-
1Academic Journal
المؤلفون: Sacchetti, Tommaso, Bognar, Marton, de Meulemeester, Jesse, Gierlichs, Benedikt, Piessens, Frank, Bezsmertnyi, Volodymyr, Molteni, Maria, Chiara, Cristalli, Stefano, Gringiani, Arianna, Thomas, Olivier, Antonioli, Daniele
المساهمون: Eurecom Sophia Antipolis, Catholic University of Leuven = Katholieke Universiteit Leuven (KU Leuven), NXP semiconductors, Security Pattern, texplained, ANR-20-CYAL-0001,Apricot,Assurer les propriétés de protection de la vie privée de l'internet des objets(2020), ANR-22-PEFT-0009,NF-HiSec,Network of the Future - End-to-end Security(2022), European Project: BELFORT, European Project: ORSHIN
المصدر: ISSN: 1539-9087.
مصطلحات موضوعية: Hardware attacks and countermeasures, Tamper-proof and tamper-resistant designs Threat Modeling, Embedded Systems Security, Hardware Security, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
2Academic Journal
المؤلفون: Ibrahim, Omar Adel, Sciancalepore, Savio, Di Pietro, Roberto
المصدر: Ibrahim , O A , Sciancalepore , S & Di Pietro , R 2024 , ' MAG-PUFs : Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning ' , Computers and Security , vol. 143 , 103905 . https://doi.org/10.1016/j.cose.2024.103905
مصطلحات موضوعية: Covert channels, Embedded systems security, Physical-layer authentication, Unintentional electromagnetic emissions
وصف الملف: application/pdf
-
3
المؤلفون: Jakkamsetti, Sashidhar
مصطلحات موضوعية: Computer science, Computer engineering, Control-flow attacks, Embedded Systems Security, Formal Verification, IoT, Privacy, Remote Attestation
وصف الملف: application/pdf
URL الوصول: https://escholarship.org/uc/item/05k9t18w
-
4Academic Journal
المؤلفون: William A. Johnson, Sheikh Ghafoor, Stacy Prowell
المصدر: IEEE Access, Vol 9, Pp 142390-142410 (2021)
مصطلحات موضوعية: Remote attestation, embedded systems security, fileless malware, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
5Academic Journal
المؤلفون: Alessandro Barenghi, Luca Breveglieri, Niccolo Izzo, Gerardo Pelosi
المصدر: IEEE Access, Vol 9, Pp 156507-156527 (2021)
مصطلحات موضوعية: Computer security, correlation power analysis, embedded systems security, microarchitectural reverse engineering, side channel attack countermeasures, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
6Conference
المؤلفون: Wagner, Paul-Georg, Birnstill, Pascal, Beyerer, Jürgen
مصطلحات موضوعية: Computer systems organization, Architectures, Distributed architectures, Embedded and cyber-physical systems, Security and privacy, Network security, Security protocols, Security in hardware, Embedded systems security
Relation: International Conference on Availability, Reliability and Security 2024; #PLACEHOLDER_PARENT_METADATA_VALUE#; ARES 2024, 19th International Conference on Availability, Reliability & Security. Proceedings; https://publica.fraunhofer.de/handle/publica/472212
-
7Academic Journal
المؤلفون: Burns, Alan, Goddard, Steve
المصدر: Leibniz Transactions on Embedded Systems; Vol. 7 No. 1 (2021): Special Issue on Embedded System Security; 00:1-00:1 ; 2199-2002 ; 10.4230/LITES-v007-i001
مصطلحات موضوعية: Foreword, Embedded System Security, Security and privacy~Embedded systems security
وصف الملف: application/pdf
