Survey of Hardware-based Security support for IoT/CPS Systems
نویسندگان
چکیده
منابع مشابه
Survey of Approaches for Security Verification of Hardware/Software Systems
Variety of computing systems have been proposed to provide protection for sensitive code or data through hardware or software mechanisms. This paper surveys the landscape of security verification approaches and techniques for hardware/software systems at different levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, base...
متن کاملHardware Security Modules for Embedded Systems
Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directl...
متن کاملapplication of upfc based on svpwm for power quality improvement
در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...
15 صفحه اولFlexible Hardware Support for Interworking Systems
Todays FPGA technology allows reconngurable hardware to be integrated into standard PC hardware. With this kind of hardware it is possible to change hardware functionality on-they and to remove and insert complete subsystems just by rebooting the conngurable parts. Hardware like this has new demands on software that often can't be fulllled by the classical device driver concept used in todays o...
متن کاملConsistency - based Hardware Security Techniques
Integrated circuits (ICs) are the fundamental building blocks of essentially all computer or electronic systems. While outsourcing has become a trend in the IC industry to reduce the manufacturing cost, an untrusted foundry that has full access to the hardware may easily compromise the security of the manufactured ICs, such as embedding hardware Trojans. Due to the presence of process variation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: KnE Engineering
سال: 2018
ISSN: 2518-6841
DOI: 10.18502/keg.v3i7.3072