USB flash drive
2016
Journal of Cryptographic Engineering
In this paper, we demonstrate the first successful real-world FPGA hardware Trojan insertion into a commercial product. ...
On the target device, a FIPS-140-2 level 2 certified USB flash drive from Kingston, the user data are encrypted using AES-256 in XTS mode, and the encryption/decryption is processed by an off-the-shelf ...
Acknowledgment The authors would like to thank Kai Stawikowski and Georg T. Becker for their fruitful comments and help regarding this project. ...
doi:10.1007/s13389-016-0132-7
fatcat:fsqgbnddj5a43mcnlboiudej4q
Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things
2017
Electronics
logic locking, and a TFET secure SAR ADC design for Trojan countermeasures are shown in Section 6. ...
Emerging low voltage logic devices and non-volatile memories (NVMs) beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed. ...
Shayan Taheri contributes to SAR ADC Trojan attacks and countermeasures. All authors proofread the manuscript.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics6030067
fatcat:ozssarlb2ng5pcdsupo2hljyna
Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0
2017
Journal of Hardware and Systems Security
However, these technologies have various security issues, and when integrated in the supply chain and the product lifecycle of manufacturing systems can pose various challenges for maintaining the security ...
In this paper, we will present the various trends and advances in the security of the supply chain and product lifecycle of the manufacturing system while highlighting the roles played by the major enabling ...
HARDWARE SECURITY AND MANUFACTURING SUPPLY CHAIN Hardware security can tremendously influence the security of the processing components used in the manufacturing supply chain. ...
doi:10.1007/s41635-017-0031-0
dblp:journals/jhss/ChhetriFRF18
fatcat:kjqonv6zvrhufcux3ou7mq54ei
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights
2018
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)
, and hardware security. ...
Since underlying hardware components form the basis of trust in virtually any computing system, security failures in hardware pose a devastating threat to our daily lives. ...
., hardware Trojans and backdoors) can compromise the security of an entire system [3] . ...
doi:10.1109/tale.2018.8615270
dblp:conf/tale/WiesenBFAERP18
fatcat:pxrj7t5rjbbsvmrcwxuyfko5nu
Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain
2019
EAI Endorsed Transactions on Security and Safety
Blockchain technology is an excellent example of maintaining privacy and security (in terms of immutability). ...
But then also we have to pertain to the scalability and security challenges in this technology for more honorable and reliable in state-of-the-art Blockchain technology. ...
This obfuscation is able to prevent hardware Trojan attacks indirectly as attackers would not be able to insert the meaningful and stealthy hardware Trojans in such an obfuscated transaction sequences. ...
doi:10.4108/eai.8-4-2019.157416
fatcat:7z6rw4uxxvbzpivgol5mjevuia
Effects of Cybercrime on State Security:Types, Impact and Mitigations with the Fiber Optic Deployment In Kenya
2011
Journal of Information Assurance & Cybersecurity
Also, to a great extent the Criminal Investigation department (CID) and Communications Commission of Kenya (CCK) have recognized that cybercrime is a growing threat to security in Nairobi and have collaborated ...
The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment. ...
or trojans and lastly piracy. ...
doi:10.5171/2011.618585
fatcat:n3djomsk4jfrzlc3osvska7gya
Drivers and barriers for secure hardware adoption across ecosystem stakeholders
2022
Journal of Cybersecurity
Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution and integrity validation on system start, and are increasingly deemed ...
To understand the decisions and opinions regarding the adoption of secure hardware, we conducted 23 semi-structured interviews with senior decision-makers from companies spanning a range of sectors, sizes ...
The study has also benefited from a number of experts in the domain who remain anonymous. ...
doi:10.1093/cybsec/tyac009
fatcat:4lunpjvx6fhu5es6b2bfswlwnu
An Overview of Medical Electronic Hardware Security and Emerging Solutions
2022
Electronics
The review outcome delivers the solutions through building and evaluating the connections among these elements in order to serve as a beneficial guideline for medical electronic hardware security. ...
hardware-level; (3) artificial intelligence and/or computer vision in medical applications; and (4) cyber attacks and defenses in the medical domain. ...
), and any other medical-related entity in the world-wide network. ...
doi:10.3390/electronics11040610
fatcat:t2e7fnz26bc3dabxuyy7hqtjva
Secure and Trusted Application Execution on Embedded Devices
[chapter]
2015
Lecture Notes in Computer Science
Such an agnostic view on the security and trust of the embedded devices can be pivotal in their adoption and trust acquisition from the general public and service providers. ...
, where they might be in the possession of an attacker. ...
Hardware Trojans Hardware Trojans are malicious circuitry implanted in an IC. ...
doi:10.1007/978-3-319-27179-8_1
fatcat:qann2ltknrdgrpt4y665s5gk5u
« Previous
Showing results 1 — 15 out of 165 results