Relation: https://ojs.dagstuhl.de/index.php/lites/article/view/130/43; https://ojs.dagstuhl.de/index.php/lites/article/view/130
-
8Academic Journal
المؤلفون: Miedl, Philipp, Ahmed, Rehan, Thiele, Lothar
المصدر: Leibniz Transactions on Embedded Systems; Vol. 7 No. 1 (2021): Special Issue on Embedded System Security; 02:1-02:28 ; 2199-2002 ; 10.4230/LITES-v007-i001
مصطلحات موضوعية: Thermal Monitoring, Side Channel, Data Leak, Sequence Labelling, Security and privacy → Mobile platform security, Security and privacy → Embedded systems security, Security and privacy → Hardware attacks and countermeasures, Security and privacy → Virtualization and security, Hardware → Temperature monitoring
وصف الملف: application/pdf
Relation: https://ojs.dagstuhl.de/index.php/lites/article/view/lites-v007-i001-a002/lites-v007-i001-a002-pdf; https://ojs.dagstuhl.de/index.php/lites/article/view/lites-v007-i001-a002
-
9Conference
المؤلفون: Singh, Chamandeep, Satish, Sripadam, Mitra, Jubin, Shukla, Sandeep
المصدر: Innovations in Electronics and Communication Engineering
مصطلحات موضوعية: Intel FPGA, Soft-processor, Buffer overflow attack, Embedded systems security, Vulnerabilities in C
Relation: oai:zenodo.org:2585653
-
10Conference
المؤلفون: Χατζηβασιλης Γεωργιος(http://users.isc.tuc.gr/~gchatzivasilis), Chatzivasilis Georgios(http://users.isc.tuc.gr/~gchatzivasilis), Φυσαρακης Κωνσταντινος(http://users.isc.tuc.gr/~kfysarakis), Fysarakis Konstantinos(http://users.isc.tuc.gr/~kfysarakis), Παπαευσταθιου Ιωαννης(http://users.isc.tuc.gr/~ipapaefstathiou), Papaefstathiou Ioannis(http://users.isc.tuc.gr/~ipapaefstathiou), Μανιφαβας Χαραλαμπος(http://users.isc.tuc.gr/~cmanifavas), Manifavas Charalabos(http://users.isc.tuc.gr/~cmanifavas)
مصطلحات موضوعية: Block ciphers, Embedded systems security, Lightweight cryptography, Symmetric cryptography
Relation: info:eu-repo/grantAgreement/EC/FP7/246686; http://purl.tuc.gr/dl/dias/4339AEE4-06F0-4259-B642-58A4EFCA5BF1
-
11Conference
المؤلفون: davide zoni
المساهمون: Zoni, Davide
مصطلحات موضوعية: Embedded Systems Security, Side Channel Attacks, Hardware Design Flow, Applied Cryptography
وصف الملف: ELETTRONICO
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-1-7281-4770-3; info:eu-repo/semantics/altIdentifier/isbn/978-1-7281-4771-0; info:eu-repo/semantics/altIdentifier/wos/WOS:000560784900001; ispartofbook:2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC); 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC 2019); firstpage:1; lastpage:4; numberofpages:4; info:eu-repo/grantAgreement/EC/H2020/801137; http://hdl.handle.net/11311/1091953; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85098490045; https://ieeexplore.ieee.org/document/9034935
-
12Academic Journal
المؤلفون: Asplund, Mikael, Paulitsch, Michael
المساهمون: Mikael Asplund and Michael Paulitsch
مصطلحات موضوعية: Security and privacy, Embedded systems security, Computer systems organization, Embedded and cyber-physical systems, Dependable and fault-tolerant systems and networks
وصف الملف: application/pdf
Relation: Is Part Of OASIcs, Volume 73, 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2019); https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.CERTS.2019
-
13
المؤلفون: Asplund, Fredrik, 1977, McDermid, John, Oates, Robert, Roberts, Jonathan
المصدر: IEEE Embedded Systems Letters.
