咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 3 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 9 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 11 篇 secure embedded ...
  • 4 篇 security
  • 2 篇 resilience
  • 2 篇 mosa
  • 2 篇 sosa
  • 2 篇 secure architect...
  • 2 篇 cryptography
  • 1 篇 runtime
  • 1 篇 data integrity
  • 1 篇 microarchitectur...
  • 1 篇 mission assuranc...
  • 1 篇 libraries
  • 1 篇 openvpx
  • 1 篇 secure real-time...
  • 1 篇 side channel att...
  • 1 篇 proposals
  • 1 篇 hardware perform...
  • 1 篇 programmability
  • 1 篇 crypto device
  • 1 篇 micro-architectu...

机构

  • 2 篇 virginia polytec...
  • 1 篇 karlsruhe inst t...
  • 1 篇 aflcmc hnca wash...
  • 1 篇 univ paris sacla...
  • 1 篇 univ patras elec...
  • 1 篇 usb cnrs lab ele...
  • 1 篇 mit lincoln lab ...
  • 1 篇 virginia tech bl...
  • 1 篇 cornell univ ith...
  • 1 篇 sorbonne univ cn...
  • 1 篇 indian inst info...
  • 1 篇 univ grenoble al...
  • 1 篇 res ctr athena i...
  • 1 篇 mit lincoln lab ...
  • 1 篇 linkoping univ e...
  • 1 篇 fzi res ctr info...
  • 1 篇 univ massachuset...
  • 1 篇 swiss fed inst t...
  • 1 篇 univ bordeaux 1 ...

作者

  • 2 篇 khazan roger
  • 2 篇 nahill ben
  • 2 篇 simpson eric
  • 2 篇 lim jeffery
  • 2 篇 hughes jeffrey
  • 2 篇 vai michael
  • 1 篇 diguet jean-phil...
  • 1 篇 lee alice
  • 1 篇 dinu daniel
  • 1 篇 tollec simon
  • 1 篇 burrow ryan
  • 1 篇 torres gabriel
  • 1 篇 gogniat guy
  • 1 篇 peng zebo
  • 1 篇 ambuj sudhir sin...
  • 1 篇 nguyen huy
  • 1 篇 vaslin romain
  • 1 篇 hoe andrew
  • 1 篇 womack jeffrey
  • 1 篇 ghoshal bibhas