مصطلحات موضوعية: Cyber-physical Systems, Co-design, Embedded Systems Security, Safety Critical Systems, Electrical Engineering, Elektro- och systemteknik
وصف الملف: electronic
-
14
المؤلفون: William Fornaciari, Davide Zoni, Alessandro Barenghi, Gerardo Pelosi
المصدر: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39:1778-1791
مصطلحات موضوعية: Side Channel Attacks, Embedded Systems Security, Side Channel Attacks, Profiled Attacks, Template Attacks, PUF, Applied Cryptography, Exploit, Computer science, business.industry, Profiled Attacks, Advanced Encryption Standard, 02 engineering and technology, Applied Cryptography, Template Attacks, Computer Graphics and Computer-Aided Design, Embedded Systems Security, 020202 computer hardware & architecture, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), Key derivation function, Side channel attack, Electrical and Electronic Engineering, PUF, business, Software, Countermeasure (computer), Block cipher
-
15Dissertation/ Thesis
المؤلفون: Jayashree Srinivasan
مصطلحات موضوعية: Software and application security, System and network security, Cybersecurity, Firmware, Rehosting, Real-Time Systems, RTOS, Dynamic Analysis, Embedded Systems, Embedded Systems Security
-
16Dissertation/ Thesis
المؤلفون: Malin Priyamal Prematilake
مصطلحات موضوعية: Electronics, sensors and digital hardware not elsewhere classified, Digital health, System and network security, Networking and communications, Embedded Systems Security, Implantable Medical Device, internet of things sensors, Internet of Things, Cloud Computing, Communication Security, Smart Devices, Wireless Communications, Internet of Things (loT), Internet of Things Healthcare Market, Security, Health, device identification, activity identification, Security Framework, Privacy, Safety, Network security, Computer engineering, Smart Home Privacy, IMD security, IMD, IWMD, IWMD Security
-
17Academic Journal
المؤلفون: G. Agosta, A. Barenghi, G. Pelosi, M. Scandale
المساهمون: Agosta, G., Barenghi, A., Pelosi, G., Scandale, M.
مصطلحات موضوعية: Applied cryptography, embedded systems security, computer security, automated countermeasure application, reactive countermeasures
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000445303500005; volume:62; firstpage:50; lastpage:60; numberofpages:11; journal:MICROPROCESSORS AND MICROSYSTEMS; http://hdl.handle.net/11311/1058969; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85050522527
-
18Academic Journal
المؤلفون: Taimour Wehbe, Vincent Mooney, David Keezer
المصدر: Cryptography; Volume 2; Issue 3; Pages: 20
مصطلحات موضوعية: embedded systems security, hardware-based malware detection, run-time monitoring, code modification, security threats, Field Programmable Gate Arrays (FPGA)
وصف الملف: application/pdf
Relation: Hardware Security; https://dx.doi.org/10.3390/cryptography2030020
-
19Conference
المساهمون: Threat Analysis and Mitigation for Information Security (TAMIS), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Département d'Architectures, Conception et Logiciels Embarqués-LIST (DACLE-LIST), Laboratoire d'Intégration des Systèmes et des Technologies (LIST (CEA)), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Université Grenoble Alpes 2016-2019 (UGA 2016-2019 ), ANR-13-INSE-0006,COGITO,Runtime Code Generation to Secure Devices(2013)
المصدر: SECRYPT 2016 ; https://inria.hal.science/hal-01383143 ; SECRYPT 2016, Jul 2016, Lsbonne, Portugal. pp.231 - 238, ⟨10.5220/0005955102310238⟩
مصطلحات موضوعية: Template attack, Side Channel Analysis, Electromagnetic Emission, VERIFY PIN Algorithm, Embedded Systems' Security, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
20Conference
المساهمون: Agosta, Giovanni, Barenghi, Alessandro, Pelosi, Gerardo, Scandale, Michele
مصطلحات موضوعية: Computer Security, Side Channel Attack, Software Countermeasure, Embedded Systems Security, Compiler Techniques
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-1-4503-4466-1; info:eu-repo/semantics/altIdentifier/wos/WOS:000390297800096; ispartofbook:Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2016), Austin, TX, USA, November 07-10, 2016, Austin, TX, USA; IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2016); firstpage:1; lastpage:8; numberofpages:8; http://hdl.handle.net/11311/1006958; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85001038072; http://dx.doi.org/10.1145/2966986.2967033