语言

  • 11 篇 英文
检索条件"主题词=Secure embedded systems"
11 条 记 录,以下是1-10 订阅
排序:
SuBhI: Securing embedded System's Runtime Integrity via Behavioral Information
IEEE DESIGN & TEST
收藏 引用
IEEE DESIGN & TEST 2025年 第3期42卷 103-112页
作者: Srivastav, Pravin Kaur, Anandpreet Ghoshal, Bibhas Indian Inst Informat Technol Allahabad Dept Informat & Technol Syst Lab Prayagraj 211012 Uttar Pradesh India
Editor’s notes: In this article, the authors propose a dual attestation scheme which protects embedded device’s runtime integrity from control and microarchitectural attacks. Such attestation ensures that a scheme c... 详细信息
来源: 评论
High Assurance Multi-Function Crypto Development
High Assurance Multi-Function Crypto Development
收藏 引用
2024 Military Communications Conference
作者: Hughes, Jeffrey Nahill, Ben Simpson, Eric Lim, Jeffery Burrow, Ryan Dean, John Lee, Brian Vai, Michael Khazan, Roger O'Melia, Sean Hoe, Andrew Parrish, Michael Womack, Jeffrey Trotter, Scott Lodico, Maria MIT Lincoln Lab 244 Wood St Lexington MA 02173 USA AFLCMC HNCA Washington DC USA
Today's high assurance crypto solutions are predominantly devices that are tightly coupled to specific systems and use cases. These crypto devices are not readily upgradable to support new algorithms or operations... 详细信息
来源: 评论
Security-as-a-Service for embedded systems
Security-as-a-Service for Embedded Systems
收藏 引用
41st IEEE Military Communications Conference (IEEE MILCOM) - Communications Supporting Military Operations in a Contested Environment
作者: Vai, Michael Simpson, Eric Kava, Donato Lee, Alice Nguyen, Huy Hughes, Jeffrey Torres, Gabriel Lim, Jeffery Nahill, Ben Khazan, Roger Schneider, Fred MIT Lincoln Lab Cambridge MA 02139 USA Cornell Univ Ithaca NY 14853 USA
In order to promote competition and technology refresh, the Department of Defense (DoD) has required the use of a Modular Open systems Approach (MOSA) for the acquisition and implementation of embedded systems. Design... 详细信息
来源: 评论
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models  19
Exploration of Fault Effects on Formal RISC-V Microarchitect...
收藏 引用
19th Workshop on Fault Detection and Tolerance in Cryptography (FDTC)
作者: Tollec, Simon Asavoae, Mihail Courousse, Damien Heydemann, Karine Jan, Mathieu Univ Paris Saclay CEA List F-91120 Palaiseau France Univ Grenoble Alpes CEA List F-38000 Grenoble France Sorbonne Univ CNRS LIP6 F-75005 Paris France
This paper introduces a formal workflow for modeling software/hardware systems in order to explore the effects of fault injections and evaluate the robustness to fault injection attacks. We illustrate this workflow on... 详细信息
来源: 评论
Profiling Dilithium Digital Signature Traces for Correlation Differential Side Channel Attacks  20th
Profiling Dilithium Digital Signature Traces for Correlation...
收藏 引用
20th International Conference on embedded Computer systems - Architectures, Modeling, and Simulation (SAMOS)
作者: Fournaris, Apostolos P. Dimopoulos, Charis Koufopavlou, Odysseas Res Ctr ATHENA Ind Syst Inst Patras Sci Pk Patras Greece Univ Patras Elect & Comp Engn Dept Rion Campus Patras Greece
A significant concern for the candidate schemes of the NIST postquantum cryptography standardization project is the protection they support against side-channel attacks. One of these candidate schemes currently in the... 详细信息
来源: 评论
A secure Framework with Remote Configuration of Intellectual Property  5th
A Secure Framework with Remote Configuration of Intellectual...
收藏 引用
5th International Conference on Information systems Security and Privacy (ICISSP)
作者: Khan, Nadir Nitzsche, Sven Becker, Juergen FZI Res Ctr Informat Technol Karlsruhe Germany Karlsruhe Inst Technol KIT Karlsruhe Inst Informat Proc Technol ITIV Karlsruhe Germany
In this work, an intellectual property (IP) licensing framework is proposed that is secure against IP theft (cloning and redistribution). This security is provided by utilizing built-in features of modern field progra... 详细信息
来源: 评论
Optimization of Message Encryption for Real-Time Applications in embedded systems
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2018年 第5期67卷 748-754页
作者: Aminifar, Amir Eles, Petru Peng, Zebo Swiss Fed Inst Technol Lausanne EPFL Embedded Syst Lab CH-1015 Lausanne Switzerland Linkoping Univ Embedded Syst Lab S-58183 Linkoping Sweden
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent res... 详细信息
来源: 评论
secure Application Continuity in Intermittent systems  9
Secure Application Continuity in Intermittent Systems
收藏 引用
9th International Green and Sustainable Computing Conference (IGSC)
作者: Suslowicz, Charles Krishnan, Archanaa S. Dinu, Daniel Schaumont, Patrick Virginia Tech Blacksburg VA 24061 USA
Intermittent systems operate embedded devices without a source of constant reliable power, relying instead on an unreliable source such as an energy harvester. They overcome the limitation of intermittent power by ret... 详细信息
来源: 评论
Design Techniques for Side-channel Resistant embedded Software
Design Techniques for Side-channel Resistant Embedded Softwa...
收藏 引用
作者: Ambuj Sudhir Sinha Virginia Polytechnic Institute and State University
学位级别:硕士
Side Channel Attacks (SCA) are a class of passive attacks on cryptosystems that exploit implementation characteristics of the system. Currently, a lot of research is focussed towards developing countermeasures to side... 详细信息
来源: 评论
Securing Software Intellectual Property on Commodity and Legacy embedded systems
Securing Software Intellectual Property on Commodity and Leg...
收藏 引用
作者: Michael A. Gora Virginia Polytechnic Institute and State University
学位级别:硕士
The proliferation of embedded systems into nearly every aspect of modern infrastructure and society has seen their deployment in such diverse roles as monitoring the power grid and processing commercial payments. Soft... 详细信息
来源: 评论